Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Świętochłowice

Region: Slaskie

Country: Poland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.40.187.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62988
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.40.187.52.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025051801 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 19 06:30:06 CST 2025
;; MSG SIZE  rcvd: 105
Host info
52.187.40.94.in-addr.arpa domain name pointer 94-40-187-52.tktelekom.pl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
52.187.40.94.in-addr.arpa	name = 94-40-187-52.tktelekom.pl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
144.217.4.14 attackbots
Jun 26 06:23:25 pornomens sshd\[19651\]: Invalid user alban from 144.217.4.14 port 56423
Jun 26 06:23:25 pornomens sshd\[19651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.4.14
Jun 26 06:23:27 pornomens sshd\[19651\]: Failed password for invalid user alban from 144.217.4.14 port 56423 ssh2
...
2019-06-26 13:28:06
61.90.172.212 attackbotsspam
firewall-block, port(s): 23/tcp
2019-06-26 14:04:40
162.144.114.179 attackbotsspam
Scanning and Vuln Attempts
2019-06-26 13:41:06
193.194.83.58 attackspambots
Unauthorized connection attempt from IP address 193.194.83.58 on Port 445(SMB)
2019-06-26 13:44:45
163.44.152.127 attackbots
Scanning and Vuln Attempts
2019-06-26 13:24:51
1.202.91.252 attack
Jun 26 03:51:10 work-partkepr sshd\[5332\]: Invalid user cisco from 1.202.91.252 port 1754
Jun 26 03:51:10 work-partkepr sshd\[5332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.202.91.252
...
2019-06-26 13:24:30
83.228.34.22 attack
2019-06-26T05:31:37Z - RDP login failed multiple times. (83.228.34.22)
2019-06-26 13:37:09
178.251.24.158 attackspambots
WordPress login Brute force / Web App Attack on client site.
2019-06-26 14:10:14
103.199.34.25 attackbots
Unauthorised access (Jun 26) SRC=103.199.34.25 LEN=48 TTL=107 ID=20086 DF TCP DPT=445 WINDOW=8192 SYN
2019-06-26 13:56:49
162.243.133.126 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-06-26 13:40:32
91.219.27.233 attack
[portscan] Port scan
2019-06-26 13:27:13
162.144.255.104 attackbots
Scanning and Vuln Attempts
2019-06-26 13:37:38
74.82.47.27 attack
firewall-block, port(s): 10001/udp
2019-06-26 14:01:11
79.155.113.88 attackbotsspam
Jun 26 06:37:04 ncomp sshd[11339]: Invalid user math from 79.155.113.88
Jun 26 06:37:04 ncomp sshd[11339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.155.113.88
Jun 26 06:37:04 ncomp sshd[11339]: Invalid user math from 79.155.113.88
Jun 26 06:37:06 ncomp sshd[11339]: Failed password for invalid user math from 79.155.113.88 port 33944 ssh2
2019-06-26 13:52:12
63.245.108.75 attackbots
26.06.2019 03:49:52 SSH access blocked by firewall
2019-06-26 14:09:26

Recently Reported IPs

185.247.137.199 133.43.40.171 197.49.167.33 148.72.23.187
68.229.23.189 103.207.37.51 113.215.188.163 251.63.182.15
35.203.211.62 60.10.195.174 107.25.44.229 195.48.247.197
240e:370:ab01:4900:5d0a:4f86:e070:b326 104.248.39.179 74.235.120.62 35.187.53.104
1.15.187.9 218.76.179.229 9.227.102.111 170.14.148.64