Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frankfurt am Main

Region: Hesse

Country: Germany

Internet Service Provider: Vodafone

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.219.107.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3334
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;94.219.107.136.			IN	A

;; AUTHORITY SECTION:
.			183	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020031501 1800 900 604800 86400

;; Query time: 115 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 16 06:48:36 CST 2020
;; MSG SIZE  rcvd: 118
Host info
136.107.219.94.in-addr.arpa domain name pointer dslb-094-219-107-136.094.219.pools.vodafone-ip.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
136.107.219.94.in-addr.arpa	name = dslb-094-219-107-136.094.219.pools.vodafone-ip.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
192.99.11.224 attackbots
wp attack
2019-06-24 15:52:58
185.53.88.44 attack
" "
2019-06-24 15:30:22
58.242.82.11 attackbots
Jun 24 09:20:38 ubuntu-2gb-nbg1-dc3-1 sshd[32637]: Failed password for root from 58.242.82.11 port 7530 ssh2
Jun 24 09:20:49 ubuntu-2gb-nbg1-dc3-1 sshd[32637]: error: maximum authentication attempts exceeded for root from 58.242.82.11 port 7530 ssh2 [preauth]
...
2019-06-24 15:26:06
125.64.94.212 attackspam
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-06-24 15:52:08
61.180.184.214 attack
Multiple failed FTP logins
2019-06-24 15:45:40
109.124.148.167 attackspam
scan r
2019-06-24 15:44:23
88.213.3.230 attack
Jun 24 09:08:31 vps647732 sshd[5171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.213.3.230
Jun 24 09:08:33 vps647732 sshd[5171]: Failed password for invalid user lucia from 88.213.3.230 port 34386 ssh2
...
2019-06-24 15:26:57
192.144.184.199 attackbots
Automatic report - Web App Attack
2019-06-24 15:24:38
198.71.239.31 attackspam
xmlrpc attack
2019-06-24 15:38:26
124.16.139.243 attackbots
20 attempts against mh-ssh on flow.magehost.pro
2019-06-24 15:54:42
54.37.80.160 attackbots
Jun 24 06:43:33 work-partkepr sshd\[3711\]: Invalid user test from 54.37.80.160 port 35662
Jun 24 06:43:33 work-partkepr sshd\[3711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.80.160
...
2019-06-24 15:52:35
108.61.96.48 attackbots
Spam
ILLUMINATI OFFICIA 
Rich Illuminati
Mon, 24 Jun
 2019 02:26:00 +0000
Authentication-Results: spf=none (sender IP is 108.61.96.48)
 smtp.mailfrom=illuminati.net; hotmail.co.uk; dkim=none (message not signed)
 header.d=none;hotmail.co.uk; dmarc=none action=none
 header.from=illuminati.net;
Received-SPF: None (protection.outlook.com: illuminati.net does not designate
 permitted sender hosts)
Received: from syd1.qvirtual.com.au (108.61.96.48) by
 DB3EUR04FT043.mail.protection.outlook.com (10.152.25.196) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.2008.13 via Frontend Transport; Mon, 24 Jun 2019 02:25:59 +0000
2019-06-24 15:24:08
88.214.26.47 attackspam
Jun 24 12:50:59 tanzim-HP-Z238-Microtower-Workstation sshd\[31842\]: Invalid user admin from 88.214.26.47
Jun 24 12:50:59 tanzim-HP-Z238-Microtower-Workstation sshd\[31842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.214.26.47
Jun 24 12:51:01 tanzim-HP-Z238-Microtower-Workstation sshd\[31842\]: Failed password for invalid user admin from 88.214.26.47 port 38786 ssh2
...
2019-06-24 15:41:29
115.28.70.113 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-06-24 15:34:16
37.9.169.12 attackspambots
xmlrpc attack
2019-06-24 15:49:58

Recently Reported IPs

199.3.71.74 200.249.172.183 41.201.85.98 31.0.36.21
99.63.248.55 60.35.161.74 75.67.17.145 185.114.141.158
70.154.180.109 81.210.108.135 124.254.208.159 97.22.98.177
126.26.113.59 88.225.17.231 90.183.160.48 119.135.235.88
162.190.223.49 129.177.49.255 218.40.132.156 180.25.205.160