Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: Amanah Tech Inc.

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackspam
Chat Spam
2019-12-22 21:36:57
Comments on same subnet:
IP Type Details Datetime
104.254.92.54 attackbots
2020-08-14 22:55:00
104.254.92.218 attack
2020-08-14 22:54:45
104.254.92.54 attack
(From mcneely.ronny@yahoo.com) TRIFECTA! A novel that starches your emotional – erotic itch!
Against a background of big business, deceit, frustration, oppression drives a wide range of emotions as three generations of women from the same family, turn to the same man for emotional support and physical gratification!
A wife deceives her husband while searching for her true sexuality!
What motivates the wife’s mother and son-in-law to enter into a relationship?
The wife’s collage age daughter, with tender guidance from her step-father, achieves fulfillment!
Does this describe a dysfunctional family? Or is this unspoken social issues of modern society?
BLOCKBUSTER Opening! A foursome of two pair of lesbians playing golf. A little hanky – panky, while searching for a lost ball out of bounds. Trifecta has more turns and twist than our intestines.
Trifecta! Combination of my personal experiences and creativity.
https://bit.ly/www-popejim-com for “CLICK & VIEW” VIDEO. Send me your commits.
Available amazon,
2020-05-20 08:24:58
104.254.92.21 attackspam
(From mahalia.mcgough@hotmail.com) Looking to lose weight quickly and without doing insane amounts of exercise or changing your diet? You're gonna love this: http://bit.ly/fixbellyfateasy
2020-03-25 16:05:28
104.254.92.53 attack
(From lacey.carrigan@gmail.com) UNLIMITED fresh and high PR .edu, do-follow and other extensions ready to backlink to your site
perfect for ranking your site in any niche! Completely exclusive links and never spammed to death http://www.getmorelinks.xyz
2020-02-25 13:57:51
104.254.92.22 attack
(From boyette.marissa@gmail.com) Are you feeling stuck personally or professionally?
As a professional coach, 
I have the tools to help you find solutions.

Send me an email. Kozik@mbkcoaching.com
Free 30-minute initial session!


Majority of individuals are living their lives on autopilot, running from one thing to the next, without giving much thought about the true meaning and purpose for their life.  

“Having trained and mentored thousands of professionals throughout her 25 years as a high-level executive, Mary’s passion and purpose, as a Certified Coach, is to walk along side you to help you realize your dreams to live a life of fulfillment and success.”
CEO of Major Healthcare System


As your Personal Coach, I will:

•Take you from where you are to where you want to be 
•Guide you to figure out where you want to go

•Help you discover what is really important to you

•Hold you accountable for optimal success and fulfillment 
•Increase your self-awareness and confidence
•Expand t
2020-02-16 05:45:03
104.254.92.242 attackspambots
(From coats.weldon@yahoo.com) Would you like to submit your advertisement on 1000's of Advertising sites every month? One tiny investment every month will get you virtually unlimited traffic to your site forever! To find out more check out our site here: http://www.adsonautopilot.xyz
2020-01-24 02:04:30
104.254.92.218 attack
0,64-01/00 [bc00/m64] PostRequest-Spammer scoring: madrid
2020-01-23 18:40:18
104.254.92.21 attack
(From bianca.baer@gmail.com) Just 1 cup of this tomorrow morning will get rid of 30 Lbs of belly fat

If you haven’t tried this yet, you'll want to to add this to your morning routine
Consuming just a single cup of this delicious hot beverage in the A.M. sets up your metabolism to burn more fat than 55 exhausting minutes on the treadmill.

In fact, some folks are losing up to 20 pounds of fat in just 20 days by drinking it daily every morning.

Not to mention, it’s really simple to make right in your own kitchen. 

