Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Lonate Ceppino

Region: Lombardy

Country: Italy

Internet Service Provider: Comune di Lonigo

Hostname: unknown

Organization: Welcome Italia S.p.A

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attack
2019-10-21T03:43:41.943564abusebot-5.cloudsearch.cf sshd\[30742\]: Invalid user admin from 94.138.160.170 port 49979
2019-10-21 18:45:22
attackbotsspam
Invalid user admin from 94.138.160.170 port 57381
2019-07-27 22:45:08
attackbotsspam
[ssh] SSH attack
2019-07-22 10:33:22
attack
Jul 15 08:16:46 srv206 sshd[23798]: Invalid user admin from 94.138.160.170
Jul 15 08:16:46 srv206 sshd[23798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.138.160.170
Jul 15 08:16:46 srv206 sshd[23798]: Invalid user admin from 94.138.160.170
Jul 15 08:16:48 srv206 sshd[23798]: Failed password for invalid user admin from 94.138.160.170 port 37787 ssh2
...
2019-07-15 23:52:02
attackspambots
Jul  3 08:11:10 aat-srv002 sshd[9866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.138.160.170
Jul  3 08:11:12 aat-srv002 sshd[9866]: Failed password for invalid user admin from 94.138.160.170 port 33925 ssh2
Jul  3 08:11:15 aat-srv002 sshd[9866]: Failed password for invalid user admin from 94.138.160.170 port 33925 ssh2
Jul  3 08:11:17 aat-srv002 sshd[9866]: Failed password for invalid user admin from 94.138.160.170 port 33925 ssh2
Jul  3 08:11:19 aat-srv002 sshd[9866]: Failed password for invalid user admin from 94.138.160.170 port 33925 ssh2
...
2019-07-04 06:22:13
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.138.160.170
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11125
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;94.138.160.170.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019042601 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sat Apr 27 02:40:47 +08 2019
;; MSG SIZE  rcvd: 118

Host info
170.160.138.94.in-addr.arpa domain name pointer 94-138-160-170.ip.welcomeitalia.it.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
170.160.138.94.in-addr.arpa	name = 94-138-160-170.ip.welcomeitalia.it.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
201.16.129.235 attackspambots
Automatic report - Port Scan Attack
2019-09-06 09:49:09
14.253.151.174 attack
Unauthorized connection attempt from IP address 14.253.151.174 on Port 445(SMB)
2019-09-06 10:18:36
43.226.66.35 attackbots
Sep  5 09:53:23 aiointranet sshd\[5514\]: Invalid user deployerpass from 43.226.66.35
Sep  5 09:53:23 aiointranet sshd\[5514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.66.35
Sep  5 09:53:25 aiointranet sshd\[5514\]: Failed password for invalid user deployerpass from 43.226.66.35 port 57998 ssh2
Sep  5 09:56:01 aiointranet sshd\[5759\]: Invalid user tomas from 43.226.66.35
Sep  5 09:56:01 aiointranet sshd\[5759\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.66.35
2019-09-06 10:11:52
187.44.184.250 attack
Unauthorized connection attempt from IP address 187.44.184.250 on Port 445(SMB)
2019-09-06 10:22:31
5.138.217.102 attack
Automatic report - Port Scan Attack
2019-09-06 09:54:13
111.223.73.20 attackbots
Sep  6 02:22:51 www_kotimaassa_fi sshd[5670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.223.73.20
Sep  6 02:22:53 www_kotimaassa_fi sshd[5670]: Failed password for invalid user newuser from 111.223.73.20 port 34078 ssh2
...
2019-09-06 10:25:30
187.210.135.89 attackbotsspam
Scanning random ports - tries to find possible vulnerable services
2019-09-06 10:32:06
176.175.110.238 attack
Sep  5 16:27:46 hiderm sshd\[28865\]: Invalid user hadoop from 176.175.110.238
Sep  5 16:27:46 hiderm sshd\[28865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=static-176-175-110-238.ftth.abo.bbox.fr
Sep  5 16:27:48 hiderm sshd\[28865\]: Failed password for invalid user hadoop from 176.175.110.238 port 45458 ssh2
Sep  5 16:33:05 hiderm sshd\[29263\]: Invalid user teamspeak from 176.175.110.238
Sep  5 16:33:05 hiderm sshd\[29263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=static-176-175-110-238.ftth.abo.bbox.fr
2019-09-06 10:33:47
77.233.4.133 attackspam
Sep  6 00:33:13 OPSO sshd\[14391\]: Invalid user password from 77.233.4.133 port 50752
Sep  6 00:33:13 OPSO sshd\[14391\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.233.4.133
Sep  6 00:33:14 OPSO sshd\[14391\]: Failed password for invalid user password from 77.233.4.133 port 50752 ssh2
Sep  6 00:37:47 OPSO sshd\[15052\]: Invalid user demo3 from 77.233.4.133 port 43963
Sep  6 00:37:47 OPSO sshd\[15052\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.233.4.133
2019-09-06 10:26:01
103.59.189.252 attackspambots
Unauthorized connection attempt from IP address 103.59.189.252 on Port 445(SMB)
2019-09-06 10:19:05
92.63.194.26 attackspam
Sep  5 **REMOVED** sshd\[18085\]: Invalid user admin from 92.63.194.26
Sep  5 **REMOVED** sshd\[22699\]: Invalid user admin from 92.63.194.26
Sep  6 **REMOVED** sshd\[24344\]: Invalid user admin from 92.63.194.26
2019-09-06 09:53:11
203.192.210.172 attackspam
2019-09-05T21:01:37.083550mail01 postfix/smtpd[7337]: warning: unknown[203.192.210.172]: SASL PLAIN authentication failed:
2019-09-05T21:01:44.186412mail01 postfix/smtpd[6349]: warning: unknown[203.192.210.172]: SASL PLAIN authentication failed:
2019-09-05T21:01:55.323160mail01 postfix/smtpd[19636]: warning: unknown[203.192.210.172]: SASL PLAIN authentication failed:
2019-09-06 10:19:25
129.211.77.44 attackspambots
Sep  5 21:34:12 h2177944 sshd\[2652\]: Invalid user ftpuser from 129.211.77.44 port 43632
Sep  5 21:34:12 h2177944 sshd\[2652\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.77.44
Sep  5 21:34:14 h2177944 sshd\[2652\]: Failed password for invalid user ftpuser from 129.211.77.44 port 43632 ssh2
Sep  5 21:38:55 h2177944 sshd\[2777\]: Invalid user teamspeak from 129.211.77.44 port 58172
...
2019-09-06 10:07:05
112.166.7.171 attack
scan r
2019-09-06 10:06:27
195.175.11.18 attackbotsspam
Port Scan: TCP/445
2019-09-06 09:49:36

Recently Reported IPs

122.164.142.226 107.13.186.237 181.159.98.235 123.201.52.93
91.243.166.141 90.23.81.47 79.111.14.165 109.122.180.250
178.176.175.213 218.169.86.151 206.162.153.224 208.68.38.96
67.181.23.144 47.14.109.202 104.168.135.130 86.174.43.151
176.106.232.217 156.191.213.184 88.73.46.57 136.156.157.244