Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Poland

Internet Service Provider: KEI.PL Sp. z o.o.

Hostname: unknown

Organization: KEI.PL Sp. z o.o.

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
Autoban   94.152.136.45 AUTH/CONNECT
2019-08-05 06:46:33
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.152.136.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31097
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;94.152.136.45.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052600 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun May 26 21:10:38 CST 2019
;; MSG SIZE  rcvd: 117

Host info
45.136.152.94.in-addr.arpa domain name pointer mars.charyty.pl.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
45.136.152.94.in-addr.arpa	name = mars.charyty.pl.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
47.206.62.218 attack
Honeypot attack, port: 445, PTR: static-47-206-62-218.tamp.fl.frontiernet.net.
2020-09-05 14:14:56
54.39.133.91 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 38 - port: 16625 proto: tcp cat: Misc Attackbytes: 60
2020-09-05 14:33:25
49.207.22.42 attack
Port Scan
...
2020-09-05 14:33:48
197.51.193.194 attackspam
Honeypot attack, port: 81, PTR: host-197.51.193.194.tedata.net.
2020-09-05 14:29:38
78.28.233.52 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-05 14:26:14
141.98.10.209 attackbots
$f2bV_matches
2020-09-05 14:45:43
95.49.251.183 attackspambots
Automatic report - Banned IP Access
2020-09-05 14:11:08
178.128.248.121 attackspambots
2020-09-05T13:21:01.000568hostname sshd[97805]: Failed password for invalid user edmond from 178.128.248.121 port 60208 ssh2
...
2020-09-05 14:28:49
211.34.252.96 attack
Honeypot attack, port: 81, PTR: PTR record not found
2020-09-05 14:16:39
197.51.216.156 attack
1599238270 - 09/04/2020 18:51:10 Host: 197.51.216.156/197.51.216.156 Port: 445 TCP Blocked
2020-09-05 14:05:19
194.26.25.97 attackbotsspam
[MK-VM4] Blocked by UFW
2020-09-05 14:32:20
104.168.99.225 attackbotsspam
Scanning
2020-09-05 14:19:58
154.70.208.66 attackspambots
Sep  5 00:01:35 haigwepa sshd[32486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.70.208.66 
Sep  5 00:01:37 haigwepa sshd[32486]: Failed password for invalid user dp from 154.70.208.66 port 49078 ssh2
...
2020-09-05 14:09:25
54.38.187.5 attackbots
Invalid user jenkins from 54.38.187.5 port 34000
2020-09-05 14:45:24
220.134.169.119 attackbotsspam
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-05 14:21:39

Recently Reported IPs

83.34.111.104 230.170.31.47 186.251.103.131 230.116.48.28
20.73.155.165 94.129.173.25 60.23.140.171 192.179.32.181
251.66.71.151 94.127.217.66 93.87.35.12 70.114.135.43
14.150.143.180 212.158.125.187 186.250.160.120 94.107.10.196
41.98.45.66 91.204.230.133 94.104.218.159 202.157.38.248