Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: Swisscom AG

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attack
79 attempts to access administrative URLs
2019-08-01 21:57:37
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 46.14.195.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21538
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;46.14.195.34.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019080100 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Aug 01 21:57:27 CST 2019
;; MSG SIZE  rcvd: 116
Host info
34.195.14.46.in-addr.arpa domain name pointer 34.195.14.46.static.wline.lns.sme.cust.swisscom.ch.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
34.195.14.46.in-addr.arpa	name = 34.195.14.46.static.wline.lns.sme.cust.swisscom.ch.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.158.70.82 attackbots
2020-08-05 UTC: (41x) - root(41x)
2020-08-06 19:22:38
51.75.144.30 attack
Automatic report - Banned IP Access
2020-08-06 19:39:12
80.82.77.245 attackbotsspam
ET DROP Dshield Block Listed Source group 1 - port: 68 proto: udp cat: Misc Attackbytes: 71
2020-08-06 19:08:28
54.37.157.88 attackspambots
[SID2] Fail2ban detected 5 failed SSH login attempts within 30 minutes. This report was submitted automatically.
2020-08-06 19:37:15
115.159.157.103 attack
Unauthorised access (Aug  6) SRC=115.159.157.103 LEN=40 TTL=236 ID=20925 TCP DPT=1433 WINDOW=1024 SYN
2020-08-06 19:13:29
199.227.138.238 attackbots
Aug  6 11:06:44 web8 sshd\[25794\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.227.138.238  user=root
Aug  6 11:06:46 web8 sshd\[25794\]: Failed password for root from 199.227.138.238 port 37922 ssh2
Aug  6 11:11:14 web8 sshd\[28270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.227.138.238  user=root
Aug  6 11:11:15 web8 sshd\[28270\]: Failed password for root from 199.227.138.238 port 49716 ssh2
Aug  6 11:15:33 web8 sshd\[30589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.227.138.238  user=root
2020-08-06 19:23:29
220.130.157.36 attackbots
Unauthorized connection attempt detected from IP address 220.130.157.36 to port 9530
2020-08-06 19:28:30
113.160.37.10 attackspam
20/8/6@01:18:45: FAIL: Alarm-Intrusion address from=113.160.37.10
...
2020-08-06 19:43:09
106.54.91.157 attack
Automatic report - Banned IP Access
2020-08-06 19:37:50
110.49.71.240 attackbotsspam
SSH brute force attempt
2020-08-06 19:25:29
175.125.95.160 attack
sshd: Failed password for .... from 175.125.95.160 port 43224 ssh2 (12 attempts)
2020-08-06 19:35:58
177.69.237.54 attackspambots
SSH Brute Force
2020-08-06 19:09:48
121.28.95.157 attackspambots
Aug  6 07:18:50 debian-2gb-nbg1-2 kernel: \[18949587.793835\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=121.28.95.157 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=233 ID=36262 PROTO=TCP SPT=10786 DPT=1433 WINDOW=1024 RES=0x00 SYN URGP=0
2020-08-06 19:38:49
45.55.59.115 attackspam
45.55.59.115 - - [06/Aug/2020:06:18:53 +0100] "POST /wp-login.php HTTP/1.1" 200 2046 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
45.55.59.115 - - [06/Aug/2020:06:19:05 +0100] "POST /wp-login.php HTTP/1.1" 200 2020 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
45.55.59.115 - - [06/Aug/2020:06:19:12 +0100] "POST /wp-login.php HTTP/1.1" 200 2019 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-06 19:24:42
140.143.136.89 attackspam
(sshd) Failed SSH login from 140.143.136.89 (CN/China/-): 5 in the last 3600 secs
2020-08-06 19:34:08

Recently Reported IPs

217.136.19.76 191.53.223.58 48.74.6.156 2002:b62e:6745::b62e:6745
46.191.213.137 185.137.234.105 97.68.217.38 51.77.192.91
219.237.74.24 110.218.85.106 189.91.4.146 185.117.73.214
73.58.149.177 231.206.114.36 110.12.61.47 234.200.97.9
68.149.179.64 145.131.25.238 121.64.5.49 155.176.205.7