Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation

Internet Service Provider: JSC ER-Telecom Holding

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspam
2019-10-18T06:49:18.541795luisaranguren sshd[2315760]: Connection from 81.94.16.142 port 47522 on 10.10.10.6 port 22
2019-10-18T06:49:20.176033luisaranguren sshd[2315760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.94.16.142  user=root
2019-10-18T06:49:22.281274luisaranguren sshd[2315760]: Failed password for root from 81.94.16.142 port 47522 ssh2
2019-10-18T06:49:18.599098luisaranguren sshd[2315767]: Connection from 81.94.16.142 port 48170 on 10.10.10.6 port 22
2019-10-18T06:49:20.189541luisaranguren sshd[2315767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.94.16.142  user=root
2019-10-18T06:49:22.296183luisaranguren sshd[2315767]: Failed password for root from 81.94.16.142 port 48170 ssh2
2019-10-18T06:49:18.594012luisaranguren sshd[2315765]: Connection from 81.94.16.142 port 48008 on 10.10.10.6 port 22
2019-10-18T06:49:20.203452luisaranguren sshd[2315765]: pam_unix(sshd:auth): authentication failure; logname= ui
2019-10-18 07:38:50
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.94.16.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33038
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;81.94.16.142.			IN	A

;; AUTHORITY SECTION:
.			596	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019101701 1800 900 604800 86400

;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 18 07:38:47 CST 2019
;; MSG SIZE  rcvd: 116
Host info
142.16.94.81.in-addr.arpa domain name pointer vpnpool-81-94-16-142.users.mns.ru.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.16.94.81.in-addr.arpa	name = vpnpool-81-94-16-142.users.mns.ru.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
116.110.175.124 attackbotsspam
Unauthorized connection attempt from IP address 116.110.175.124 on Port 445(SMB)
2020-04-11 19:24:03
136.34.166.239 attackbotsspam
port 23
2020-04-11 20:03:17
113.181.156.142 attackspambots
445/tcp
[2020-04-11]1pkt
2020-04-11 19:25:32
171.245.124.101 attack
Unauthorized connection attempt from IP address 171.245.124.101 on Port 445(SMB)
2020-04-11 20:02:17
141.98.81.81 attackbots
$f2bV_matches
2020-04-11 19:33:45
51.83.40.227 attackbotsspam
Invalid user user from 51.83.40.227 port 53910
2020-04-11 19:23:41
117.1.160.215 attackspambots
Unauthorized connection attempt detected from IP address 117.1.160.215 to port 445
2020-04-11 19:58:51
62.24.104.71 attackbotsspam
Apr 10 07:11:00 finn sshd[30713]: Invalid user ts2 from 62.24.104.71 port 52982
Apr 10 07:11:00 finn sshd[30713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.24.104.71
Apr 10 07:11:02 finn sshd[30713]: Failed password for invalid user ts2 from 62.24.104.71 port 52982 ssh2
Apr 10 07:11:02 finn sshd[30713]: Received disconnect from 62.24.104.71 port 52982:11: Bye Bye [preauth]
Apr 10 07:11:02 finn sshd[30713]: Disconnected from 62.24.104.71 port 52982 [preauth]
Apr 10 07:22:52 finn sshd[749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.24.104.71  user=r.r
Apr 10 07:22:53 finn sshd[749]: Failed password for r.r from 62.24.104.71 port 60942 ssh2
Apr 10 07:22:54 finn sshd[749]: Received disconnect from 62.24.104.71 port 60942:11: Bye Bye [preauth]
Apr 10 07:22:54 finn sshd[749]: Disconnected from 62.24.104.71 port 60942 [preauth]
Apr 10 07:27:34 finn sshd[2065]: pam_unix(sshd:auth):........
-------------------------------
2020-04-11 19:26:27
159.203.142.91 attackspambots
$f2bV_matches
2020-04-11 19:33:01
202.159.38.131 attack
Unauthorized connection attempt from IP address 202.159.38.131 on Port 445(SMB)
2020-04-11 19:44:19
51.83.73.115 attackbots
2020-04-11T05:39:09.933857rocketchat.forhosting.nl sshd[7750]: Invalid user pink from 51.83.73.115 port 51190
2020-04-11T05:39:12.109133rocketchat.forhosting.nl sshd[7750]: Failed password for invalid user pink from 51.83.73.115 port 51190 ssh2
2020-04-11T05:45:53.326575rocketchat.forhosting.nl sshd[7898]: Invalid user server from 51.83.73.115 port 42501
...
2020-04-11 19:46:20
141.98.81.84 attackspam
Invalid user admin from 141.98.81.84 port 44325
2020-04-11 20:00:35
114.67.111.190 attackbotsspam
Apr 11 11:37:49 xeon sshd[32784]: Failed password for root from 114.67.111.190 port 39994 ssh2
2020-04-11 19:48:10
106.13.56.249 attackspambots
SSH/22 MH Probe, BF, Hack -
2020-04-11 19:57:24
2.99.16.240 attackbots
Attempted connection to port 9000.
2020-04-11 20:04:51

Recently Reported IPs

115.153.254.94 106.13.168.150 159.203.201.128 106.75.109.223
112.121.178.187 133.130.29.137 60.112.184.34 162.73.230.176
149.244.191.84 82.194.229.214 103.54.219.250 202.182.106.136
103.119.62.121 93.41.182.249 157.245.107.153 96.9.74.139
111.91.237.208 13.233.91.123 122.154.103.68 190.111.249.153