Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: St Petersburg

Region: St.-Petersburg

Country: Russia

Internet Service Provider: Comfortel Ltd.

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackbots
Jan 25 20:08:49 server sshd\[4849\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92-255-95-242.customer.comfortel.pro 
Jan 25 20:08:56 server sshd\[4849\]: Failed password for invalid user ftp_user from 92.255.95.242 port 44680 ssh2
Jan 26 11:23:51 server sshd\[30714\]: Invalid user sybase from 92.255.95.242
Jan 26 11:23:51 server sshd\[30714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92-255-95-242.customer.comfortel.pro 
Jan 26 11:23:53 server sshd\[30714\]: Failed password for invalid user sybase from 92.255.95.242 port 36038 ssh2
...
2020-01-26 16:50:49
attackspam
Dec  5 07:32:13 jane sshd[10517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.95.242 
Dec  5 07:32:16 jane sshd[10517]: Failed password for invalid user webmaster from 92.255.95.242 port 48220 ssh2
...
2019-12-05 15:25:31
attack
SSH Bruteforce
2019-11-17 19:37:07
attack
Nov 14 02:21:04 areeb-Workstation sshd[6614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.95.242
Nov 14 02:21:06 areeb-Workstation sshd[6614]: Failed password for invalid user usuario from 92.255.95.242 port 40608 ssh2
...
2019-11-14 06:50:20
attackspam
Nov 11 11:26:10 host sshd[6709]: User r.r from 92.255.95.242 not allowed because none of user's groups are listed in AllowGroups
Nov 11 11:26:10 host sshd[6709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.95.242  user=r.r
Nov 11 11:26:12 host sshd[6709]: Failed password for invalid user r.r from 92.255.95.242 port 45788 ssh2
Nov 11 11:26:12 host sshd[6709]: Received disconnect from 92.255.95.242 port 45788:11: Normal Shutdown, Thank you for playing [preauth]
Nov 11 11:26:12 host sshd[6709]: Disconnected from invalid user r.r 92.255.95.242 port 45788 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=92.255.95.242
2019-11-12 19:43:12
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 92.255.95.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38297
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;92.255.95.242.			IN	A

;; AUTHORITY SECTION:
.			299	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019111101 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Nov 12 03:37:20 CST 2019
;; MSG SIZE  rcvd: 117
Host info
242.95.255.92.in-addr.arpa domain name pointer 92-255-95-242.customer.comfortel.pro.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.95.255.92.in-addr.arpa	name = 92-255-95-242.customer.comfortel.pro.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
61.152.249.200 attack
$f2bV_matches
2020-08-21 14:52:23
185.100.87.206 attackbots
2020-08-21T07:11:01+0000 Failed SSH Authentication/Brute Force Attack. (Server 6)
2020-08-21 15:14:03
103.145.13.133 attackspam
SIP Server BruteForce Attack
2020-08-21 15:19:14
111.92.76.85 attackbots
1597982212 - 08/21/2020 05:56:52 Host: 111.92.76.85/111.92.76.85 Port: 445 TCP Blocked
...
2020-08-21 14:49:16
180.253.167.70 attackbotsspam
Aug 21 06:02:00 vps333114 sshd[18703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.253.167.70
Aug 21 06:02:02 vps333114 sshd[18703]: Failed password for invalid user administrator from 180.253.167.70 port 22393 ssh2
...
2020-08-21 15:13:31
222.186.30.76 attackspambots
Aug 21 08:36:46 vpn01 sshd[18286]: Failed password for root from 222.186.30.76 port 58231 ssh2
...
2020-08-21 14:48:03
58.186.51.108 attackspam
20/8/21@00:21:43: FAIL: Alarm-Network address from=58.186.51.108
20/8/21@00:21:44: FAIL: Alarm-Network address from=58.186.51.108
...
2020-08-21 15:15:17
106.12.52.34 attackspambots
Invalid user apache from 106.12.52.34 port 52652
2020-08-21 15:01:52
59.102.73.82 attack
Invalid user camilo from 59.102.73.82 port 41190
2020-08-21 15:16:39
218.92.0.173 attackspam
Aug 21 09:19:17 theomazars sshd[30018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.173  user=root
Aug 21 09:19:19 theomazars sshd[30018]: Failed password for root from 218.92.0.173 port 49052 ssh2
2020-08-21 15:21:38
101.236.60.31 attack
Aug 21 02:27:21 firewall sshd[18303]: Failed password for invalid user steam from 101.236.60.31 port 48417 ssh2
Aug 21 02:31:41 firewall sshd[18435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.236.60.31  user=root
Aug 21 02:31:43 firewall sshd[18435]: Failed password for root from 101.236.60.31 port 51591 ssh2
...
2020-08-21 14:59:59
104.248.149.130 attackbots
Aug 21 09:20:58 pkdns2 sshd\[1477\]: Invalid user wup from 104.248.149.130Aug 21 09:21:00 pkdns2 sshd\[1477\]: Failed password for invalid user wup from 104.248.149.130 port 38152 ssh2Aug 21 09:25:09 pkdns2 sshd\[1683\]: Invalid user history from 104.248.149.130Aug 21 09:25:10 pkdns2 sshd\[1683\]: Failed password for invalid user history from 104.248.149.130 port 46970 ssh2Aug 21 09:29:33 pkdns2 sshd\[1836\]: Invalid user vladimir from 104.248.149.130Aug 21 09:29:35 pkdns2 sshd\[1836\]: Failed password for invalid user vladimir from 104.248.149.130 port 55920 ssh2
...
2020-08-21 14:53:47
118.69.65.4 attackspam
Aug 21 08:16:01 OPSO sshd\[22440\]: Invalid user cym from 118.69.65.4 port 51669
Aug 21 08:16:01 OPSO sshd\[22440\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.69.65.4
Aug 21 08:16:03 OPSO sshd\[22440\]: Failed password for invalid user cym from 118.69.65.4 port 51669 ssh2
Aug 21 08:21:11 OPSO sshd\[23701\]: Invalid user scp from 118.69.65.4 port 56531
Aug 21 08:21:11 OPSO sshd\[23701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.69.65.4
2020-08-21 14:54:56
51.83.245.223 attack
Silly bot, trying, trying login
2020-08-21 14:50:15
36.79.238.215 attack
Aug 21 10:56:20 webhost01 sshd[17389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.79.238.215
Aug 21 10:56:21 webhost01 sshd[17389]: Failed password for invalid user developer from 36.79.238.215 port 50970 ssh2
...
2020-08-21 15:11:16

Recently Reported IPs

116.90.163.146 98.23.250.12 116.193.134.7 27.71.206.37
120.151.207.52 81.22.45.175 193.8.194.11 156.96.44.14
34.76.180.185 113.110.227.31 79.73.135.44 157.245.11.180
203.195.159.186 187.56.190.168 172.245.253.135 115.201.133.225
163.172.223.186 104.132.34.1 94.41.81.232 165.227.202.185