Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Berlin

Region: Land Berlin

Country: Germany

Internet Service Provider: Vodafone

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.222.133.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2815
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;94.222.133.100.			IN	A

;; AUTHORITY SECTION:
.			252	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020091602 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 17 07:58:08 CST 2020
;; MSG SIZE  rcvd: 118
Host info
100.133.222.94.in-addr.arpa domain name pointer dslb-094-222-133-100.094.222.pools.vodafone-ip.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
100.133.222.94.in-addr.arpa	name = dslb-094-222-133-100.094.222.pools.vodafone-ip.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.52.52.22 attackspambots
2019-09-11T01:06:13.868512abusebot-4.cloudsearch.cf sshd\[17037\]: Invalid user user from 103.52.52.22 port 44250
2019-09-11 09:14:02
203.110.179.26 attackbots
Sep 11 03:38:01 plex sshd[15151]: Invalid user ftp_test from 203.110.179.26 port 59188
2019-09-11 09:38:15
167.71.223.191 attackspam
SSH brute-force: detected 59 distinct usernames within a 24-hour window.
2019-09-11 09:43:15
82.223.2.97 attackbots
Sep 11 00:11:50 herz-der-gamer sshd[21503]: Invalid user nagios from 82.223.2.97 port 43198
Sep 11 00:11:50 herz-der-gamer sshd[21503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.223.2.97
Sep 11 00:11:50 herz-der-gamer sshd[21503]: Invalid user nagios from 82.223.2.97 port 43198
Sep 11 00:11:52 herz-der-gamer sshd[21503]: Failed password for invalid user nagios from 82.223.2.97 port 43198 ssh2
...
2019-09-11 10:00:51
171.241.206.118 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-10 18:01:41,990 INFO [amun_request_handler] PortScan Detected on Port: 445 (171.241.206.118)
2019-09-11 09:27:48
187.213.141.145 attackbots
Unauthorised access (Sep 11) SRC=187.213.141.145 LEN=40 TTL=51 ID=51371 TCP DPT=8080 WINDOW=54572 SYN
2019-09-11 09:23:11
159.65.12.183 attackspam
2019-09-11T01:28:14.765184abusebot-7.cloudsearch.cf sshd\[11985\]: Invalid user test from 159.65.12.183 port 48644
2019-09-11 09:56:46
167.71.2.71 attack
Sep 11 01:51:45 web8 sshd\[7448\]: Invalid user minecraft from 167.71.2.71
Sep 11 01:51:45 web8 sshd\[7448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.2.71
Sep 11 01:51:47 web8 sshd\[7448\]: Failed password for invalid user minecraft from 167.71.2.71 port 44996 ssh2
Sep 11 01:57:05 web8 sshd\[10182\]: Invalid user clouduser from 167.71.2.71
Sep 11 01:57:05 web8 sshd\[10182\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.2.71
2019-09-11 09:57:48
222.114.225.136 attackbotsspam
2019-09-10T16:51:15.520485suse-nuc sshd[17755]: Invalid user postgres from 222.114.225.136 port 36488
...
2019-09-11 09:47:05
104.254.244.205 attack
Sep 10 19:47:40 vps200512 sshd\[12959\]: Invalid user data-www from 104.254.244.205
Sep 10 19:47:40 vps200512 sshd\[12959\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.254.244.205
Sep 10 19:47:41 vps200512 sshd\[12959\]: Failed password for invalid user data-www from 104.254.244.205 port 42268 ssh2
Sep 10 19:53:19 vps200512 sshd\[13033\]: Invalid user developer@123 from 104.254.244.205
Sep 10 19:53:19 vps200512 sshd\[13033\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.254.244.205
2019-09-11 09:59:19
51.38.176.147 attackspambots
Sep 11 00:56:00 lnxweb62 sshd[4878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.176.147
Sep 11 00:56:00 lnxweb62 sshd[4878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.176.147
2019-09-11 09:48:37
129.204.40.44 attack
Sep 11 03:38:43 h2177944 sshd\[16214\]: Invalid user 12 from 129.204.40.44 port 57466
Sep 11 03:38:43 h2177944 sshd\[16214\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.40.44
Sep 11 03:38:44 h2177944 sshd\[16214\]: Failed password for invalid user 12 from 129.204.40.44 port 57466 ssh2
Sep 11 03:46:25 h2177944 sshd\[16390\]: Invalid user developer from 129.204.40.44 port 35554
...
2019-09-11 09:54:29
157.230.235.233 attackspam
Sep 10 22:08:00 ws12vmsma01 sshd[26190]: Invalid user daniel from 157.230.235.233
Sep 10 22:08:02 ws12vmsma01 sshd[26190]: Failed password for invalid user daniel from 157.230.235.233 port 41440 ssh2
Sep 10 22:16:09 ws12vmsma01 sshd[27266]: Invalid user jenkins from 157.230.235.233
...
2019-09-11 09:41:12
107.172.131.205 attackspambots
WordPress XMLRPC scan :: 107.172.131.205 0.156 BYPASS [11/Sep/2019:08:11:58  1000] www.[censored_1] "POST /xmlrpc.php HTTP/1.1" 200 382 "https://www.[censored_1]/" "PHP/7.3.69"
2019-09-11 09:54:48
189.19.127.29 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-10 18:01:15,197 INFO [amun_request_handler] PortScan Detected on Port: 445 (189.19.127.29)
2019-09-11 09:51:53

Recently Reported IPs

70.138.119.238 188.87.97.20 222.102.2.57 117.239.4.147
58.241.42.142 196.128.189.229 81.207.210.178 81.197.93.15
121.119.39.19 99.172.13.94 118.153.97.123 186.108.241.69
110.6.123.168 82.177.132.167 100.50.96.82 108.41.118.44
153.189.174.201 70.205.30.251 201.132.237.6 49.129.224.175