Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.246.40.86
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60453
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.246.40.86.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 22:02:28 CST 2025
;; MSG SIZE  rcvd: 105
Host info
86.40.246.94.in-addr.arpa domain name pointer 94-246-40.86.3p.ntebredband.no.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
86.40.246.94.in-addr.arpa	name = 94-246-40.86.3p.ntebredband.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
125.22.98.171 attackspam
Oct 11 21:08:36 eddieflores sshd\[6431\]: Invalid user 6y5t4r3e2w1q from 125.22.98.171
Oct 11 21:08:36 eddieflores sshd\[6431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.22.98.171
Oct 11 21:08:38 eddieflores sshd\[6431\]: Failed password for invalid user 6y5t4r3e2w1q from 125.22.98.171 port 37498 ssh2
Oct 11 21:13:34 eddieflores sshd\[6904\]: Invalid user P@ssword123!@\# from 125.22.98.171
Oct 11 21:13:34 eddieflores sshd\[6904\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.22.98.171
2019-10-12 15:26:47
118.24.23.216 attackbots
Oct 12 09:43:56 OPSO sshd\[7769\]: Invalid user contrasena1@ from 118.24.23.216 port 42936
Oct 12 09:43:56 OPSO sshd\[7769\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.23.216
Oct 12 09:43:58 OPSO sshd\[7769\]: Failed password for invalid user contrasena1@ from 118.24.23.216 port 42936 ssh2
Oct 12 09:48:25 OPSO sshd\[8530\]: Invalid user Apple@123 from 118.24.23.216 port 44686
Oct 12 09:48:25 OPSO sshd\[8530\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.23.216
2019-10-12 16:04:59
222.186.30.76 attackbots
Oct 12 09:37:18 andromeda sshd\[1041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.76  user=root
Oct 12 09:37:19 andromeda sshd\[1043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.76  user=root
Oct 12 09:37:20 andromeda sshd\[1041\]: Failed password for root from 222.186.30.76 port 44764 ssh2
2019-10-12 15:38:35
104.248.205.67 attackspam
Oct 12 07:52:50 www_kotimaassa_fi sshd[23764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.205.67
Oct 12 07:52:52 www_kotimaassa_fi sshd[23764]: Failed password for invalid user @#$wersdfXCV from 104.248.205.67 port 44532 ssh2
...
2019-10-12 16:00:44
222.186.173.180 attack
Oct 12 09:35:03 root sshd[24627]: Failed password for root from 222.186.173.180 port 34310 ssh2
Oct 12 09:35:08 root sshd[24627]: Failed password for root from 222.186.173.180 port 34310 ssh2
Oct 12 09:35:14 root sshd[24627]: Failed password for root from 222.186.173.180 port 34310 ssh2
Oct 12 09:35:22 root sshd[24627]: Failed password for root from 222.186.173.180 port 34310 ssh2
...
2019-10-12 15:42:36
106.12.77.73 attackbotsspam
Oct 12 03:32:32 plusreed sshd[30847]: Invalid user 123 from 106.12.77.73
...
2019-10-12 15:46:57
58.254.132.156 attack
Oct 12 07:24:36 localhost sshd\[90752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.254.132.156  user=root
Oct 12 07:24:38 localhost sshd\[90752\]: Failed password for root from 58.254.132.156 port 59939 ssh2
Oct 12 07:29:44 localhost sshd\[90928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.254.132.156  user=root
Oct 12 07:29:47 localhost sshd\[90928\]: Failed password for root from 58.254.132.156 port 59945 ssh2
Oct 12 07:34:51 localhost sshd\[91082\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.254.132.156  user=root
...
