Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Leeds

Region: England

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.4.112.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45782
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;94.4.112.138.			IN	A

;; AUTHORITY SECTION:
.			140	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020092101 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Sep 22 09:26:35 CST 2020
;; MSG SIZE  rcvd: 116
Host info
138.112.4.94.in-addr.arpa domain name pointer 5e04708a.bb.isp.sky.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.112.4.94.in-addr.arpa	name = 5e04708a.bb.isp.sky.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
101.99.3.106 attackspam
unauthorized connection attempt
2020-02-19 13:13:50
180.241.170.190 attackspambots
unauthorized connection attempt
2020-02-19 13:05:40
51.254.49.107 attackbotsspam
unauthorized connection attempt
2020-02-19 13:35:46
222.136.73.57 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-19 13:00:17
176.117.192.41 attack
Honeypot attack, port: 5555, PTR: PTR record not found
2020-02-19 13:27:41
91.134.185.95 attackbots
unauthorized connection attempt
2020-02-19 13:22:26
78.84.232.230 attackbots
unauthorized connection attempt
2020-02-19 13:35:25
157.245.202.159 attackbotsspam
Feb 18 18:53:32 sachi sshd\[4060\]: Invalid user nx from 157.245.202.159
Feb 18 18:53:32 sachi sshd\[4060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.202.159
Feb 18 18:53:34 sachi sshd\[4060\]: Failed password for invalid user nx from 157.245.202.159 port 36732 ssh2
Feb 18 18:57:00 sachi sshd\[4403\]: Invalid user ftpuser from 157.245.202.159
Feb 18 18:57:00 sachi sshd\[4403\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.202.159
2020-02-19 13:02:11
222.136.237.217 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-19 13:24:57
212.225.189.221 attackbotsspam
unauthorized connection attempt
2020-02-19 13:04:30
49.213.194.105 attackspam
unauthorized connection attempt
2020-02-19 13:36:18
221.124.36.57 attackbotsspam
unauthorized connection attempt
2020-02-19 13:25:44
184.154.47.2 attack
unauthorized connection attempt
2020-02-19 13:05:06
186.139.225.242 attack
unauthorized connection attempt
2020-02-19 13:08:10
71.6.147.254 attackbotsspam
02/18/2020-23:56:59.089746 71.6.147.254 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 71
2020-02-19 13:14:46

Recently Reported IPs

68.46.97.154 92.241.140.80 198.17.110.249 109.7.3.214
220.194.238.37 171.252.39.139 73.90.108.191 106.217.8.182
65.55.2.216 54.253.48.55 126.186.199.180 177.195.140.158
137.99.208.255 220.81.119.145 121.177.48.159 154.128.21.178
177.232.9.167 13.76.170.31 122.13.165.196 164.10.38.144