Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.230.55.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59589
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.230.55.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 20:25:10 CST 2025
;; MSG SIZE  rcvd: 106
Host info
142.55.230.94.in-addr.arpa domain name pointer host-94-230-55-142.customer.ign-dns.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.55.230.94.in-addr.arpa	name = host-94-230-55-142.customer.ign-dns.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
138.201.123.170 attack
WordPress admin/config access attempt: "GET /wp-admin/"
2020-07-14 16:19:11
152.136.139.129 attack
Jul 14 07:59:10 minden010 sshd[26089]: Failed password for redis from 152.136.139.129 port 51588 ssh2
Jul 14 08:02:06 minden010 sshd[27024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.139.129
Jul 14 08:02:07 minden010 sshd[27024]: Failed password for invalid user usertest from 152.136.139.129 port 57068 ssh2
...
2020-07-14 16:09:01
192.99.36.177 attack
192.99.36.177 - - [14/Jul/2020:08:45:28 +0100] "POST /wp-login.php HTTP/1.1" 200 6598 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
192.99.36.177 - - [14/Jul/2020:08:47:31 +0100] "POST /wp-login.php HTTP/1.1" 200 6605 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
192.99.36.177 - - [14/Jul/2020:08:49:36 +0100] "POST /wp-login.php HTTP/1.1" 200 6605 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
...
2020-07-14 15:53:27
106.12.88.246 attackspam
SSH brute-force attempt
2020-07-14 15:49:11
77.23.10.115 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2020-07-14 16:18:20
112.13.200.154 attackspam
Fail2Ban - SSH Bruteforce Attempt
2020-07-14 16:06:44
222.221.248.242 attackbotsspam
Brute-force attempt banned
2020-07-14 15:42:27
223.4.66.84 attackspam
Jul 14 09:42:12 vps647732 sshd[30782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.4.66.84
Jul 14 09:42:15 vps647732 sshd[30782]: Failed password for invalid user emms from 223.4.66.84 port 28182 ssh2
...
2020-07-14 16:02:53
117.169.41.8 attack
Invalid user ase from 117.169.41.8 port 49574
2020-07-14 15:48:40
51.210.47.32 attackspambots
Jul 14 08:23:55 h2427292 sshd\[12015\]: Invalid user norman from 51.210.47.32
Jul 14 08:23:57 h2427292 sshd\[12015\]: Failed password for invalid user norman from 51.210.47.32 port 54651 ssh2
Jul 14 08:35:24 h2427292 sshd\[22028\]: Invalid user mr from 51.210.47.32
...
2020-07-14 15:59:24
222.112.255.124 attackbots
$f2bV_matches
2020-07-14 15:43:30
171.220.243.179 attackspam
$f2bV_matches
2020-07-14 15:46:34
111.161.41.156 attackspambots
SSH invalid-user multiple login attempts
2020-07-14 15:59:40
116.90.87.210 attackbotsspam
Port Scan detected!
...
2020-07-14 16:04:37
202.83.161.117 attackspambots
Jul 14 05:51:38 rancher-0 sshd[293420]: Invalid user emma from 202.83.161.117 port 50158
...
2020-07-14 16:13:03

Recently Reported IPs

121.108.230.24 240.49.63.175 252.171.251.149 100.54.162.248
255.143.180.45 38.221.60.162 66.81.59.78 127.223.153.141
153.118.44.87 62.63.41.64 180.67.60.8 95.223.139.73
232.174.147.5 217.226.126.171 231.159.208.160 247.138.144.105
16.243.47.3 49.162.17.135 222.157.244.77 168.116.179.119