Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Stockholm

Region: Stockholm County

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.255.242.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14178
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.255.242.214.			IN	A

;; AUTHORITY SECTION:
.			402	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032102 1800 900 604800 86400

;; Query time: 74 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 22 19:34:33 CST 2022
;; MSG SIZE  rcvd: 107
Host info
214.242.255.94.in-addr.arpa domain name pointer 94-255-242-214.cust.bredband2.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
214.242.255.94.in-addr.arpa	name = 94-255-242-214.cust.bredband2.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
89.183.5.234 attackspambots
 TCP (SYN) 89.183.5.234:55704 -> port 22, len 44
2020-07-20 20:19:30
91.144.173.197 attackbots
Jul 20 15:31:19 hosting sshd[9269]: Invalid user alex from 91.144.173.197 port 33834
...
2020-07-20 20:43:05
210.1.19.131 attack
Invalid user abcd from 210.1.19.131 port 46499
2020-07-20 20:20:39
64.183.168.162 attackspam
Jul 20 05:24:41 h2022099 sshd[32377]: Invalid user admin from 64.183.168.162
Jul 20 05:24:41 h2022099 sshd[32377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=rrcs-64-183-168-162.west.biz.rr.com 
Jul 20 05:24:44 h2022099 sshd[32377]: Failed password for invalid user admin from 64.183.168.162 port 54325 ssh2
Jul 20 05:24:44 h2022099 sshd[32377]: Received disconnect from 64.183.168.162: 11: Bye Bye [preauth]
Jul 20 05:24:45 h2022099 sshd[32381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=rrcs-64-183-168-162.west.biz.rr.com  user=r.r
Jul 20 05:24:47 h2022099 sshd[32381]: Failed password for r.r from 64.183.168.162 port 54522 ssh2
Jul 20 05:24:47 h2022099 sshd[32381]: Received disconnect from 64.183.168.162: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=64.183.168.162
2020-07-20 20:17:52
91.229.219.27 attackspam
Email rejected due to spam filtering
2020-07-20 20:44:59
58.20.27.142 attack
Jul 20 12:34:21 web sshd[46275]: Invalid user elba from 58.20.27.142 port 2111
Jul 20 12:34:23 web sshd[46275]: Failed password for invalid user elba from 58.20.27.142 port 2111 ssh2
Jul 20 13:02:09 web sshd[46346]: Invalid user ubadmin from 58.20.27.142 port 2112
...
2020-07-20 20:12:39
129.211.22.160 attack
Jul 20 11:52:00 saturn sshd[558968]: Invalid user new from 129.211.22.160 port 40342
Jul 20 11:52:02 saturn sshd[558968]: Failed password for invalid user new from 129.211.22.160 port 40342 ssh2
Jul 20 12:10:10 saturn sshd[559620]: Invalid user leandro from 129.211.22.160 port 41022
...
2020-07-20 20:16:44
35.187.38.86 attackbotsspam
Jul 20 12:22:40 ovpn sshd\[28145\]: Invalid user condor from 35.187.38.86
Jul 20 12:22:40 ovpn sshd\[28145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.187.38.86
Jul 20 12:22:43 ovpn sshd\[28145\]: Failed password for invalid user condor from 35.187.38.86 port 42614 ssh2
Jul 20 12:28:35 ovpn sshd\[29532\]: Invalid user git from 35.187.38.86
Jul 20 12:28:35 ovpn sshd\[29532\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.187.38.86
2020-07-20 20:22:40
85.62.36.43 attackbots
Unauthorized connection attempt from IP address 85.62.36.43 on Port 445(SMB)
2020-07-20 20:45:33
160.153.154.4 attack
Automatic report - Banned IP Access
2020-07-20 20:16:23
161.35.77.82 attackspambots
Jul 20 14:31:20 fhem-rasp sshd[29759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.77.82
Jul 20 14:31:22 fhem-rasp sshd[29759]: Failed password for invalid user admin from 161.35.77.82 port 54416 ssh2
...
2020-07-20 20:38:35
45.66.35.35 attackspam
hacking
2020-07-20 20:52:09
156.196.235.30 attackspambots
SSH login attempts brute force.
2020-07-20 20:34:56
148.70.149.39 attackspambots
" "
2020-07-20 20:44:37
106.54.91.157 attack
$f2bV_matches
2020-07-20 20:51:36

Recently Reported IPs

37.250.44.125 154.197.181.140 65.239.144.2 185.84.89.9
64.213.76.126 124.56.243.0 92.164.66.136 86.231.205.29
136.155.53.34 204.88.51.54 36.92.79.152 29.251.209.64
203.238.162.178 178.197.249.31 140.149.247.127 254.9.171.250
116.101.134.43 132.224.249.46 246.154.78.107 185.22.100.0