Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Székesfehérvár

Region: Fejér megye

Country: Hungary

Internet Service Provider: DIGI

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.21.156.27
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17543
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.21.156.27.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031201 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 13 09:03:25 CST 2025
;; MSG SIZE  rcvd: 105
Host info
27.156.21.94.in-addr.arpa domain name pointer 94-21-156-27.pool.digikabel.hu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
27.156.21.94.in-addr.arpa	name = 94-21-156-27.pool.digikabel.hu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
121.28.38.227 attackbots
Icarus honeypot on github
2020-07-01 16:20:25
178.206.231.54 attack
port scan and connect, tcp 80 (http)
2020-07-01 16:15:05
49.233.212.154 attackspambots
$f2bV_matches
2020-07-01 15:57:25
43.243.214.20 attackspambots
 TCP (SYN) 43.243.214.20:35909 -> port 8080, len 44
2020-07-01 15:40:45
197.14.49.131 attack
IP 197.14.49.131 attacked honeypot on port: 23 at 6/30/2020 10:36:53 AM
2020-07-01 15:54:26
77.37.246.150 attackspambots
unauthorized connection attempt
2020-07-01 16:16:05
106.52.135.88 attack
Jun 30 16:27:51 roki sshd[25933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.135.88  user=root
Jun 30 16:27:54 roki sshd[25933]: Failed password for root from 106.52.135.88 port 43942 ssh2
Jun 30 16:30:40 roki sshd[26141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.135.88  user=root
Jun 30 16:30:42 roki sshd[26141]: Failed password for root from 106.52.135.88 port 41726 ssh2
Jun 30 16:33:12 roki sshd[26318]: Invalid user csgoserver from 106.52.135.88
Jun 30 16:33:12 roki sshd[26318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.135.88
...
2020-07-01 16:02:32
36.237.9.52 attack
unauthorized connection attempt
2020-07-01 15:50:31
106.12.21.124 attackspam
unauthorized connection attempt
2020-07-01 16:15:38
139.59.230.44 attack
Invalid user usuario from 139.59.230.44 port 41600
2020-07-01 16:02:11
59.126.199.77 attackbotsspam
unauthorized connection attempt
2020-07-01 16:19:39
181.30.99.114 attack
Multiple SSH authentication failures from 181.30.99.114
2020-07-01 15:42:04
150.109.180.250 attackbots
 TCP (SYN) 150.109.180.250:48583 -> port 28006, len 44
2020-07-01 15:49:59
27.74.246.109 attackbotsspam
Unauthorized connection attempt detected from IP address 27.74.246.109 to port 23
2020-07-01 16:13:22
106.12.205.137 attackbotsspam
 TCP (SYN) 106.12.205.137:49678 -> port 22966, len 44
2020-07-01 16:18:55

Recently Reported IPs

217.45.44.194 157.37.230.93 231.70.65.29 242.106.31.125
161.80.253.181 196.67.227.48 147.238.151.209 39.253.177.192
142.244.200.215 147.86.142.35 38.109.181.52 5.7.55.64
153.91.240.87 235.31.170.58 77.85.202.116 166.124.17.146
92.91.73.180 190.93.161.168 119.107.64.193 34.15.26.88