Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Lithuania

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackspam
Automatic report - Banned IP Access
2020-10-11 03:13:48
attack
 TCP (SYN) 92.118.160.29:34247 -> port 6002, len 44
2020-10-10 19:03:49
attackbotsspam
5222/tcp 3493/tcp 8080/tcp...
[2020-06-26/08-26]108pkt,72pt.(tcp),5pt.(udp)
2020-08-27 20:46:55
attackbotsspam
" "
2020-08-22 04:58:49
attackspambots
Honeypot attack, port: 81, PTR: 92.118.160.29.netsystemsresearch.com.
2020-07-11 16:58:13
attackbotsspam
 TCP (SYN) 92.118.160.29:63981 -> port 110, len 44
2020-07-01 17:36:52
attackspambots
 TCP (SYN) 92.118.160.29:51083 -> port 8888, len 44
2020-06-20 23:00:48
attackspam
Attempts against Pop3/IMAP
2020-05-26 06:22:08
attackbotsspam
Fail2Ban Ban Triggered
2020-05-16 08:19:53
attackbots
Fail2Ban Ban Triggered
2020-05-09 03:06:47
attackspambots
Port Scan: Events[2] countPorts[2]: 81 68 ..
2020-04-16 04:46:34
attackspambots
Unauthorized connection attempt detected from IP address 92.118.160.29 to port 5907
2020-03-27 04:44:16
attackbots
Unauthorized connection attempt detected from IP address 92.118.160.29 to port 990
2020-03-20 08:42:04
attackbots
Fail2Ban Ban Triggered
2020-02-25 18:51:47
attack
Unauthorized connection attempt detected from IP address 92.118.160.29 to port 8443 [J]
2020-02-05 03:12:10
attackspam
Unauthorized connection attempt detected from IP address 92.118.160.29 to port 21 [J]
2020-01-24 21:43:31
attackspam
92.118.160.29 was recorded 5 times by 5 hosts attempting to connect to the following ports: 2002,993,5986,5000,47808. Incident counter (4h, 24h, all-time): 5, 13, 715
2019-12-17 09:16:00
attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 87 - port: 5908 proto: TCP cat: Misc Attack
2019-12-12 08:30:01
attack
firewall-block, port(s): 5909/tcp
2019-12-06 09:15:56
attack
92.118.160.29 was recorded 6 times by 6 hosts attempting to connect to the following ports: 593,143,5909,2483,8082,3000. Incident counter (4h, 24h, all-time): 6, 31, 250
2019-11-20 16:48:15
attackspam
92.118.160.29 was recorded 5 times by 5 hosts attempting to connect to the following ports: 110,5906,8443,8080. Incident counter (4h, 24h, all-time): 5, 17, 200
2019-11-17 00:10:32
attackspam
Connection by 92.118.160.29 on port: 987 got caught by honeypot at 11/15/2019 7:32:20 PM
2019-11-16 07:00:32
attackbotsspam
firewall-block, port(s): 1026/tcp
2019-10-05 22:43:55
attack
scan r
2019-10-01 23:25:22
attackbotsspam
Honeypot attack, port: 139, PTR: 92.118.160.29.netsystemsresearch.com.
2019-09-30 13:08:23
attackspambots
Automatic report - Port Scan Attack
2019-09-28 14:02:13
attackspambots
SSH-bruteforce attempts
2019-09-25 23:48:50
attackspam
ssh bruteforce or scan
...
2019-09-11 12:20:51
attack
firewall-block, port(s): 4786/tcp, 5916/tcp
2019-08-30 20:20:20
attackspambots
Honeypot hit.
2019-08-01 00:03:21
Comments on same subnet:
IP Type Details Datetime
92.118.160.61 attackspambots
[Wed Oct 14 04:02:08.771804 2020] [:error] [pid 18140:tid 140204174145280] [client 92.118.160.61:51035] [client 92.118.160.61] ModSecurity: Access denied with code 403 (phase 1). Match of "within %{tx.allowed_http_versions}" against "REQUEST_PROTOCOL" required. [file "/etc/modsecurity/coreruleset-3.3.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "1041"] [id "920430"] [msg "HTTP protocol version is not allowed by policy"] [data "HTTP/1.0"] [severity "CRITICAL"] [ver "OWASP_CRS/3.3.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/"] [unique_id "X4YV0AhFQrstw8CY0VTYQwAAABU"]
...
2020-10-14 05:38:29
92.118.160.41 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 83 - port: 808 proto: tcp cat: Misc Attackbytes: 60
2020-10-14 05:01:11
92.118.160.37 attackspam
TCP ports : 3000 / 6002
2020-10-13 20:55:54
92.118.160.37 attack
firewall-block, port(s): 1723/tcp
2020-10-13 12:24:28
92.118.160.25 attackbotsspam
Port scan denied
2020-10-11 04:38:44
92.118.160.25 attack
Port scan denied
2020-10-10 20:37:51
92.118.160.53 attack
Hit honeypot r.
2020-10-10 03:31:27
92.118.160.53 attack
TCP port : 7547
2020-10-09 19:25:10
92.118.160.45 attackbotsspam
Found on   Binary Defense     / proto=6  .  srcport=62996  .  dstport=5443  .     (3940)
2020-10-08 06:38:02
92.118.160.17 attackspam
Port Scan/VNC login attempt
...
2020-10-08 03:10:41
92.118.160.49 attackbots
Automatic report - Banned IP Access
2020-10-08 03:07:09
92.118.160.45 attack
 TCP (SYN) 92.118.160.45:52203 -> port 49502, len 44
2020-10-07 22:58:40
92.118.160.17 attackbotsspam
[N1.H1.VM1] Port Scanner Detected Blocked by UFW
2020-10-07 19:24:46
92.118.160.49 attackbots
TCP port : 118
2020-10-07 19:21:23
92.118.160.45 attackspambots
Port scanning [2 denied]
2020-10-07 15:03:20
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 92.118.160.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52241
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;92.118.160.29.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051601 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri May 17 03:56:43 CST 2019
;; MSG SIZE  rcvd: 117

