Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Chisinau

Region: Municipiul Chişinău

Country: Moldova

Internet Service Provider: Orange

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.243.105.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58533
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.243.105.157.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031701 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 18 09:59:06 CST 2025
;; MSG SIZE  rcvd: 107
Host info
157.105.243.94.in-addr.arpa domain name pointer host-94-243-105-157.hspa.orange.md.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
157.105.243.94.in-addr.arpa	name = host-94-243-105-157.hspa.orange.md.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
165.227.91.185 attackbotsspam
DATE:2019-12-26 07:25:05, IP:165.227.91.185, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-12-26 18:24:04
66.112.216.105 attack
Dec 26 09:06:44 localhost sshd\[9016\]: Invalid user hardcore from 66.112.216.105 port 42384
Dec 26 09:06:44 localhost sshd\[9016\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.112.216.105
Dec 26 09:06:46 localhost sshd\[9016\]: Failed password for invalid user hardcore from 66.112.216.105 port 42384 ssh2
2019-12-26 18:39:34
58.210.180.190 attackspam
Dec 26 12:19:10 server2 sshd\[31436\]: User root from 58.210.180.190 not allowed because not listed in AllowUsers
Dec 26 12:19:11 server2 sshd\[31440\]: Invalid user DUP from 58.210.180.190
Dec 26 12:19:15 server2 sshd\[31442\]: User root from 58.210.180.190 not allowed because not listed in AllowUsers
Dec 26 12:19:17 server2 sshd\[31444\]: User bin from 58.210.180.190 not allowed because not listed in AllowUsers
Dec 26 12:19:19 server2 sshd\[31446\]: User bin from 58.210.180.190 not allowed because not listed in AllowUsers
Dec 26 12:19:22 server2 sshd\[31448\]: User root from 58.210.180.190 not allowed because not listed in AllowUsers
2019-12-26 18:45:23
213.14.171.152 attackbots
Unauthorized connection attempt detected from IP address 213.14.171.152 to port 1433
2019-12-26 18:54:31
117.222.166.102 attackbotsspam
Unauthorized connection attempt detected from IP address 117.222.166.102 to port 445
2019-12-26 18:20:18
122.165.207.151 attack
Dec 26 06:21:11 game-panel sshd[28857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.165.207.151
Dec 26 06:21:13 game-panel sshd[28857]: Failed password for invalid user hind from 122.165.207.151 port 50714 ssh2
Dec 26 06:24:49 game-panel sshd[28952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.165.207.151
2019-12-26 18:33:39
51.77.211.94 attack
--- report ---
Dec 26 06:47:59 sshd: Connection from 51.77.211.94 port 51016
2019-12-26 18:17:16
129.204.202.89 attack
Automatic report - Banned IP Access
2019-12-26 18:51:15
157.230.42.76 attackspam
--- report ---
Dec 26 03:09:33 sshd: Connection from 157.230.42.76 port 53465
Dec 26 03:09:34 sshd: Invalid user tiw from 157.230.42.76
Dec 26 03:09:37 sshd: Failed password for invalid user tiw from 157.230.42.76 port 53465 ssh2
Dec 26 03:09:37 sshd: Received disconnect from 157.230.42.76: 11: Bye Bye [preauth]
2019-12-26 18:19:20
113.161.80.159 attack
Unauthorised access (Dec 26) SRC=113.161.80.159 LEN=52 PREC=0x20 TTL=118 ID=206 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-26 18:28:04
99.225.61.38 attackspam
--- report ---
Dec 26 06:51:12 sshd: Connection from 99.225.61.38 port 52879
Dec 26 06:51:42 sshd: Failed password for root from 99.225.61.38 port 52879 ssh2
Dec 26 06:51:42 sshd: Received disconnect from 99.225.61.38: 11: Bye Bye [preauth]
2019-12-26 18:21:12
124.92.34.223 attack
Fail2Ban - FTP Abuse Attempt
2019-12-26 18:49:12
106.193.10.225 attack
1577341514 - 12/26/2019 07:25:14 Host: 106.193.10.225/106.193.10.225 Port: 445 TCP Blocked
2019-12-26 18:13:07
83.12.198.38 attackspambots
Dec 26 01:19:05 plusreed sshd[28021]: Invalid user user1 from 83.12.198.38
Dec 26 01:19:05 plusreed sshd[28021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.12.198.38
Dec 26 01:19:05 plusreed sshd[28021]: Invalid user user1 from 83.12.198.38
Dec 26 01:19:07 plusreed sshd[28021]: Failed password for invalid user user1 from 83.12.198.38 port 49052 ssh2
Dec 26 01:25:09 plusreed sshd[29435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.12.198.38  user=root
Dec 26 01:25:11 plusreed sshd[29435]: Failed password for root from 83.12.198.38 port 50194 ssh2
...
2019-12-26 18:15:51
73.93.102.54 attackbotsspam
Invalid user squid from 73.93.102.54 port 50200
2019-12-26 18:19:50

Recently Reported IPs

88.16.61.234 77.229.129.148 217.62.98.215 25.154.252.116
248.39.63.177 187.238.85.213 106.23.97.202 83.64.35.87
28.118.84.162 132.136.252.193 148.233.102.231 235.111.8.253
30.140.214.35 232.175.114.74 145.30.185.85 222.97.94.197
77.79.242.96 112.237.208.26 174.68.242.125 84.117.12.37