Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Zalău

Region: Salaj

Country: Romania

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.52.212.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52804
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.52.212.164.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 13:02:31 CST 2025
;; MSG SIZE  rcvd: 106
Host info
164.212.52.94.in-addr.arpa domain name pointer 94-52-212-164.next-gen.ro.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
164.212.52.94.in-addr.arpa	name = 94-52-212-164.next-gen.ro.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
196.188.192.141 attack
Unauthorized connection attempt from IP address 196.188.192.141 on Port 445(SMB)
2019-12-27 07:26:47
139.199.113.140 attackspambots
Dec 27 02:01:40 server sshd\[9494\]: Invalid user sonoyama from 139.199.113.140
Dec 27 02:01:40 server sshd\[9494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.113.140 
Dec 27 02:01:41 server sshd\[9494\]: Failed password for invalid user sonoyama from 139.199.113.140 port 44750 ssh2
Dec 27 02:19:32 server sshd\[12790\]: Invalid user admin from 139.199.113.140
Dec 27 02:19:32 server sshd\[12790\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.113.140 
...
2019-12-27 07:57:34
151.234.143.166 attack
DATE:2019-12-26 23:45:13, IP:151.234.143.166, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-12-27 08:00:17
54.193.122.246 attack
SSH-bruteforce attempts
2019-12-27 07:56:21
131.221.131.104 attackspambots
Unauthorized connection attempt from IP address 131.221.131.104 on Port 445(SMB)
2019-12-27 07:55:03
186.35.200.216 attackbots
PHI,WP GET /wp-login.php
2019-12-27 07:33:26
178.128.81.60 attackspambots
Invalid user khian from 178.128.81.60 port 33830
2019-12-27 08:03:58
222.186.175.161 attackspambots
2019-12-27T00:33:49.335543ns386461 sshd\[25182\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.161  user=root
2019-12-27T00:33:51.230556ns386461 sshd\[25182\]: Failed password for root from 222.186.175.161 port 47086 ssh2
2019-12-27T00:33:54.082486ns386461 sshd\[25182\]: Failed password for root from 222.186.175.161 port 47086 ssh2
2019-12-27T00:33:57.346560ns386461 sshd\[25182\]: Failed password for root from 222.186.175.161 port 47086 ssh2
2019-12-27T00:34:00.690583ns386461 sshd\[25182\]: Failed password for root from 222.186.175.161 port 47086 ssh2
...
2019-12-27 07:44:48
187.190.154.217 attackspambots
Unauthorized connection attempt from IP address 187.190.154.217 on Port 445(SMB)
2019-12-27 07:27:36
67.252.252.12 attackspam
Unauthorized connection attempt from IP address 67.252.252.12 on Port 445(SMB)
2019-12-27 07:25:47
144.217.47.174 attackbots
Invalid user carette from 144.217.47.174 port 41333
2019-12-27 07:33:46
5.88.168.246 attackspam
Automatic report - SSH Brute-Force Attack
2019-12-27 07:41:04
194.145.209.202 attack
194.145.209.202:44820 - - [25/Dec/2019:18:36:39 +0100] "GET /web/wp-login.php HTTP/1.1" 404 301
2019-12-27 07:39:54
114.4.131.227 attackspambots
12/26/2019-17:53:24.536984 114.4.131.227 Protocol: 6 ET SCAN Potential SSH Scan
2019-12-27 07:52:42
54.39.147.2 attackspam
(sshd) Failed SSH login from 54.39.147.2 (CA/Canada/Quebec/Montreal/2.ip-54-39-147.net/[AS16276 OVH SAS]): 1 in the last 3600 secs
2019-12-27 07:30:27

Recently Reported IPs

165.195.28.105 76.159.172.236 114.146.117.141 201.11.9.22
220.129.55.27 50.58.179.85 223.29.44.15 82.147.134.113
133.70.77.116 240.118.157.98 140.90.72.235 180.143.118.228
33.233.194.206 31.21.237.171 214.10.67.113 50.90.177.181
167.43.32.174 42.199.79.14 32.148.42.246 252.34.171.100