Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Croatia

Internet Service Provider: A1 Hrvatska d.o.o.

Hostname: unknown

Organization: unknown

Usage Type: Mobile ISP

Comments:
Type Details Datetime
attackspam
Nov 26 15:39:45 mxgate1 postfix/postscreen[7222]: CONNECT from [94.253.160.5]:33134 to [176.31.12.44]:25
Nov 26 15:39:45 mxgate1 postfix/dnsblog[7223]: addr 94.253.160.5 listed by domain zen.spamhaus.org as 127.0.0.10
Nov 26 15:39:45 mxgate1 postfix/dnsblog[7223]: addr 94.253.160.5 listed by domain zen.spamhaus.org as 127.0.0.4
Nov 26 15:39:45 mxgate1 postfix/dnsblog[7226]: addr 94.253.160.5 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Nov 26 15:39:45 mxgate1 postfix/dnsblog[7227]: addr 94.253.160.5 listed by domain b.barracudacentral.org as 127.0.0.2
Nov 26 15:39:46 mxgate1 postfix/dnsblog[7224]: addr 94.253.160.5 listed by domain cbl.abuseat.org as 127.0.0.2
Nov 26 15:39:51 mxgate1 postfix/postscreen[7222]: DNSBL rank 5 for [94.253.160.5]:33134
Nov x@x
Nov 26 15:39:52 mxgate1 postfix/postscreen[7222]: HANGUP after 1.7 from [94.253.160.5]:33134 in tests after SMTP handshake
Nov 26 15:39:52 mxgate1 postfix/postscreen[7222]: DISCONNECT [94.253.160.5]:33134


........
--------------------------------------
2019-11-27 01:57:01
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.253.160.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60236
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;94.253.160.5.			IN	A

;; AUTHORITY SECTION:
.			579	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019112601 1800 900 604800 86400

;; Query time: 155 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Nov 27 01:56:57 CST 2019
;; MSG SIZE  rcvd: 116
Host info
5.160.253.94.in-addr.arpa domain name pointer cpe-94-253-160-5.zg.cable.xnet.hr.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
5.160.253.94.in-addr.arpa	name = cpe-94-253-160-5.zg.cable.xnet.hr.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
220.249.112.150 attackbots
Oct 16 03:11:09 apollo sshd\[23123\]: Failed password for root from 220.249.112.150 port 28144 ssh2Oct 16 03:23:06 apollo sshd\[23191\]: Invalid user gz from 220.249.112.150Oct 16 03:23:08 apollo sshd\[23191\]: Failed password for invalid user gz from 220.249.112.150 port 38177 ssh2
...
2019-10-16 09:38:00
76.74.170.93 attackbots
'Fail2Ban'
2019-10-16 09:52:50
81.22.45.116 attack
Oct 16 02:59:17 h2177944 kernel: \[4063527.717841\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.116 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=28066 PROTO=TCP SPT=48687 DPT=8112 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 16 03:05:04 h2177944 kernel: \[4063875.074967\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.116 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=53505 PROTO=TCP SPT=48687 DPT=8288 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 16 03:05:26 h2177944 kernel: \[4063896.942180\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.116 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=11862 PROTO=TCP SPT=48687 DPT=7940 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 16 03:07:13 h2177944 kernel: \[4064004.376876\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.116 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=47150 PROTO=TCP SPT=48687 DPT=7611 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 16 03:17:21 h2177944 kernel: \[4064611.838366\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.116 DST=85.214.117.9 LEN=
2019-10-16 09:31:48
158.174.122.199 attackbotsspam
Automatic report - XMLRPC Attack
2019-10-16 09:51:10
148.72.207.248 attack
SSH-BruteForce
2019-10-16 09:32:03
189.195.143.166 attackbotsspam
SMB Server BruteForce Attack
2019-10-16 10:03:02
37.46.135.129 attackspambots
Oct 16 00:53:48 h2177944 sshd\[31564\]: Invalid user bucco from 37.46.135.129 port 42404
Oct 16 00:53:48 h2177944 sshd\[31564\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.46.135.129
Oct 16 00:53:50 h2177944 sshd\[31564\]: Failed password for invalid user bucco from 37.46.135.129 port 42404 ssh2
Oct 16 01:09:58 h2177944 sshd\[990\]: Invalid user oa from 37.46.135.129 port 48900
Oct 16 01:09:58 h2177944 sshd\[990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.46.135.129
...
2019-10-16 10:00:36
85.99.72.198 attack
" "
2019-10-16 09:39:27
42.62.2.130 attackbots
firewall-block, port(s): 1433/tcp
2019-10-16 09:40:27
60.182.38.240 attack
$f2bV_matches
2019-10-16 10:07:20
94.7.71.245 attackbots
Automatic report - Port Scan Attack
2019-10-16 09:41:44
159.203.32.174 attackbots
Oct 16 03:02:58 ns41 sshd[22524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.32.174
Oct 16 03:02:58 ns41 sshd[22524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.32.174
2019-10-16 09:36:07
45.124.86.65 attackspam
$f2bV_matches
2019-10-16 10:09:01
190.102.140.7 attackbots
Oct 16 02:04:59 ovpn sshd\[20736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.102.140.7  user=root
Oct 16 02:05:01 ovpn sshd\[20736\]: Failed password for root from 190.102.140.7 port 58886 ssh2
Oct 16 02:24:20 ovpn sshd\[24463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.102.140.7  user=root
Oct 16 02:24:21 ovpn sshd\[24463\]: Failed password for root from 190.102.140.7 port 37112 ssh2
Oct 16 02:28:35 ovpn sshd\[25311\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.102.140.7  user=root
2019-10-16 09:58:56
185.104.185.39 attackspambots
Automatic report - XMLRPC Attack
2019-10-16 09:56:47

Recently Reported IPs

86.209.87.254 123.217.214.115 35.129.171.165 141.207.248.72
25.138.125.127 202.147.51.254 240.246.233.207 54.196.20.203
104.67.246.55 135.237.20.34 24.176.129.156 57.121.33.253
149.255.254.106 102.91.219.226 100.175.102.194 122.225.78.42
190.215.83.199 167.172.34.211 200.61.216.146 36.37.88.167