Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Romania

Internet Service Provider: SC Nextgen Communications SRL

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspambots
Automatic report - Port Scan Attack
2020-03-04 20:08:18
attackbots
Unauthorized connection attempt detected from IP address 94.52.29.41 to port 23 [J]
2020-02-25 12:46:05
attack
Automatic report - Port Scan Attack
2020-02-17 23:50:36
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.52.29.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7276
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;94.52.29.41.			IN	A

;; AUTHORITY SECTION:
.			495	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020021700 1800 900 604800 86400

;; Query time: 101 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 17 23:50:29 CST 2020
;; MSG SIZE  rcvd: 115
Host info
41.29.52.94.in-addr.arpa domain name pointer 94-52-29-41.next-gen.ro.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
41.29.52.94.in-addr.arpa	name = 94-52-29-41.next-gen.ro.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
77.87.212.220 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 62 - port: 123 proto: UDP cat: Misc Attack
2020-03-29 16:23:58
185.212.129.25 attack
SSH login attempts.
2020-03-29 16:36:52
14.138.16.92 attackspam
trying to access non-authorized port
2020-03-29 16:12:57
114.236.224.189 attackspam
SSH login attempts.
2020-03-29 16:15:30
152.136.90.196 attackbots
Invalid user ubi from 152.136.90.196 port 58218
2020-03-29 16:21:16
217.72.192.67 attackspam
SSH login attempts.
2020-03-29 16:48:39
122.224.232.66 attackbots
Mar 29 08:04:21 santamaria sshd\[26153\]: Invalid user kfo from 122.224.232.66
Mar 29 08:04:21 santamaria sshd\[26153\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.224.232.66
Mar 29 08:04:24 santamaria sshd\[26153\]: Failed password for invalid user kfo from 122.224.232.66 port 26797 ssh2
...
2020-03-29 16:41:43
72.35.23.4 attackbotsspam
SSH login attempts.
2020-03-29 16:50:46
98.136.96.75 attack
SSH login attempts.
2020-03-29 16:44:56
101.231.124.6 attackbotsspam
$f2bV_matches
2020-03-29 16:55:40
138.197.158.118 attackspambots
Mar 29 09:38:04 dev0-dcde-rnet sshd[14045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.158.118
Mar 29 09:38:07 dev0-dcde-rnet sshd[14045]: Failed password for invalid user cyd from 138.197.158.118 port 59542 ssh2
Mar 29 09:44:35 dev0-dcde-rnet sshd[14146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.158.118
2020-03-29 16:14:22
49.232.5.122 attackbotsspam
SSH login attempts.
2020-03-29 16:14:42
190.210.164.165 attack
Invalid user cpanelconnecttrack from 190.210.164.165 port 50854
2020-03-29 16:15:00
119.96.223.211 attack
Invalid user blasia from 119.96.223.211 port 52803
2020-03-29 16:36:18
203.189.253.243 attackspambots
Mar 29 10:15:47 vpn01 sshd[18545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.189.253.243
Mar 29 10:15:49 vpn01 sshd[18545]: Failed password for invalid user yyc from 203.189.253.243 port 53714 ssh2
...
2020-03-29 16:16:18

Recently Reported IPs

122.15.137.106 36.238.156.250 199.244.88.131 177.87.161.51
113.173.235.68 191.6.87.183 42.113.108.190 122.100.110.121
85.251.136.40 213.57.243.77 171.235.123.82 85.121.162.134
123.98.203.43 115.134.128.90 213.57.217.154 77.42.121.241
183.109.53.210 59.126.95.45 14.127.251.79 176.43.107.245