Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.16.114.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33438
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.16.114.106.			IN	A

;; AUTHORITY SECTION:
.			169	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 17:31:12 CST 2022
;; MSG SIZE  rcvd: 106
Host info
106.114.16.94.in-addr.arpa domain name pointer hpgl.ultrasrv.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
106.114.16.94.in-addr.arpa	name = hpgl.ultrasrv.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
77.60.37.105 attackspambots
Dec 25 15:50:55 zeus sshd[21087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.60.37.105 
Dec 25 15:50:57 zeus sshd[21087]: Failed password for invalid user arjunasa from 77.60.37.105 port 57545 ssh2
Dec 25 15:54:14 zeus sshd[21176]: Failed password for root from 77.60.37.105 port 56299 ssh2
Dec 25 15:57:18 zeus sshd[21283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.60.37.105
2019-12-26 06:16:04
213.32.16.127 attackspambots
ssh failed login
2019-12-26 06:24:59
180.76.246.149 attackbots
Dec 25 13:27:15 mockhub sshd[26131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.246.149
Dec 25 13:27:17 mockhub sshd[26131]: Failed password for invalid user serena from 180.76.246.149 port 40794 ssh2
...
2019-12-26 06:28:58
78.163.161.201 attackbots
HTTP/80/443 Probe, BF, WP, Hack -
2019-12-26 06:07:15
185.103.108.134 attack
1577285195 - 12/25/2019 15:46:35 Host: 185.103.108.134/185.103.108.134 Port: 445 TCP Blocked
2019-12-26 06:26:02
171.253.193.34 attackspam
1577285210 - 12/25/2019 15:46:50 Host: 171.253.193.34/171.253.193.34 Port: 445 TCP Blocked
2019-12-26 06:15:01
188.162.43.14 attackspambots
Brute force attempt
2019-12-26 06:13:16
205.185.127.36 attackbots
...
2019-12-26 06:10:42
51.178.29.212 attackbotsspam
C2,WP GET /wp-login.php
2019-12-26 06:18:57
76.73.206.90 attack
$f2bV_matches
2019-12-26 06:21:37
200.98.64.68 attackspambots
Unauthorized connection attempt detected from IP address 200.98.64.68 to port 1433
2019-12-26 06:08:35
54.169.180.190 attackspambots
HTTP/80/443 Probe, BF, WP, Hack -
2019-12-26 06:14:02
60.162.160.72 attack
Dec 25 09:32:24 esmtp postfix/smtpd[4681]: lost connection after AUTH from unknown[60.162.160.72]
Dec 25 09:35:04 esmtp postfix/smtpd[4718]: lost connection after AUTH from unknown[60.162.160.72]
Dec 25 09:35:17 esmtp postfix/smtpd[4718]: lost connection after AUTH from unknown[60.162.160.72]
Dec 25 09:35:49 esmtp postfix/smtpd[4720]: lost connection after AUTH from unknown[60.162.160.72]
Dec 25 09:35:56 esmtp postfix/smtpd[4727]: lost connection after AUTH from unknown[60.162.160.72]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=60.162.160.72
2019-12-26 06:11:57
177.25.182.62 attack
SSH/22 MH Probe, BF, Hack -
2019-12-26 06:06:26
190.115.183.16 attack
ssh failed login
2019-12-26 06:31:07

Recently Reported IPs

192.145.239.54 64.227.178.31 45.163.72.14 119.42.112.13
27.255.90.109 194.58.122.158 193.23.245.207 216.99.19.46
43.154.156.4 104.248.148.166 102.185.26.134 94.19.130.58
112.202.80.153 187.178.206.142 188.17.148.234 92.255.169.145
95.219.101.186 220.198.204.44 182.123.248.40 69.164.217.38