Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.214.20.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58837
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.214.20.7.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 01:46:26 CST 2022
;; MSG SIZE  rcvd: 104
Host info
7.20.214.94.in-addr.arpa domain name pointer 94-214-20-7.cable.dynamic.v4.ziggo.nl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
7.20.214.94.in-addr.arpa	name = 94-214-20-7.cable.dynamic.v4.ziggo.nl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.186.173.154 attack
Jun  3 12:43:28 icinga sshd[24423]: Failed password for root from 222.186.173.154 port 20180 ssh2
Jun  3 12:43:31 icinga sshd[24423]: Failed password for root from 222.186.173.154 port 20180 ssh2
Jun  3 12:43:35 icinga sshd[24423]: Failed password for root from 222.186.173.154 port 20180 ssh2
Jun  3 12:43:41 icinga sshd[24423]: Failed password for root from 222.186.173.154 port 20180 ssh2
...
2020-06-03 18:44:45
82.202.226.51 attackspambots
MYH,DEF GET /downloader//
2020-06-03 18:22:25
36.89.96.50 attackbotsspam
Port Scanner
2020-06-03 18:56:34
23.250.26.118 attackbots
(From mark@tlcmedia.xyz) Receive $250 Payments Daily Directly To Your Bank Without Speaking To Anyone!
 
NO SELLING, NO TALKING TO PROSPECTS, NO EXPLAINING!
 
=> Click Here To Get Started
https://tlcmedia.xyz/go/y/
 
Fully Automated System Does All The Work!  You Receive Your Instant $250 Payments Over & Over Again!
 
=> Click Here To Get Started
https://tlcmedia.xyz/go/y/
 
Take Massive Action and Get Started Today!
 

Speak soon,
Mark
2020-06-03 18:27:40
116.7.98.73 attack
"Unauthorized connection attempt on SSHD detected"
2020-06-03 19:01:49
185.12.178.11 attack
firewall-block, port(s): 9922/tcp
2020-06-03 18:57:50
107.170.204.148 attackbots
firewall-block, port(s): 10796/tcp
2020-06-03 18:24:04
68.183.156.109 attackspam
Fail2Ban - SSH Bruteforce Attempt
2020-06-03 18:37:35
23.129.64.189 attackspambots
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-06-03 18:40:23
5.9.61.101 attack
20 attempts against mh-misbehave-ban on pluto
2020-06-03 18:25:05
194.65.141.196 attack
Unauthorized connection attempt from IP address 194.65.141.196 on Port 445(SMB)
2020-06-03 18:36:26
196.52.43.111 attackbots
873/tcp 3389/tcp 30303/tcp...
[2020-04-04/06-03]67pkt,44pt.(tcp),2pt.(udp),1tp.(icmp)
2020-06-03 18:31:40
104.248.176.46 attackbots
SSH Honeypot -> SSH Bruteforce / Login
2020-06-03 18:35:04
106.75.9.141 attack
Jun  2 23:40:25 NPSTNNYC01T sshd[32177]: Failed password for root from 106.75.9.141 port 47254 ssh2
Jun  2 23:44:48 NPSTNNYC01T sshd[32478]: Failed password for root from 106.75.9.141 port 35318 ssh2
...
2020-06-03 18:30:05
178.63.34.189 attackspam
20 attempts against mh-misbehave-ban on pluto
2020-06-03 18:26:20

Recently Reported IPs

93.184.6.6 192.177.140.141 222.142.233.22 163.204.210.94
203.150.128.45 111.254.200.142 182.117.34.68 45.233.139.95
108.162.245.21 37.19.77.212 17.58.90.38 183.219.16.65
39.106.108.14 125.41.191.219 58.248.83.179 117.57.41.31
181.188.145.53 34.205.92.83 171.100.122.212 190.141.170.170