Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Moscow

Region: Moscow

Country: Russia

Internet Service Provider: Avantel Close Joint Stock Company

Hostname: unknown

Organization: Avantel, Close Joint Stock Company

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
Unauthorized connection attempt from IP address 92.242.52.34 on Port 445(SMB)
2020-09-19 21:49:43
attack
Unauthorized connection attempt from IP address 92.242.52.34 on Port 445(SMB)
2020-09-19 13:43:03
attackbotsspam
Unauthorized connection attempt from IP address 92.242.52.34 on Port 445(SMB)
2020-09-19 05:21:41
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 92.242.52.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60477
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;92.242.52.34.			IN	A

;; AUTHORITY SECTION:
.			796	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041902 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sat Apr 20 07:03:49 +08 2019
;; MSG SIZE  rcvd: 116

Host info
Host 34.52.242.92.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 34.52.242.92.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
125.179.28.108 attack
DATE:2020-09-12 18:54:13, IP:125.179.28.108, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-09-13 07:16:23
186.154.36.194 attack
Port probing on unauthorized port 9527
2020-09-13 07:30:45
186.200.181.130 attackspambots
2020-09-12T16:50:08.696796server.mjenks.net sshd[862963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.200.181.130  user=root
2020-09-12T16:50:10.724891server.mjenks.net sshd[862963]: Failed password for root from 186.200.181.130 port 46254 ssh2
2020-09-12T16:52:22.187915server.mjenks.net sshd[863281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.200.181.130  user=root
2020-09-12T16:52:24.611834server.mjenks.net sshd[863281]: Failed password for root from 186.200.181.130 port 49728 ssh2
2020-09-12T16:54:35.547642server.mjenks.net sshd[863515]: Invalid user pgsql from 186.200.181.130 port 53218
...
2020-09-13 07:36:01
193.7.200.114 attack
2020-09-12 13:46:48 server sshd[81049]: Failed password for invalid user root from 193.7.200.114 port 48232 ssh2
2020-09-13 07:32:26
5.188.86.216 attackspambots
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-12T20:30:32Z
2020-09-13 07:16:44
191.217.170.33 attackbotsspam
web-1 [ssh] SSH Attack
2020-09-13 07:15:31
45.55.88.16 attackbots
(sshd) Failed SSH login from 45.55.88.16 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 12 15:00:36 optimus sshd[4149]: Invalid user w6support from 45.55.88.16
Sep 12 15:00:36 optimus sshd[4149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.88.16 
Sep 12 15:00:38 optimus sshd[4149]: Failed password for invalid user w6support from 45.55.88.16 port 55682 ssh2
Sep 12 15:12:29 optimus sshd[7378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.88.16  user=root
Sep 12 15:12:31 optimus sshd[7378]: Failed password for root from 45.55.88.16 port 45580 ssh2
2020-09-13 07:35:14
222.186.175.169 attackspam
Sep 13 01:19:23 server sshd[35545]: Failed none for root from 222.186.175.169 port 64714 ssh2
Sep 13 01:19:25 server sshd[35545]: Failed password for root from 222.186.175.169 port 64714 ssh2
Sep 13 01:19:29 server sshd[35545]: Failed password for root from 222.186.175.169 port 64714 ssh2
2020-09-13 07:22:25
116.74.18.25 attackspam
port scan and connect, tcp 23 (telnet)
2020-09-13 07:13:32
138.197.222.141 attack
firewall-block, port(s): 5273/tcp
2020-09-13 07:09:04
185.57.152.70 attackspam
scan for /wp-login.php
2020-09-13 07:34:15
62.77.233.66 attackbotsspam
Brute forcing email accounts
2020-09-13 07:41:58
49.50.77.206 attack
(cpanel) Failed cPanel login from 49.50.77.206 (IN/India/indulgense.com): 5 in the last 3600 secs
2020-09-13 07:18:39
190.2.113.228 attackspambots
Unauthorized SSH connection attempt
2020-09-13 07:25:29
36.81.245.83 attackbotsspam
port scan and connect, tcp 23 (telnet)
2020-09-13 07:37:07

Recently Reported IPs

213.168.187.78 213.26.2.163 172.104.124.64 69.74.71.242
109.165.52.216 5.225.0.127 113.111.108.242 197.54.80.65
177.95.222.227 49.73.235.148 91.221.66.86 156.201.99.243
128.14.209.146 222.124.81.8 185.234.218.228 54.200.128.131
180.253.186.245 142.93.210.164 186.176.246.30 182.91.145.64