Have a look at my site for more info:  http://www.fatbellyfix.xyz
2020-01-17 15:08:25
104.254.92.230 attackspam
104.254.92.230 - - [26/Dec/2019:15:50:04 +0200] "GET /nmaplowercheck1177248208 HTTP/1.1" 404 196 "-" "Mozilla/5.0 (compatible; Nmap Scripting Engine; https://nmap.org/book/nse.html)"
104.254.92.230 - - [26/Dec/2019:15:50:04 +0200] "POST /sdk HTTP/1.1" 404 196 "-" "Mozilla/5.0 (compatible; Nmap Scripting Engine; https://nmap.org/book/nse.html)"
104.254.92.230 - - [26/Dec/2019:15:50:04 +0200] "GET /HNAP1 HTTP/1.1" 404 196 "-" "Mozilla/5.0 (compatible; Nmap Scripting Engine; https://nmap.org/book/nse.html)"
104.254.92.230 - - [26/Dec/2019:15:50:04 +0200] "GET /evox/about HTTP/1.1" 404 196 "-" "Mozilla/5.0 (compatible; Nmap Scripting Engine; https://nmap.org/book/nse.html)"
2019-12-27 02:59:58
104.254.92.59 attackspambots
2019-12-17T15:44:41.023467scmdmz1 sshd[1002]: Invalid user gilburt from 104.254.92.59 port 39076
2019-12-17T15:44:41.026332scmdmz1 sshd[1002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.254.92.59
2019-12-17T15:44:41.023467scmdmz1 sshd[1002]: Invalid user gilburt from 104.254.92.59 port 39076
2019-12-17T15:44:43.206561scmdmz1 sshd[1002]: Failed password for invalid user gilburt from 104.254.92.59 port 39076 ssh2
2019-12-17T15:54:02.952007scmdmz1 sshd[2125]: Invalid user jira from 104.254.92.59 port 47952
...
2019-12-17 23:06:52
104.254.92.22 attackbotsspam
(From toni.milerum@gmail.com) Do you want to promote your business on tons of online ad sites monthly? One tiny investment every month will get you virtually endless traffic to your site forever!To find out more check out our site here: http://www.submitmyadnow.tech
2019-12-13 01:00:20
104.254.92.22 attackbotsspam
Wednesday, December 11, 2019 1:16 AM Received From: 104.254.92.22 From: Noah leo6866tay@gmail.com SEO form spam bot
2019-12-11 19:35:13
104.254.92.242 attack
(From huxham.leila@gmail.com) Are You interested in advertising that charges less than $40 monthly and sends tons of people who are ready to buy directly to your website? Reply to: walter3519rob@gmail.com to get more info.
2019-12-06 09:36:15
104.254.92.21 attackspam
(From chadwick.julius@yahoo.com) Would you like to promote your ad on over 1000 ad sites every month? One tiny investment every month will get you virtually unlimited traffic to your site forever! Check out our site for details: http://www.adspostedonthousandsofsites.xyz
2019-11-30 23:32:30
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.254.92.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31414
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.254.92.42.			IN	A

;; AUTHORITY SECTION:
.			544	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019122200 1800 900 604800 86400

