Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.223.139.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46343
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.223.139.13.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 22:29:19 CST 2025
;; MSG SIZE  rcvd: 106
Host info
13.139.223.94.in-addr.arpa domain name pointer dslb-094-223-139-013.094.223.pools.vodafone-ip.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
13.139.223.94.in-addr.arpa	name = dslb-094-223-139-013.094.223.pools.vodafone-ip.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
63.82.50.249 attack
Mar 12 14:23:32 mail.srvfarm.net postfix/smtpd[1850443]: NOQUEUE: reject: RCPT from medical.jdmbrosllc.com[63.82.50.249]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 12 14:23:41 mail.srvfarm.net postfix/smtpd[1850354]: NOQUEUE: reject: RCPT from medical.jdmbrosllc.com[63.82.50.249]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 12 14:25:40 mail.srvfarm.net postfix/smtpd[1850439]: NOQUEUE: reject: RCPT from medical.jdmbrosllc.com[63.82.50.249]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 12 14:28:14 mail.srvfarm.net postfix/smtpd[1850333]: NOQUEUE: reject: RCPT from medical.jdmbrosllc.com[63.82.50.249]
2020-03-13 00:22:43
178.171.43.1 attack
Chat Spam
2020-03-13 00:30:01
85.204.116.150 attackspambots
2020-01-07T20:59:24.764Z CLOSE host=85.204.116.150 port=49780 fd=4 time=20.021 bytes=27
...
2020-03-13 00:32:48
85.204.116.176 attack
2020-01-10T06:40:26.673Z CLOSE host=85.204.116.176 port=51538 fd=4 time=20.015 bytes=3
...
2020-03-13 00:32:25
217.219.116.116 attack
Unauthorized connection attempt detected from IP address 217.219.116.116 to port 1433
2020-03-13 00:09:33
218.103.116.121 attackbots
CMS (WordPress or Joomla) login attempt.
2020-03-13 00:45:52
37.142.237.6 attackbots
Unauthorized connection attempt from IP address 37.142.237.6 on Port 445(SMB)
2020-03-13 00:27:00
69.94.135.172 attack
Mar 12 14:33:10 mail.srvfarm.net postfix/smtpd[1848579]: NOQUEUE: reject: RCPT from word.gratefulhope.com[69.94.135.172]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 12 14:34:05 mail.srvfarm.net postfix/smtpd[1850365]: NOQUEUE: reject: RCPT from word.gratefulhope.com[69.94.135.172]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 12 14:34:05 mail.srvfarm.net postfix/smtpd[1837248]: NOQUEUE: reject: RCPT from word.gratefulhope.com[69.94.135.172]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 12 14:36:05 mail.srvfarm.net postfix/smtpd[1852675]: NOQUEUE: reject: RCP
2020-03-13 00:21:46
85.209.0.214 attackbotsspam
2020-01-03T08:58:40.023Z CLOSE host=85.209.0.214 port=59348 fd=4 time=20.015 bytes=29
...
2020-03-13 00:10:52
178.206.126.145 attackspam
Unauthorized connection attempt from IP address 178.206.126.145 on Port 445(SMB)
2020-03-13 00:37:28
170.106.81.251 attackbotsspam
firewall-block, port(s): 7071/tcp
2020-03-13 00:30:20
187.254.15.89 attackbots
firewall-block, port(s): 1433/tcp
2020-03-13 00:09:59
94.66.23.237 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-13 00:31:52
2607:5300:203:2be:: attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2020-03-13 00:33:19
85.209.0.242 attack
2019-12-03T13:02:20.482Z CLOSE host=85.209.0.242 port=40694 fd=4 time=20.008 bytes=6
...
2020-03-13 00:08:49

Recently Reported IPs

139.144.231.23 132.73.34.140 93.193.253.197 157.89.188.161
234.144.163.104 164.185.24.4 13.100.161.123 47.27.173.12
151.186.2.161 94.152.9.138 146.236.12.236 92.85.239.58
71.138.194.124 109.155.50.203 99.255.102.159 103.174.52.183
118.122.91.215 52.27.203.178 19.141.28.211 179.241.48.213