Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: Vodafone

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.220.107.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7916
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;94.220.107.109.			IN	A

;; AUTHORITY SECTION:
.			277	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020032503 1800 900 604800 86400

;; Query time: 98 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 26 06:43:54 CST 2020
;; MSG SIZE  rcvd: 118
Host info
109.107.220.94.in-addr.arpa domain name pointer dslb-094-220-107-109.094.220.pools.vodafone-ip.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
109.107.220.94.in-addr.arpa	name = dslb-094-220-107-109.094.220.pools.vodafone-ip.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
79.9.108.59 attackbots
Aug 18 06:46:17 vtv3 sshd[17678]: Failed password for invalid user kodi from 79.9.108.59 port 52609 ssh2
Aug 18 06:50:30 vtv3 sshd[20150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.9.108.59  user=root
Aug 18 06:50:32 vtv3 sshd[20150]: Failed password for root from 79.9.108.59 port 56653 ssh2
Aug 18 07:03:12 vtv3 sshd[26106]: Invalid user magic from 79.9.108.59 port 64282
Aug 18 07:03:12 vtv3 sshd[26106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.9.108.59
Aug 18 07:03:14 vtv3 sshd[26106]: Failed password for invalid user magic from 79.9.108.59 port 64282 ssh2
Aug 18 07:07:29 vtv3 sshd[28287]: Invalid user luan from 79.9.108.59 port 57508
Aug 18 07:07:29 vtv3 sshd[28287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.9.108.59
Aug 18 07:20:20 vtv3 sshd[2447]: Invalid user hbacoustic from 79.9.108.59 port 50377
Aug 18 07:20:20 vtv3 sshd[2447]: pam_unix(sshd:auth): authenti
2019-12-18 09:30:59
128.199.47.148 attack
Dec 18 01:35:06 minden010 sshd[29028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.47.148
Dec 18 01:35:08 minden010 sshd[29028]: Failed password for invalid user shasha from 128.199.47.148 port 44384 ssh2
Dec 18 01:40:10 minden010 sshd[30528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.47.148
...
2019-12-18 09:38:15
190.193.55.118 attackbotsspam
Dec 17 15:16:01 php1 sshd\[16179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.193.55.118  user=root
Dec 17 15:16:03 php1 sshd\[16179\]: Failed password for root from 190.193.55.118 port 40868 ssh2
Dec 17 15:23:21 php1 sshd\[16941\]: Invalid user ataylor from 190.193.55.118
Dec 17 15:23:21 php1 sshd\[16941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.193.55.118
Dec 17 15:23:23 php1 sshd\[16941\]: Failed password for invalid user ataylor from 190.193.55.118 port 45368 ssh2
2019-12-18 09:40:17
111.231.192.88 attackbots
MLV GET /wp-login.php
2019-12-18 09:34:47
92.51.75.246 attack
Unauthorized connection attempt detected from IP address 92.51.75.246 to port 445
2019-12-18 13:11:52
119.29.134.163 attack
Dec 18 05:48:10 ns382633 sshd\[4174\]: Invalid user nutto from 119.29.134.163 port 56758
Dec 18 05:48:10 ns382633 sshd\[4174\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.134.163
Dec 18 05:48:11 ns382633 sshd\[4174\]: Failed password for invalid user nutto from 119.29.134.163 port 56758 ssh2
Dec 18 05:58:50 ns382633 sshd\[5910\]: Invalid user taboada from 119.29.134.163 port 42642
Dec 18 05:58:50 ns382633 sshd\[5910\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.134.163
2019-12-18 13:11:00
168.90.89.35 attackbotsspam
Dec 17 19:12:31 auw2 sshd\[6940\]: Invalid user ax400 from 168.90.89.35
