Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Poland

Internet Service Provider: Net-Elektronik Bernard Niemiec

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attack
Jun 18 11:01:15 mail.srvfarm.net postfix/smtpd[1394856]: warning: 94-40-82-58.tktelekom.pl[94.40.82.58]: SASL PLAIN authentication failed: 
Jun 18 11:01:15 mail.srvfarm.net postfix/smtpd[1394856]: lost connection after AUTH from 94-40-82-58.tktelekom.pl[94.40.82.58]
Jun 18 11:08:11 mail.srvfarm.net postfix/smtps/smtpd[1421161]: warning: 94-40-82-58.tktelekom.pl[94.40.82.58]: SASL PLAIN authentication failed: 
Jun 18 11:08:11 mail.srvfarm.net postfix/smtps/smtpd[1421161]: lost connection after AUTH from 94-40-82-58.tktelekom.pl[94.40.82.58]
Jun 18 11:09:27 mail.srvfarm.net postfix/smtps/smtpd[1409846]: warning: 94-40-82-58.tktelekom.pl[94.40.82.58]: SASL PLAIN authentication failed:
2020-06-19 03:36:57
Comments on same subnet:
IP Type Details Datetime
94.40.82.48 attackbots
mail auth brute force
2020-10-07 06:44:15
94.40.82.48 attackbots
mail auth brute force
2020-10-06 23:02:40
94.40.82.48 attackbots
mail auth brute force
2020-10-06 14:49:10
94.40.82.147 attackbotsspam
2020-07-1105:23:32dovecot_plainauthenticatorfailedfor\([189.85.30.243]\)[189.85.30.243]:41428:535Incorrectauthenticationdata\(set_id=info\)2020-07-1105:11:47dovecot_plainauthenticatorfailedfor\([91.236.133.10]\)[91.236.133.10]:39666:535Incorrectauthenticationdata\(set_id=info\)2020-07-1105:25:38dovecot_plainauthenticatorfailedfor\([94.40.82.147]\)[94.40.82.147]:3880:535Incorrectauthenticationdata\(set_id=info\)2020-07-1105:35:38dovecot_plainauthenticatorfailedfor\([191.53.252.127]\)[191.53.252.127]:47526:535Incorrectauthenticationdata\(set_id=info\)2020-07-1105:10:47dovecot_plainauthenticatorfailedfor\([190.109.43.98]\)[190.109.43.98]:54287:535Incorrectauthenticationdata\(set_id=info\)2020-07-1105:48:52dovecot_plainauthenticatorfailedfor\([177.85.19.101]\)[177.85.19.101]:57300:535Incorrectauthenticationdata\(set_id=info\)2020-07-1105:41:29dovecot_plainauthenticatorfailedfor\([179.108.240.102]\)[179.108.240.102]:43310:535Incorrectauthenticationdata\(set_id=info\)2020-07-1105:11:22dovecot_plainauthenticatorfail
2020-07-11 19:24:43
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.40.82.58
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64698
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;94.40.82.58.			IN	A

;; AUTHORITY SECTION:
.			455	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020061801 1800 900 604800 86400

;; Query time: 122 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 19 03:36:51 CST 2020
;; MSG SIZE  rcvd: 115
Host info
58.82.40.94.in-addr.arpa domain name pointer 94-40-82-58.tktelekom.pl.
Nslookup info:
Server:		100.100.2.138
Address:	100.100.2.138#53

Non-authoritative answer:
58.82.40.94.in-addr.arpa	name = 94-40-82-58.tktelekom.pl.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
49.234.108.12 attackspambots
Jan 26 01:04:31 localhost sshd\[11591\]: Invalid user antonio from 49.234.108.12 port 57956
Jan 26 01:04:31 localhost sshd\[11591\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.108.12
Jan 26 01:04:33 localhost sshd\[11591\]: Failed password for invalid user antonio from 49.234.108.12 port 57956 ssh2
2020-01-26 08:44:43
195.54.166.33 attack
Jan 26 01:24:00 debian-2gb-nbg1-2 kernel: \[2257513.689330\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=195.54.166.33 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=56776 PROTO=TCP SPT=8080 DPT=9988 WINDOW=1024 RES=0x00 SYN URGP=0
2020-01-26 08:27:37
183.129.185.170 attack
Unauthorized connection attempt detected from IP address 183.129.185.170 to port 1433 [T]
2020-01-26 08:29:11
116.113.99.173 attackspam
Unauthorized connection attempt detected from IP address 116.113.99.173 to port 5555 [T]
2020-01-26 08:36:09
159.203.201.0 attackbots
Unauthorized connection attempt detected from IP address 159.203.201.0 to port 1911 [T]
2020-01-26 08:54:13
180.122.93.238 attackbots
Unauthorized connection attempt detected from IP address 180.122.93.238 to port 6656 [T]
2020-01-26 08:52:30
49.86.62.113 attackspambots
Unauthorized connection attempt detected from IP address 49.86.62.113 to port 6656 [T]
2020-01-26 08:45:00
180.178.129.226 attackspambots
DATE:2020-01-25 22:09:09, IP:180.178.129.226, PORT:1433 MSSQL brute force auth on honeypot server (epe-honey1-hq)
2020-01-26 08:13:57
106.6.233.205 attack
Unauthorized connection attempt detected from IP address 106.6.233.205 to port 6656 [T]
2020-01-26 08:23:11
36.155.112.131 attackspambots
Jan 25 14:24:30 eddieflores sshd\[14912\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.112.131  user=root
Jan 25 14:24:32 eddieflores sshd\[14912\]: Failed password for root from 36.155.112.131 port 52934 ssh2
Jan 25 14:28:02 eddieflores sshd\[15488\]: Invalid user alex from 36.155.112.131
Jan 25 14:28:02 eddieflores sshd\[15488\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.112.131
Jan 25 14:28:03 eddieflores sshd\[15488\]: Failed password for invalid user alex from 36.155.112.131 port 38439 ssh2
2020-01-26 08:47:58
148.70.242.53 attackbots
Unauthorized connection attempt detected from IP address 148.70.242.53 to port 80 [J]
2020-01-26 08:54:43
60.169.217.85 attack
Unauthorized connection attempt detected from IP address 60.169.217.85 to port 6656 [T]
2020-01-26 08:43:42
115.221.114.98 attack
Unauthorized connection attempt detected from IP address 115.221.114.98 to port 6656 [T]
2020-01-26 08:36:22
140.237.162.210 attackspambots
Unauthorized connection attempt detected from IP address 140.237.162.210 to port 6656 [T]
2020-01-26 08:17:02
2a01:4f8:110:512d::2 attackspam
20 attempts against mh-misbehave-ban on cedar
2020-01-26 08:25:41

Recently Reported IPs

130.61.21.255 124.196.16.75 130.211.107.52 130.162.67.221
47.29.255.124 197.1.231.136 130.162.115.144 196.84.28.141
130.105.41.126 119.123.225.216 171.76.249.83 40.12.114.65
92.113.144.200 180.228.119.65 47.240.74.178 212.227.41.213
47.240.72.60 240.226.114.2 13.95.130.2 193.122.218.197