Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Poland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.152.45.93
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3384
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.152.45.93.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 18:05:46 CST 2025
;; MSG SIZE  rcvd: 105
Host info
93.45.152.94.in-addr.arpa domain name pointer karor.e-kei.pl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
93.45.152.94.in-addr.arpa	name = karor.e-kei.pl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
125.137.120.54 attackbots
port scan and connect, tcp 23 (telnet)
2019-06-22 05:10:03
111.67.196.127 attackspam
Bad Bot Bad Request: "GET / HTTP/1.1" Agent: "Mozilla/5.0 zgrab/0.x" Bad Bot Bad Request: "GET / HTTP/1.1" Agent: "Mozilla/5.0 zgrab/0.x" Bad Bot Bad Request: "GET / HTTP/1.1" Agent: "Mozilla/5.0 zgrab/0.x"
2019-06-22 05:18:39
171.22.9.29 attackbots
5555/tcp
[2019-06-21]1pkt
2019-06-22 05:08:12
222.160.218.129 attackbots
5500/tcp
[2019-06-21]1pkt
2019-06-22 04:56:05
182.18.171.148 attackbots
SSH Brute Force, server-1 sshd[3524]: Failed password for invalid user mick from 182.18.171.148 port 37330 ssh2
2019-06-22 05:16:34
37.49.224.204 attack
Invalid user support from 37.49.224.204 port 55540
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.49.224.204
Failed password for invalid user support from 37.49.224.204 port 55540 ssh2
Invalid user admin from 37.49.224.204 port 55609
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.49.224.204
2019-06-22 05:09:42
58.140.223.27 attackbots
20 attempts against mh-ssh on sonic.magehost.pro
2019-06-22 04:47:00
121.230.63.195 attackspam
5555/tcp 5555/tcp 5555/tcp
[2019-06-21]3pkt
2019-06-22 04:58:01
132.145.240.3 attackspambots
9999/tcp
[2019-06-21]1pkt
2019-06-22 05:05:35
14.85.88.4 attackspam
Autoban   14.85.88.4 ABORTED AUTH
2019-06-22 05:07:46
201.147.144.87 attackspambots
Request: "GET / HTTP/1.1" Request: "GET / HTTP/1.1"
2019-06-22 04:52:10
72.48.210.139 attackspam
Lines containing failures of 72.48.210.139
/var/log/apache/pucorp.org.log:2019-06-21T17:07:12.207424+01:00 ticdesk sshd[6008]: Invalid user pi from 72.48.210.139 port 55772
/var/log/apache/pucorp.org.log:2019-06-21T17:07:12.390686+01:00 ticdesk sshd[6008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.48.210.139 
/var/log/apache/pucorp.org.log:2019-06-21T17:07:12.406120+01:00 ticdesk sshd[6008]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.48.210.139 user=pi
/var/log/apache/pucorp.org.log:2019-06-21T17:07:12.443772+01:00 ticdesk sshd[6010]: Invalid user pi from 72.48.210.139 port 55774
/var/log/apache/pucorp.org.log:2019-06-21T17:07:12.626195+01:00 ticdesk sshd[6010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.48.210.139 
/var/log/apache/pucorp.org.log:2019-06-21T17:07:12.627843+01:00 ticdesk sshd[6010]: pam_sss(sshd:auth): authenticat........
------------------------------
2019-06-22 04:40:30
36.234.158.112 attack
445/tcp 445/tcp
[2019-06-21]2pkt
2019-06-22 04:50:18
87.17.241.78 attackbots
SSHD brute force attack detected by fail2ban
2019-06-22 05:13:52
158.69.241.140 attack
5061/tcp
[2019-06-21]1pkt
2019-06-22 05:02:51

Recently Reported IPs

32.178.99.16 157.10.173.130 155.190.74.206 186.238.134.161
223.114.168.54 87.254.131.76 51.208.0.59 90.237.139.25
160.145.71.126 213.119.42.143 171.213.180.48 83.108.23.156
69.177.44.27 230.207.227.70 82.86.140.235 248.124.161.12
8.25.194.207 251.236.214.140 122.168.228.112 43.80.123.98