Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.213.108.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47177
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.213.108.7.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 07:35:00 CST 2025
;; MSG SIZE  rcvd: 105
Host info
7.108.213.94.in-addr.arpa domain name pointer 94-213-108-7.cable.dynamic.v4.ziggo.nl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
7.108.213.94.in-addr.arpa	name = 94-213-108-7.cable.dynamic.v4.ziggo.nl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
14.63.162.98 attackspambots
SSH BruteForce Attack
2020-09-29 00:37:22
175.24.95.240 attackbots
2020-09-28T16:15:01.700783abusebot-8.cloudsearch.cf sshd[6978]: Invalid user user3 from 175.24.95.240 port 41088
2020-09-28T16:15:01.708107abusebot-8.cloudsearch.cf sshd[6978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.95.240
2020-09-28T16:15:01.700783abusebot-8.cloudsearch.cf sshd[6978]: Invalid user user3 from 175.24.95.240 port 41088
2020-09-28T16:15:03.504812abusebot-8.cloudsearch.cf sshd[6978]: Failed password for invalid user user3 from 175.24.95.240 port 41088 ssh2
2020-09-28T16:18:29.661807abusebot-8.cloudsearch.cf sshd[7063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.95.240  user=root
2020-09-28T16:18:31.347341abusebot-8.cloudsearch.cf sshd[7063]: Failed password for root from 175.24.95.240 port 54872 ssh2
2020-09-28T16:21:44.544084abusebot-8.cloudsearch.cf sshd[7066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.95.240  us
...
2020-09-29 00:26:22
140.143.57.159 attackspam
Port scan denied
2020-09-29 00:25:16
150.129.112.180 attackbots
 TCP (SYN) 150.129.112.180:18153 -> port 445, len 52
2020-09-29 00:33:07
165.227.205.128 attackbots
$f2bV_matches
2020-09-29 00:43:14
139.59.7.225 attack
$f2bV_matches
2020-09-29 00:04:04
104.206.128.14 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-09-29 00:27:38
180.254.130.78 attackspam
445/tcp 445/tcp
[2020-09-25]2pkt
2020-09-29 00:41:13
106.54.187.20 attack
Sep 28 07:13:21 vpn01 sshd[32085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.187.20
Sep 28 07:13:23 vpn01 sshd[32085]: Failed password for invalid user sales from 106.54.187.20 port 39718 ssh2
...
2020-09-29 00:30:53
185.74.4.20 attack
Sep 28 15:48:42 pve1 sshd[23678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.74.4.20 
Sep 28 15:48:44 pve1 sshd[23678]: Failed password for invalid user titan from 185.74.4.20 port 57414 ssh2
...
2020-09-29 00:05:17
179.95.147.35 attackspambots
Automatic report - Port Scan Attack
2020-09-29 00:42:39
213.14.4.108 attackbotsspam
445/tcp 1433/tcp...
[2020-07-31/09-27]7pkt,2pt.(tcp)
2020-09-29 00:19:59
42.200.155.72 attackspambots
DATE:2020-09-28 17:02:20, IP:42.200.155.72, PORT:ssh SSH brute force auth (docker-dc)
2020-09-29 00:31:39
46.101.245.176 attack
SSH Bruteforce Attempt on Honeypot
2020-09-29 00:18:13
223.130.31.230 attack
23/tcp 23/tcp
[2020-09-25/27]2pkt
2020-09-29 00:38:58

Recently Reported IPs

235.116.241.100 86.37.201.117 136.35.237.211 240.19.206.19
67.134.234.207 86.188.7.120 126.40.212.22 171.22.82.32
51.9.70.204 39.34.99.97 68.12.130.144 47.181.7.116
150.66.6.105 141.254.73.91 214.24.52.208 162.152.202.16
225.4.45.86 177.16.97.119 22.176.43.100 70.166.7.176