Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation

Internet Service Provider: MAROSNET Telecommunication Company LLC

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08050931)
2019-08-05 23:11:55
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.142.142.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5420
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;94.142.142.74.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019080501 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Aug 05 23:11:41 CST 2019
;; MSG SIZE  rcvd: 117
Host info
74.142.142.94.in-addr.arpa domain name pointer ih1646477.vds.myihor.ru.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
74.142.142.94.in-addr.arpa	name = ih1646477.vds.myihor.ru.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.147.228.41 attack
looking for open 25/tcp
2020-03-13 02:48:42
125.140.155.81 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-13 02:42:05
18.220.183.151 attack
Wordpress attack
2020-03-13 02:40:15
14.29.160.194 attack
Brute-force attempt banned
2020-03-13 02:10:38
139.199.248.156 attackspam
Mar 12 17:44:43 vps58358 sshd\[19055\]: Failed password for sys from 139.199.248.156 port 34415 ssh2Mar 12 17:46:51 vps58358 sshd\[19081\]: Failed password for root from 139.199.248.156 port 48306 ssh2Mar 12 17:49:01 vps58358 sshd\[19101\]: Failed password for root from 139.199.248.156 port 33965 ssh2Mar 12 17:51:14 vps58358 sshd\[19138\]: Failed password for root from 139.199.248.156 port 47857 ssh2Mar 12 17:53:18 vps58358 sshd\[19157\]: Invalid user $$w0rd123@. from 139.199.248.156Mar 12 17:53:20 vps58358 sshd\[19157\]: Failed password for invalid user $$w0rd123@. from 139.199.248.156 port 33516 ssh2
...
2020-03-13 02:41:50
64.227.19.68 attack
2020-02-28T14:55:25.553Z CLOSE host=64.227.19.68 port=54808 fd=4 time=20.012 bytes=18
...
2020-03-13 02:22:10
61.49.82.86 attack
2020-01-11T05:06:14.204Z CLOSE host=61.49.82.86 port=45081 fd=4 time=20.020 bytes=8
...
2020-03-13 02:34:55
64.227.39.120 attackbotsspam
2020-02-24T19:24:38.430Z CLOSE host=64.227.39.120 port=58740 fd=4 time=20.009 bytes=20
...
2020-03-13 02:21:20
123.206.216.65 attackbots
SSH invalid-user multiple login try
2020-03-13 02:51:50
123.207.85.150 attackbots
Mar 12 13:52:56 vps691689 sshd[22516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.85.150
Mar 12 13:52:58 vps691689 sshd[22516]: Failed password for invalid user web from 123.207.85.150 port 33734 ssh2
...
2020-03-13 02:32:26
94.158.22.89 attack
B: Magento admin pass test (wrong country)
2020-03-13 02:22:53
91.215.191.184 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-13 02:17:13
58.65.211.184 attackspam
2020-02-13T20:25:51.031Z CLOSE host=58.65.211.184 port=49352 fd=5 time=130.055 bytes=269
...
2020-03-13 02:52:09
132.255.216.123 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-13 02:45:10
104.199.80.9 attackspambots
Fail2Ban Ban Triggered
2020-03-13 02:36:57

Recently Reported IPs

95.67.243.105 82.118.164.20 168.238.11.200 42.116.43.200
212.98.250.106 218.60.67.126 182.184.111.111 172.246.68.2
123.146.6.245 248.94.240.46 118.175.16.2 96.87.122.123
67.2.8.226 80.10.9.81 63.159.251.38 192.168.1.101
61.164.96.82 60.184.132.113 45.160.178.50 37.193.64.160