Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation

Internet Service Provider: JSC ER-Telecom Holding

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspam
suspicious action Thu, 12 Mar 2020 09:27:59 -0300
2020-03-13 04:53:45
attack
Automatic report - Banned IP Access
2019-11-11 14:14:29
attackbots
Nov 10 23:47:34 cavern sshd[1990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.194.54.130
2019-11-11 07:10:12
attack
Automatic report - Banned IP Access
2019-11-01 00:36:00
attack
Invalid user oracle from 109.194.54.130 port 45752
2019-10-27 19:34:50
attackbots
Invalid user oracle from 109.194.54.130 port 45752
2019-10-24 23:52:43
attackbotsspam
Oct 16 23:32:57 icinga sshd[8279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.194.54.130
Oct 16 23:32:59 icinga sshd[8279]: Failed password for invalid user login from 109.194.54.130 port 50502 ssh2
...
2019-10-17 05:54:25
attackspam
Oct 16 15:59:29 lnxweb62 sshd[31899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.194.54.130
2019-10-17 00:14:30
attackbotsspam
SSH authentication failure x 6 reported by Fail2Ban
...
2019-10-14 06:54:03
Comments on same subnet:
IP Type Details Datetime
109.194.54.94 attack
Many many attempts RDP protocol !!!!!!
2020-05-14 21:13:12
109.194.54.94 attack
Many RDP attempts : 4 packets 62Bytes 13/05/2020 16:18:44:426 sniffing :

00000000 03 00 00 2B 26 E0 00 00 00 00 00 43 6F 6F 6B 69 ...+&... ...Cooki
00000010 65 3A 20 6D 73 74 73 68 61 73 68 3D 68 65 6C 6C e: mstsh ash=hell
00000020 6F 0D 0A 01 00 08 00 03 00 00 00 o....... ...

00000000 03 00 00 13 0E D0 00 00 12 34 00 03 00 08 00 02 ........ .4......
00000010 00 00 00 ...
2020-05-13 22:51:38
109.194.54.126 attackbotsspam
"Unauthorized connection attempt on SSHD detected"
2020-04-12 13:20:47
109.194.54.126 attackspambots
Apr  7 23:42:13 OPSO sshd\[13612\]: Invalid user sqoop from 109.194.54.126 port 40922
Apr  7 23:42:13 OPSO sshd\[13612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.194.54.126
Apr  7 23:42:15 OPSO sshd\[13612\]: Failed password for invalid user sqoop from 109.194.54.126 port 40922 ssh2
Apr  7 23:46:02 OPSO sshd\[14330\]: Invalid user contact from 109.194.54.126 port 48594
Apr  7 23:46:02 OPSO sshd\[14330\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.194.54.126
2020-04-08 06:15:11
109.194.54.126 attackspambots
SSH brute-force attempt
2020-04-05 05:43:56
109.194.54.126 attack
Apr  2 05:56:25 ns392434 sshd[12573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.194.54.126  user=root
Apr  2 05:56:26 ns392434 sshd[12573]: Failed password for root from 109.194.54.126 port 46420 ssh2
Apr  2 06:03:20 ns392434 sshd[13155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.194.54.126  user=root
Apr  2 06:03:21 ns392434 sshd[13155]: Failed password for root from 109.194.54.126 port 59822 ssh2
Apr  2 06:07:01 ns392434 sshd[13463]: Invalid user ll from 109.194.54.126 port 41834
Apr  2 06:07:01 ns392434 sshd[13463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.194.54.126
Apr  2 06:07:01 ns392434 sshd[13463]: Invalid user ll from 109.194.54.126 port 41834
Apr  2 06:07:03 ns392434 sshd[13463]: Failed password for invalid user ll from 109.194.54.126 port 41834 ssh2
Apr  2 06:10:37 ns392434 sshd[13855]: Invalid user ll from 109.194.54.126 port 52082
2020-04-02 13:55:35
109.194.54.126 attackbotsspam
$f2bV_matches
2020-03-30 19:34:59
109.194.54.126 attackspambots
Mar 28 07:43:24 * sshd[29624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.194.54.126
Mar 28 07:43:25 * sshd[29624]: Failed password for invalid user kxa from 109.194.54.126 port 50582 ssh2
2020-03-28 14:59:10
109.194.54.126 attackspambots
Mar 26 11:17:08 icinga sshd[44355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.194.54.126 
Mar 26 11:17:10 icinga sshd[44355]: Failed password for invalid user its from 109.194.54.126 port 36292 ssh2
Mar 26 11:24:23 icinga sshd[55975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.194.54.126 
...
2020-03-26 18:54:16
109.194.54.126 attack
Ssh brute force
2020-03-21 10:11:32
109.194.54.126 attackspambots
Mar 19 23:44:07 localhost sshd\[16751\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.194.54.126  user=root
Mar 19 23:44:09 localhost sshd\[16751\]: Failed password for root from 109.194.54.126 port 58738 ssh2
Mar 19 23:51:02 localhost sshd\[17405\]: Invalid user haoxiaoyang from 109.194.54.126 port 50638
Mar 19 23:51:02 localhost sshd\[17405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.194.54.126
2020-03-20 07:05:28
109.194.54.126 attack
Mar 18 05:38:52 ws19vmsma01 sshd[5122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.194.54.126
Mar 18 05:38:54 ws19vmsma01 sshd[5122]: Failed password for invalid user lizehan from 109.194.54.126 port 42496 ssh2
...
2020-03-18 19:37:24
109.194.54.126 attackspam
<6 unauthorized SSH connections
2020-03-13 15:11:30
109.194.54.126 attack
$f2bV_matches
2020-03-11 09:32:19
109.194.54.126 attackbots
Invalid user rohrmann from 109.194.54.126 port 45566
2020-02-15 07:19:36
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.194.54.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27483
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;109.194.54.130.			IN	A