2019-10-12 15:50:29
184.168.27.66 attackspam
SCHUETZENMUSIKANTEN.DE 184.168.27.66 \[12/Oct/2019:08:02:32 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4271 "-" "Mozilla/5.0 \(Windows NT 10.0\; Win64\; x64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/60.0.3112.113 Safari/537.36"
schuetzenmusikanten.de 184.168.27.66 \[12/Oct/2019:08:02:32 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4271 "-" "Mozilla/5.0 \(Windows NT 10.0\; Win64\; x64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/60.0.3112.113 Safari/537.36"
2019-10-12 15:40:45
46.105.244.17 attackbotsspam
Oct 11 21:44:40 tdfoods sshd\[23958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.244.17  user=root
Oct 11 21:44:42 tdfoods sshd\[23958\]: Failed password for root from 46.105.244.17 port 58842 ssh2
Oct 11 21:49:03 tdfoods sshd\[24307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.244.17  user=root
Oct 11 21:49:05 tdfoods sshd\[24307\]: Failed password for root from 46.105.244.17 port 42726 ssh2
Oct 11 21:53:25 tdfoods sshd\[24665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.244.17  user=root
2019-10-12 15:55:11
164.132.195.231 attackbotsspam
kidness.family 164.132.195.231 \[12/Oct/2019:08:34:27 +0200\] "POST /wp-login.php HTTP/1.1" 200 5615 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
kidness.family 164.132.195.231 \[12/Oct/2019:08:34:27 +0200\] "POST /wp-login.php HTTP/1.1" 200 5569 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-10-12 16:01:10
203.125.145.58 attackbotsspam
Oct  5 06:31:27 xb3 sshd[20926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.125.145.58  user=r.r
Oct  5 06:31:29 xb3 sshd[20926]: Failed password for r.r from 203.125.145.58 port 45898 ssh2
Oct  5 06:31:29 xb3 sshd[20926]: Received disconnect from 203.125.145.58: 11: Bye Bye [preauth]
Oct  5 06:36:06 xb3 sshd[21157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.125.145.58  user=r.r
Oct  5 06:36:08 xb3 sshd[21157]: Failed password for r.r from 203.125.145.58 port 58332 ssh2
Oct  5 06:36:08 xb3 sshd[21157]: Received disconnect from 203.125.145.58: 11: Bye Bye [preauth]
Oct  5 06:40:48 xb3 sshd[21413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.125.145.58  user=r.r
Oct  5 06:40:50 xb3 sshd[21413]: Failed password for r.r from 203.125.145.58 port 42540 ssh2
Oct  5 06:40:50 xb3 sshd[21413]: Received disconnect from 203.125.145.58: 1........
-------------------------------
2019-10-12 15:52:13
49.235.65.48 attackspambots
Oct  7 10:23:14 mxgate1 sshd[7078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.65.48  user=r.r
Oct  7 10:23:16 mxgate1 sshd[7078]: Failed password for r.r from 49.235.65.48 port 56632 ssh2
Oct  7 10:23:17 mxgate1 sshd[7078]: Received disconnect from 49.235.65.48 port 56632:11: Bye Bye [preauth]
Oct  7 10:23:17 mxgate1 sshd[7078]: Disconnected from 49.235.65.48 port 56632 [preauth]
Oct  7 10:42:57 mxgate1 sshd[8386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.65.48  user=r.r
Oct  7 10:42:59 mxgate1 sshd[8386]: Failed password for r.r from 49.235.65.48 port 35468 ssh2
Oct  7 10:43:00 mxgate1 sshd[8386]: Received disconnect from 49.235.65.48 port 35468:11: Bye Bye [preauth]
Oct  7 10:43:00 mxgate1 sshd[8386]: Disconnected from 49.235.65.48 port 35468 [preauth]
Oct  7 10:46:52 mxgate1 sshd[8693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh r........
-------------------------------
2019-10-12 15:42:22
54.37.233.192 attack
Oct 12 05:55:32 localhost sshd\[2442\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.233.192  user=root
Oct 12 05:55:34 localhost sshd\[2442\]: Failed password for root from 54.37.233.192 port 53882 ssh2
Oct 12 06:02:11 localhost sshd\[2562\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.233.192  user=root
...
2019-10-12 15:54:16
68.45.62.109 attackbots
Oct 12 07:24:44 localhost sshd\[90759\]: Invalid user Toys@2017 from 68.45.62.109 port 43538
Oct 12 07:24:44 localhost sshd\[90759\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.45.62.109
Oct 12 07:24:46 localhost sshd\[90759\]: Failed password for invalid user Toys@2017 from 68.45.62.109 port 43538 ssh2
Oct 12 07:29:05 localhost sshd\[90899\]: Invalid user EDCrfv from 68.45.62.109 port 54410
Oct 12 07:29:05 localhost sshd\[90899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.45.62.109
...
2019-10-12 15:30:14
2.234.219.120 attackspambots
%3f
2019-10-12 15:30:01

Recently Reported IPs

94.33.246.161 184.98.193.17 28.47.115.210 195.82.52.16
169.77.97.1 151.156.17.243 88.141.82.10 195.69.35.26
54.151.180.243 45.126.60.58 216.148.235.249 154.244.138.41
96.165.115.232 87.85.113.160 193.154.201.56 172.232.119.88
145.185.41.241 4.149.144.4 127.247.216.91 248.124.101.84