Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: Nine Internet Solutions AG

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
Malicious brute force vulnerability hacking attacks
2020-08-02 06:30:39
attackspambots
CMS (WordPress or Joomla) login attempt.
2020-07-19 20:08:49
attackspambots
Unauthorized connection attempt detected from IP address 94.230.208.148 to port 21
2020-07-05 17:21:35
attack
Automatic report - Port Scan
2020-05-13 17:45:29
attack
02/09/2020-23:07:35.056693 94.230.208.148 Protocol: 6 ET TOR Known Tor Exit Node Traffic group 89
2020-02-10 07:52:18
attackbotsspam
Unauthorized access detected from banned ip
2020-01-14 04:49:31
attack
Automatic report - XMLRPC Attack
2019-10-17 23:18:40
attackbotsspam
Automatic report - XMLRPC Attack
2019-10-06 05:10:06
attack
Faked Googlebot
2019-09-15 19:03:07
attackspambots
LGS,WP GET /wp-login.php
2019-08-09 23:11:24
Comments on same subnet:
IP Type Details Datetime
94.230.208.147 attack
DATE:2020-07-17 14:13:06, IP:94.230.208.147, PORT:5900 VNC brute force auth on honeypot server (epe-honey1-hq)
2020-07-17 22:32:06
94.230.208.147 attack
(mod_security) mod_security (id:218420) triggered by 94.230.208.147 (CH/Switzerland/tor3e1.digitale-gesellschaft.ch): 5 in the last 3600 secs
2020-07-15 20:24:05
94.230.208.147 attackspambots
AbusiveCrawling
2020-07-07 05:14:43
94.230.208.147 attack
WordPress user registration, really-simple-captcha js check bypass
2020-05-23 00:24:53
94.230.208.147 attackbots
Automatic report - Banned IP Access
2020-03-12 17:50:03
94.230.208.147 attack
Unauthorized access detected from banned ip
2020-01-26 22:08:54
94.230.208.147 attackspambots
Automatic report - XMLRPC Attack
2019-11-25 22:22:02
94.230.208.147 attackbots
abcdata-sys.de:80 94.230.208.147 - - \[17/Oct/2019:16:55:13 +0200\] "POST /xmlrpc.php HTTP/1.0" 301 497 "-" "Mozilla/5.0 \(Macintosh\; Intel Mac OS X 10_13_6\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/69.0.3497.100 Safari/537.36"
www.goldgier.de 94.230.208.147 \[17/Oct/2019:16:55:15 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 4081 "-" "Mozilla/5.0 \(Macintosh\; Intel Mac OS X 10_13_6\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/69.0.3497.100 Safari/537.36"
2019-10-18 02:44:28
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.230.208.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45446
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;94.230.208.148.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051402 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed May 15 08:46:17 CST 2019
;; MSG SIZE  rcvd: 118

Host info
148.208.230.94.in-addr.arpa domain name pointer tor3e3.digitale-gesellschaft.ch.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
148.208.230.94.in-addr.arpa	name = tor3e3.digitale-gesellschaft.ch.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
104.236.63.99 attackspam
2020-10-02 15:34:16.808545-0500  localhost sshd[73822]: Failed password for invalid user ubuntu from 104.236.63.99 port 36532 ssh2
2020-10-04 03:06:35
128.199.247.226 attackbots
Oct  3 15:02:22 icinga sshd[33954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.247.226 
Oct  3 15:02:24 icinga sshd[33954]: Failed password for invalid user git from 128.199.247.226 port 37864 ssh2
Oct  3 15:05:48 icinga sshd[39989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.247.226 
...
2020-10-04 03:05:34
201.116.194.210 attackbots
20 attempts against mh-ssh on cloud
2020-10-04 03:18:26
118.24.202.34 attackbots
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-10-04 03:31:50
64.227.25.8 attackbots
invalid user
2020-10-04 03:07:10
183.234.184.4 attack
2020-10-03T22:31:42.243596hostname sshd[63150]: Failed password for invalid user teacher1 from 183.234.184.4 port 45524 ssh2
...
2020-10-04 03:25:28
206.189.136.185 attackspam
2020-10-03T21:03:45.630229vps773228.ovh.net sshd[6344]: Invalid user lukas from 206.189.136.185 port 42288
2020-10-03T21:03:45.644193vps773228.ovh.net sshd[6344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.136.185
2020-10-03T21:03:45.630229vps773228.ovh.net sshd[6344]: Invalid user lukas from 206.189.136.185 port 42288
2020-10-03T21:03:48.032702vps773228.ovh.net sshd[6344]: Failed password for invalid user lukas from 206.189.136.185 port 42288 ssh2
2020-10-03T21:07:34.611889vps773228.ovh.net sshd[6368]: Invalid user maxime from 206.189.136.185 port 33304
...
2020-10-04 03:31:33
49.88.112.71 attackspam
Oct  3 21:19:34 eventyay sshd[7578]: Failed password for root from 49.88.112.71 port 64655 ssh2
Oct  3 21:20:32 eventyay sshd[7616]: Failed password for root from 49.88.112.71 port 64795 ssh2
...
2020-10-04 03:29:24
193.247.213.196 attackspambots
SSH login attempts.
2020-10-04 03:39:42
78.161.82.194 attackbots
SSH bruteforce
2020-10-04 03:14:24
27.4.171.173 attack
Icarus honeypot on github
2020-10-04 03:24:09
180.76.150.238 attackbots
(sshd) Failed SSH login from 180.76.150.238 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  3 06:56:49 server2 sshd[30093]: Invalid user vendas from 180.76.150.238
Oct  3 06:56:49 server2 sshd[30093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.150.238 
Oct  3 06:56:51 server2 sshd[30093]: Failed password for invalid user vendas from 180.76.150.238 port 53560 ssh2
Oct  3 07:01:16 server2 sshd[2385]: Invalid user user from 180.76.150.238
Oct  3 07:01:16 server2 sshd[2385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.150.238
2020-10-04 03:32:17
142.44.170.9 attackbots
SpamScore above: 10.0
2020-10-04 03:09:59
180.76.157.174 attack
Oct  3 18:13:18 serwer sshd\[14198\]: Invalid user steam from 180.76.157.174 port 51908
Oct  3 18:13:18 serwer sshd\[14198\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.157.174
Oct  3 18:13:20 serwer sshd\[14198\]: Failed password for invalid user steam from 180.76.157.174 port 51908 ssh2
...
2020-10-04 03:15:37
94.180.25.5 attack
" "
2020-10-04 03:34:14

Recently Reported IPs

139.28.218.145 93.115.250.15 89.24.119.126 37.239.143.105
24.59.142.231 30.39.247.141 30.108.137.138 14.161.0.62
204.89.28.185 71.130.159.90 2.129.228.134 80.110.211.94
133.249.152.106 178.181.16.22 39.106.9.215 134.97.118.84
179.210.1.107 27.0.216.24 243.248.242.48 156.150.55.239