;; Query time: 110 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 22 21:36:49 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 42.92.254.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.92.254.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
155.94.254.112 attackbotsspam
Dec  8 07:19:26 uapps sshd[11106]: Address 155.94.254.112 maps to lick1.sb-z.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Dec  8 07:19:28 uapps sshd[11106]: Failed password for invalid user ching from 155.94.254.112 port 60806 ssh2
Dec  8 07:19:28 uapps sshd[11106]: Received disconnect from 155.94.254.112: 11: Bye Bye [preauth]
Dec  8 07:28:38 uapps sshd[11253]: Address 155.94.254.112 maps to lick1.sb-z.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Dec  8 07:28:39 uapps sshd[11253]: Failed password for invalid user bivolaru from 155.94.254.112 port 40690 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=155.94.254.112
2019-12-08 14:43:41
217.160.44.145 attack
Dec  8 07:24:38 MK-Soft-VM3 sshd[4798]: Failed password for root from 217.160.44.145 port 53176 ssh2
...
2019-12-08 14:40:48
36.70.227.235 attack
port scan and connect, tcp 1433 (ms-sql-s)
2019-12-08 14:59:41
139.59.8.186 attackspambots
fail2ban honeypot
2019-12-08 14:44:45
5.132.115.161 attackbotsspam
Dec  8 07:50:14 vpn01 sshd[23048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.132.115.161
Dec  8 07:50:16 vpn01 sshd[23048]: Failed password for invalid user smmsp from 5.132.115.161 port 47586 ssh2
...
2019-12-08 14:54:55
24.228.253.171 attackbots
firewall-block, port(s): 5555/tcp
2019-12-08 15:00:13
144.217.161.78 attackspambots
Dec  7 23:29:23 home sshd[30210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.161.78  user=root
Dec  7 23:29:25 home sshd[30210]: Failed password for root from 144.217.161.78 port 60340 ssh2
Dec  7 23:41:33 home sshd[30307]: Invalid user 9iis from 144.217.161.78 port 55280
Dec  7 23:41:33 home sshd[30307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.161.78
Dec  7 23:41:33 home sshd[30307]: Invalid user 9iis from 144.217.161.78 port 55280
Dec  7 23:41:35 home sshd[30307]: Failed password for invalid user 9iis from 144.217.161.78 port 55280 ssh2
Dec  7 23:46:51 home sshd[30360]: Invalid user fredrikson from 144.217.161.78 port 36210
Dec  7 23:46:51 home sshd[30360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.161.78
Dec  7 23:46:51 home sshd[30360]: Invalid user fredrikson from 144.217.161.78 port 36210
Dec  7 23:46:53 home sshd[30360]: Failed password for i
2019-12-08 15:06:52
106.111.118.101 attack
SpamReport
2019-12-08 14:57:15
218.92.0.137 attack
IP blocked
2019-12-08 14:27:18
111.200.168.53 attackbots
Dec  8 07:30:03 ns3367391 proftpd[25360]: 127.0.0.1 (111.200.168.53[111.200.168.53]) - USER anonymous: no such user found from 111.200.168.53 [111.200.168.53] to 37.187.78.186:21
Dec  8 07:30:06 ns3367391 proftpd[25381]: 127.0.0.1 (111.200.168.53[111.200.168.53]) - USER yourdailypornvideos: no such user found from 111.200.168.53 [111.200.168.53] to 37.187.78.186:21
...
2019-12-08 14:50:44
104.211.216.173 attack
Dec  8 08:07:28 sd-53420 sshd\[30727\]: User bin from 104.211.216.173 not allowed because none of user's groups are listed in AllowGroups
Dec  8 08:07:28 sd-53420 sshd\[30727\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.216.173  user=bin
Dec  8 08:07:29 sd-53420 sshd\[30727\]: Failed password for invalid user bin from 104.211.216.173 port 42562 ssh2
Dec  8 08:13:58 sd-53420 sshd\[31939\]: Invalid user gtk from 104.211.216.173
Dec  8 08:13:58 sd-53420 sshd\[31939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.216.173
...
2019-12-08 15:14:30
173.249.53.185 attackbotsspam
"PROTOCOL-VOIP SIP URI bloque call header=From:any@xxxxx.com&xxxxx_IP_or_To:E.164@xxxxx.com&xxxxx_IP"
2019-12-08 14:51:33
196.218.164.114 attack
firewall-block, port(s): 445/tcp
2019-12-08 15:01:19
121.233.94.15 attackbotsspam
SpamReport
2019-12-08 14:50:19
218.25.130.220 attack
2019-12-08T07:04:22.387585abusebot-8.cloudsearch.cf sshd\[864\]: Invalid user www from 218.25.130.220 port 49717
2019-12-08 15:12:03

Recently Reported IPs

82.212.101.245 18.81.107.242 117.84.156.175 15.131.30.20
246.192.105.1 219.142.47.114 103.120.178.174 181.185.187.203
111.26.31.50 113.139.123.145 62.240.15.138 115.204.113.93
223.166.128.176 140.206.251.96 27.74.251.18 112.54.98.70
192.144.230.188 44.202.234.105 83.208.253.119 78.95.100.116