;; AUTHORITY SECTION:
.			530	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019101301 1800 900 604800 86400

;; Query time: 526 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Oct 14 06:54:01 CST 2019
;; MSG SIZE  rcvd: 118
Host info
130.54.194.109.in-addr.arpa domain name pointer 109x194x54x130.static-business.kursk.ertelecom.ru.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
130.54.194.109.in-addr.arpa	name = 109x194x54x130.static-business.kursk.ertelecom.ru.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
187.178.75.175 attackbotsspam
unauthorized connection attempt
2020-01-28 17:02:20
98.213.192.2 attack
Unauthorized connection attempt detected from IP address 98.213.192.2 to port 5555 [J]
2020-01-28 17:14:46
222.218.19.50 attackspam
unauthorized connection attempt
2020-01-28 16:59:01
187.58.153.204 attackbotsspam
unauthorized connection attempt
2020-01-28 16:40:36
109.122.59.121 attackspambots
unauthorized connection attempt
2020-01-28 16:56:15
103.221.208.167 attack
unauthorized connection attempt
2020-01-28 16:57:13
189.208.20.24 attackspambots
unauthorized connection attempt
2020-01-28 17:01:21
27.48.138.8 attackbots
Unauthorised access (Jan 28) SRC=27.48.138.8 LEN=40 TTL=248 ID=54595 TCP DPT=445 WINDOW=1024 SYN
2020-01-28 17:12:17
73.178.240.57 attackspam
unauthorized connection attempt
2020-01-28 16:47:30
171.226.134.196 attack
Unauthorized connection attempt detected from IP address 171.226.134.196 to port 85 [J]
2020-01-28 17:03:52
103.123.27.23 attackbotsspam
unauthorized connection attempt
2020-01-28 16:43:38
109.103.174.2 attack
unauthorized connection attempt
2020-01-28 16:56:50
49.83.34.70 attackspambots
unauthorized connection attempt
2020-01-28 17:10:06
39.105.190.207 attack
unauthorized connection attempt
2020-01-28 17:11:20
73.241.198.168 attack
unauthorized connection attempt
2020-01-28 17:15:00

Recently Reported IPs

226.1.109.18 197.157.172.102 218.203.137.110 185.90.117.35
185.90.118.15 167.99.106.131 77.83.202.44 112.85.17.175
177.45.185.23 118.24.239.153 167.99.101.217 167.98.112.3
54.38.36.244 175.153.114.28 27.40.234.58 72.137.107.77
51.15.166.118 163.231.132.216 132.130.80.43 178.128.217.218