Dec 17 19:12:31 auw2 sshd\[6940\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.90.89.35.megalinkpi.net.br
Dec 17 19:12:33 auw2 sshd\[6940\]: Failed password for invalid user ax400 from 168.90.89.35 port 51772 ssh2
Dec 17 19:19:35 auw2 sshd\[7585\]: Invalid user ttttt from 168.90.89.35
Dec 17 19:19:35 auw2 sshd\[7585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.90.89.35.megalinkpi.net.br
2019-12-18 13:25:48
149.56.110.112 attack
Dec 18 05:58:44 vpn01 sshd[3816]: Failed password for root from 149.56.110.112 port 55874 ssh2
Dec 18 05:58:58 vpn01 sshd[3816]: error: maximum authentication attempts exceeded for root from 149.56.110.112 port 55874 ssh2 [preauth]
...
2019-12-18 13:05:57
213.39.53.241 attackspam
Dec 18 06:08:57 vps691689 sshd[32237]: Failed password for root from 213.39.53.241 port 58484 ssh2
Dec 18 06:13:57 vps691689 sshd[32373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.39.53.241
...
2019-12-18 13:25:19
80.211.128.151 attackspam
2019-12-18T04:53:23.945180shield sshd\[13201\]: Invalid user lahaug from 80.211.128.151 port 44160
2019-12-18T04:53:23.950847shield sshd\[13201\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.128.151
2019-12-18T04:53:26.165455shield sshd\[13201\]: Failed password for invalid user lahaug from 80.211.128.151 port 44160 ssh2
2019-12-18T04:58:49.192402shield sshd\[15207\]: Invalid user taspatch from 80.211.128.151 port 53358
2019-12-18T04:58:49.197881shield sshd\[15207\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.128.151
2019-12-18 13:15:19
159.89.235.61 attackspam
Dec 17 19:09:55 web1 sshd\[18745\]: Invalid user tomovic from 159.89.235.61
Dec 17 19:09:55 web1 sshd\[18745\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.235.61
Dec 17 19:09:57 web1 sshd\[18745\]: Failed password for invalid user tomovic from 159.89.235.61 port 32984 ssh2
Dec 17 19:15:34 web1 sshd\[19450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.235.61  user=root
Dec 17 19:15:36 web1 sshd\[19450\]: Failed password for root from 159.89.235.61 port 43858 ssh2
2019-12-18 13:27:17
121.66.224.90 attackspam
Dec 18 07:45:07 server sshd\[22852\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.66.224.90  user=root
Dec 18 07:45:09 server sshd\[22852\]: Failed password for root from 121.66.224.90 port 55872 ssh2
Dec 18 07:58:52 server sshd\[26602\]: Invalid user archuleta from 121.66.224.90
Dec 18 07:58:52 server sshd\[26602\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.66.224.90 
Dec 18 07:58:54 server sshd\[26602\]: Failed password for invalid user archuleta from 121.66.224.90 port 54060 ssh2
...
2019-12-18 13:07:34
218.92.0.158 attack
Dec 18 06:09:24 ks10 sshd[14367]: Failed password for root from 218.92.0.158 port 33594 ssh2
Dec 18 06:09:28 ks10 sshd[14367]: Failed password for root from 218.92.0.158 port 33594 ssh2
...
2019-12-18 13:12:50
119.161.156.11 attack
Dec 18 05:59:00 vps647732 sshd[2539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.161.156.11
Dec 18 05:59:02 vps647732 sshd[2539]: Failed password for invalid user koyoto from 119.161.156.11 port 57082 ssh2
...
2019-12-18 13:02:05
31.54.78.174 attackbots
Automatic report - Port Scan Attack
2019-12-18 13:21:38

Recently Reported IPs

213.73.186.244 195.185.171.22 162.192.204.110 143.167.73.223
120.158.112.115 202.174.168.176 119.248.113.77 175.72.203.47
148.120.64.104 109.72.201.160 63.104.232.246 125.237.21.199
189.20.106.172 70.133.216.28 110.89.177.230 80.41.231.164
190.87.160.110 101.187.123.101 32.130.204.76 82.19.194.218