Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Turkey

Internet Service Provider: IHS Telekomunikasyon Ltd

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
Unauthorized connection attempt detected from IP address 94.138.221.106 to port 14274 [T]
2020-09-01 16:48:43
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.138.221.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8397
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;94.138.221.106.			IN	A

;; AUTHORITY SECTION:
.			364	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090100 1800 900 604800 86400

;; Query time: 106 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Sep 01 16:48:39 CST 2020
;; MSG SIZE  rcvd: 118
Host info
106.221.138.94.in-addr.arpa domain name pointer server.btkare.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
106.221.138.94.in-addr.arpa	name = server.btkare.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
14.29.182.232 attack
Automatic report - SSH Brute-Force Attack
2020-03-24 14:26:45
154.83.29.6 attackspam
SSH brutforce
2020-03-24 14:17:15
202.169.224.19 attackbots
Email rejected due to spam filtering
2020-03-24 14:52:48
113.94.56.62 attackbots
(ftpd) Failed FTP login from 113.94.56.62 (CN/China/-): 10 in the last 3600 secs
2020-03-24 14:24:24
58.217.158.2 attack
$f2bV_matches
2020-03-24 14:24:51
86.181.194.190 attackbots
Honeypot attack, port: 81, PTR: host86-181-194-190.range86-181.btcentralplus.com.
2020-03-24 14:35:27
62.168.92.206 attack
Mar 24 07:22:15 vps691689 sshd[22286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.168.92.206
Mar 24 07:22:16 vps691689 sshd[22286]: Failed password for invalid user amanda from 62.168.92.206 port 53472 ssh2
Mar 24 07:29:14 vps691689 sshd[22586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.168.92.206
...
2020-03-24 14:47:23
201.211.184.85 attack
Honeypot attack, port: 81, PTR: 201-211-184-85.genericrev.cantv.net.
2020-03-24 14:18:27
68.37.26.202 attackspam
Honeypot attack, port: 81, PTR: c-68-37-26-202.hsd1.mi.comcast.net.
2020-03-24 14:51:54
41.208.131.13 attackspam
Mar 24 05:45:36 localhost sshd[5474]: Invalid user freddy from 41.208.131.13 port 37902
Mar 24 05:45:36 localhost sshd[5474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.208.131.13
Mar 24 05:45:36 localhost sshd[5474]: Invalid user freddy from 41.208.131.13 port 37902
Mar 24 05:45:38 localhost sshd[5474]: Failed password for invalid user freddy from 41.208.131.13 port 37902 ssh2
Mar 24 05:54:38 localhost sshd[6517]: Invalid user ln from 41.208.131.13 port 52638
...
2020-03-24 14:15:36
197.159.68.8 attack
Mar 24 06:54:11 raspberrypi sshd[17702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.159.68.8
2020-03-24 14:45:05
220.178.75.153 attackspambots
web-1 [ssh] SSH Attack
2020-03-24 14:47:49
202.152.0.14 attackbots
SSH Authentication Attempts Exceeded
2020-03-24 14:09:59
77.42.126.77 attackbots
1585029255 - 03/24/2020 06:54:15 Host: 77.42.126.77/77.42.126.77 Port: 8080 TCP Blocked
2020-03-24 14:38:59
201.49.127.212 attack
5x Failed Password
2020-03-24 14:48:21

Recently Reported IPs

113.98.61.155 186.1.180.217 201.216.218.162 182.84.108.83
156.180.154.242 245.182.132.186 31.4.244.148 180.116.2.83
89.187.13.61 102.32.192.197 227.78.115.224 230.129.13.35
87.101.178.215 37.165.208.176 147.208.28.41 204.62.95.155
65.197.163.75 217.1.139.49 166.223.198.222 31.69.49.241