Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kyiv

Region: Kyyiv

Country: Ukraine

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.45.138.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18450
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.45.138.22.			IN	A

;; AUTHORITY SECTION:
.			358	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060501 1800 900 604800 86400

;; Query time: 49 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 06 09:58:00 CST 2024
;; MSG SIZE  rcvd: 105
Host info
22.138.45.94.in-addr.arpa domain name pointer mail.stlgroup.com.ua.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
22.138.45.94.in-addr.arpa	name = mail.stlgroup.com.ua.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
203.189.253.243 attackbots
Mar 28 07:27:53 [host] sshd[14495]: Invalid user q
Mar 28 07:27:53 [host] sshd[14495]: pam_unix(sshd:
Mar 28 07:27:55 [host] sshd[14495]: Failed passwor
2020-03-28 14:34:02
216.198.188.26 attackbotsspam
DATE:2020-03-28 04:48:36, IP:216.198.188.26, PORT:5900 VNC brute force auth on honeypot server (epe-honey1-hq)
2020-03-28 14:19:58
129.204.125.51 attackbotsspam
Invalid user magenta from 129.204.125.51 port 38366
2020-03-28 14:27:00
192.144.161.40 attack
Brute-force attempt banned
2020-03-28 14:28:07
5.196.38.15 attack
Invalid user saed3 from 5.196.38.15 port 34614
2020-03-28 14:08:46
37.71.22.82 attackspam
*Port Scan* detected from 37.71.22.82 (FR/France/82.22.71.37.rev.sfr.net). 4 hits in the last 135 seconds
2020-03-28 14:27:31
49.51.160.139 attack
Invalid user user from 49.51.160.139 port 43300
2020-03-28 14:02:24
182.43.165.158 attack
Mar 28 05:52:03 powerpi2 sshd[12320]: Invalid user test from 182.43.165.158 port 57024
Mar 28 05:52:05 powerpi2 sshd[12320]: Failed password for invalid user test from 182.43.165.158 port 57024 ssh2
Mar 28 05:54:49 powerpi2 sshd[12456]: Invalid user lqi from 182.43.165.158 port 35654
...
2020-03-28 14:09:40
130.61.121.78 attack
fail2ban
2020-03-28 14:32:16
45.125.65.35 attack
Mar 28 06:59:16 srv01 postfix/smtpd[26282]: warning: unknown[45.125.65.35]: SASL LOGIN authentication failed: authentication failure
Mar 28 06:59:38 srv01 postfix/smtpd[26282]: warning: unknown[45.125.65.35]: SASL LOGIN authentication failed: authentication failure
Mar 28 07:08:11 srv01 postfix/smtpd[26757]: warning: unknown[45.125.65.35]: SASL LOGIN authentication failed: authentication failure
...
2020-03-28 14:16:52
139.199.122.210 attackbotsspam
Mar 28 04:52:31  sshd\[7919\]: Invalid user acs from 139.199.122.210Mar 28 04:52:33  sshd\[7919\]: Failed password for invalid user acs from 139.199.122.210 port 50820 ssh2
...
2020-03-28 14:23:27
196.52.43.62 attackbotsspam
03/28/2020-02:37:38.369642 196.52.43.62 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-03-28 14:41:34
157.245.104.96 attackbots
Invalid user test from 157.245.104.96 port 32920
2020-03-28 14:05:08
111.229.78.199 attackbotsspam
Invalid user haruki from 111.229.78.199 port 34368
2020-03-28 14:09:09
183.167.211.135 attack
Mar 28 05:52:31 * sshd[15593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.167.211.135
Mar 28 05:52:33 * sshd[15593]: Failed password for invalid user cpanel from 183.167.211.135 port 46478 ssh2
2020-03-28 14:26:27

Recently Reported IPs

47.126.105.14 56.186.107.248 136.110.116.14 126.81.207.254
55.139.102.191 241.88.151.252 138.240.44.44 198.181.144.73
216.91.175.7 207.43.36.187 62.222.4.48 104.102.100.139
102.82.105.248 220.25.211.127 194.73.178.85 66.63.167.121
20.96.193.136 177.17.69.251 75.238.254.91 208.200.140.101