Host info
29.160.118.92.in-addr.arpa domain name pointer 92.118.160.29.netsystemsresearch.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
29.160.118.92.in-addr.arpa	name = 92.118.160.29.netsystemsresearch.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
69.10.63.86 attackspam
Unauthorized connection attempt from IP address 69.10.63.86 on Port 3389(RDP)
2020-09-19 23:59:17
14.35.215.3 attack
...
2020-09-20 00:00:28
106.13.167.62 attackbots
prod11
...
2020-09-20 00:19:34
218.75.93.98 attack
Unauthorized connection attempt from IP address 218.75.93.98 on Port 445(SMB)
2020-09-19 23:39:26
188.16.147.60 attackbots
Telnetd brute force attack detected by fail2ban
2020-09-19 23:48:17
120.85.125.107 attackspam
Listed on    abuseat.org plus zen-spamhaus   / proto=6  .  srcport=4098  .  dstport=23  .     (2861)
2020-09-19 23:44:08
192.3.247.10 attackbots
2020-09-19T08:22:18.7496021495-001 sshd[11168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.247.10  user=root
2020-09-19T08:22:21.0645071495-001 sshd[11168]: Failed password for root from 192.3.247.10 port 41952 ssh2
2020-09-19T08:26:20.2040761495-001 sshd[11345]: Invalid user nagios from 192.3.247.10 port 53244
2020-09-19T08:26:20.2075931495-001 sshd[11345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.247.10
2020-09-19T08:26:20.2040761495-001 sshd[11345]: Invalid user nagios from 192.3.247.10 port 53244
2020-09-19T08:26:22.0804931495-001 sshd[11345]: Failed password for invalid user nagios from 192.3.247.10 port 53244 ssh2
...
2020-09-19 23:58:41
200.74.104.243 attackspambots
Email rejected due to spam filtering
2020-09-19 23:51:22
34.77.211.30 attackspam
34.77.211.30 - - [18/Sep/2020:18:00:38 +0100] "POST /wp-login.php HTTP/1.1" 302 5 "-" "Moz"
34.77.211.30 - - [18/Sep/2020:18:00:38 +0100] "POST /wp-login.php HTTP/1.1" 302 5 "-" "Moz"
34.77.211.30 - - [18/Sep/2020:18:00:38 +0100] "POST /wp-login.php HTTP/1.1" 302 5 "-" "Moz"
...
2020-09-20 00:00:08
123.252.137.30 attack
Unauthorized connection attempt from IP address 123.252.137.30 on Port 445(SMB)
2020-09-20 00:17:05
185.220.101.200 attack
2020-09-19T18:05:21.448712snf-827550 sshd[11826]: Failed password for root from 185.220.101.200 port 23924 ssh2
2020-09-19T18:05:23.780981snf-827550 sshd[11826]: Failed password for root from 185.220.101.200 port 23924 ssh2
2020-09-19T18:05:25.672549snf-827550 sshd[11826]: Failed password for root from 185.220.101.200 port 23924 ssh2
...
2020-09-20 00:07:51
187.3.118.21 attackspambots
Email rejected due to spam filtering
2020-09-19 23:40:31
78.106.78.26 attackbots
Automatic report - Banned IP Access
2020-09-20 00:14:55
116.75.195.231 attackspam
Auto Detect Rule!
proto TCP (SYN), 116.75.195.231:41943->gjan.info:23, len 40
2020-09-20 00:00:47
49.88.112.110 attackspam
Sep 19 22:42:25 webhost01 sshd[20692]: Failed password for root from 49.88.112.110 port 52945 ssh2
...
2020-09-19 23:45:59

Recently Reported IPs

217.31.140.130 205.41.51.188 57.239.67.31 253.182.113.93
77.247.108.55 220.244.28.34 18.48.233.197 190.38.148.95
189.213.105.186 58.242.164.10 133.208.148.88 175.101.76.183
104.131.103.14 240.153.249.98 47.138.181.44 155.227.43.177
131.125.240.114 131.196.93.188 144.27.238.110 184.91.182.87