Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: Rede ISP

Hostname: unknown

Organization: unknown

Usage Type: Commercial

Comments:
Type Details Datetime
attack
Mar 31 00:33:39 debian-2gb-nbg1-2 kernel: \[7866674.783321\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=168.194.119.12 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=114 ID=58226 PROTO=TCP SPT=80 DPT=28773 WINDOW=65535 RES=0x00 ACK SYN URGP=0
2020-03-31 07:33:18
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 168.194.119.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8634
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;168.194.119.12.			IN	A

;; AUTHORITY SECTION:
.			534	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020033001 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 31 07:33:15 CST 2020
;; MSG SIZE  rcvd: 118
Host info
12.119.194.168.in-addr.arpa domain name pointer 168-194-119-12.redeisp.com.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
12.119.194.168.in-addr.arpa	name = 168-194-119-12.redeisp.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
123.207.145.66 attackbotsspam
Aug 25 14:26:14 l03 sshd[1938]: Invalid user flo from 123.207.145.66 port 35734
...
2020-08-25 23:10:23
121.46.244.194 attackbotsspam
Invalid user wim from 121.46.244.194 port 34586
2020-08-25 23:10:37
111.229.1.180 attackbots
Invalid user aurelien from 111.229.1.180 port 4010
2020-08-25 23:16:14
161.35.6.255 attackspam
2020-08-25T14:52:26+0200 Failed SSH Authentication/Brute Force Attack. (Server 9)
2020-08-25 23:04:09
110.43.49.148 attackbots
Bruteforce detected by fail2ban
2020-08-25 23:16:34
103.28.114.101 attack
Aug 25 16:47:29 marvibiene sshd[4955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.28.114.101 
Aug 25 16:47:31 marvibiene sshd[4955]: Failed password for invalid user jerome from 103.28.114.101 port 51460 ssh2
Aug 25 16:58:05 marvibiene sshd[5486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.28.114.101
2020-08-25 23:20:40
45.95.168.89 attack
Brute-Force reported by Fail2Ban
2020-08-25 22:52:53
49.233.37.15 attackspam
Bruteforce detected by fail2ban
2020-08-25 23:28:32
182.151.58.230 attackbots
Invalid user osm from 182.151.58.230 port 53850
2020-08-25 23:00:46
52.188.69.174 attackspam
Invalid user ralf from 52.188.69.174 port 37420
2020-08-25 23:26:59
161.35.49.31 attackbotsspam
Aug 25 18:01:31 ift sshd\[13620\]: Failed password for root from 161.35.49.31 port 41886 ssh2Aug 25 18:01:42 ift sshd\[13646\]: Invalid user oracle from 161.35.49.31Aug 25 18:01:44 ift sshd\[13646\]: Failed password for invalid user oracle from 161.35.49.31 port 39162 ssh2Aug 25 18:01:57 ift sshd\[13651\]: Failed password for root from 161.35.49.31 port 36546 ssh2Aug 25 18:02:07 ift sshd\[13660\]: Invalid user postgres from 161.35.49.31
...
2020-08-25 23:03:35
62.210.136.231 attackbots
Aug 25 08:34:07 george sshd[12293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.136.231  user=mysql
Aug 25 08:34:08 george sshd[12293]: Failed password for mysql from 62.210.136.231 port 39586 ssh2
Aug 25 08:37:57 george sshd[12315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.136.231  user=root
Aug 25 08:37:59 george sshd[12315]: Failed password for root from 62.210.136.231 port 47856 ssh2
Aug 25 08:41:42 george sshd[12450]: Invalid user ari from 62.210.136.231 port 56128
...
2020-08-25 23:24:04
152.32.72.122 attackbotsspam
Invalid user teacher from 152.32.72.122 port 5433
2020-08-25 23:05:28
51.83.185.192 attackbotsspam
Aug 25 14:56:17 inter-technics sshd[5882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.185.192  user=root
Aug 25 14:56:19 inter-technics sshd[5882]: Failed password for root from 51.83.185.192 port 45118 ssh2
Aug 25 15:00:11 inter-technics sshd[6241]: Invalid user pluto from 51.83.185.192 port 53594
Aug 25 15:00:11 inter-technics sshd[6241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.185.192
Aug 25 15:00:11 inter-technics sshd[6241]: Invalid user pluto from 51.83.185.192 port 53594
Aug 25 15:00:14 inter-technics sshd[6241]: Failed password for invalid user pluto from 51.83.185.192 port 53594 ssh2
...
2020-08-25 22:51:02
60.167.181.84 attackspam
Invalid user zhangxd from 60.167.181.84 port 47376
2020-08-25 23:25:30

Recently Reported IPs

51.70.114.202 53.167.242.249 113.25.160.100 91.144.21.22
180.128.56.52 47.24.177.237 41.21.83.160 227.21.243.3
138.102.60.206 232.54.254.24 222.187.227.139 66.44.104.132
48.182.98.120 95.106.202.138 119.188.38.209 31.72.221.105
109.6.87.12 195.160.164.42 167.82.9.254 173.149.243.127