Go
93.174.95.106
is an
Open Proxy
used by
Hackers
100 %
Seychelles
Report Abuse
1007attacks reported
606Port Scan
149Port ScanHacking
56Port ScanHackingExploited Host
24Web App Attack
24Brute-Force
19uncategorized
16HackingBad Web BotWeb App Attack
11Brute-ForceMailserver Attack
10Hacking
9HackingBrute-Force
...
39abuse reported
12Web SpamPort ScanBrute-ForceSSHIoT Targeted
9Email Spam
4Email SpamBrute-Force
4Email SpamPort ScanHacking
3Bad Web BotWeb App Attack
2Bad Web Bot
2uncategorized
1Email SpamBrute-ForceExploited Host
1Web Spam
1Email SpamBad Web BotWeb App Attack
7reputation reported
5uncategorized
2Brute-ForceMailserver Attack
4anonymizers reported
1VPN IPPort ScanHacking
1VPN IPPort Scan
1VPN IP
1VPN IPPort ScanBrute-Force
3malware reported
2Malware
1Exploited Host
2spam reported
2Email Spam
from 90 distinct reporters
and 10 distinct sources : urandom.us.to, VoIPBL.org, FireHOL, Blocklist.de, NormShield.com, BadIPs.com, GreenSnow.co, blocklist.net.ua, Taichung Education Center, AbuseIPDB
93.174.95.106 was first signaled at 2017-12-02 11:34 and last record was at 2020-11-05 05:13.
IP

93.174.95.106

Organization
Internet Assigned Numbers Authority
Localisation
Seychelles
NetRange : First & Last IP
0.0.0.0 - 255.255.255.255
Network CIDR
0.0.0.0/0

Cybercrime IP Feeds

Date UTC Category Sub Categories Source List Source Logs
2019-09-20 20:40 attacks Port Scan AbuseIPDB Port scan attempt detected by AWS-CCS, CTS, India
2019-09-20 15:58 attacks Port Scan AbuseIPDB " "
2019-09-20 13:11 attacks Port ScanHackingExploited Host AbuseIPDB Port scan: Attack repeated for 24 hours
2019-09-20 04:50 attacks Port Scan AbuseIPDB Sep 4 19:25:41 mercury kernel: [UFW ALLOW] IN=eth0 OUT= MAC=f2:3c:91:bc:4d:f8:84:78:ac:0d:8f:41:08:00 SRC=93.174.95.106 DST=109.74.200.221 LEN=220 TOS
2019-09-20 04:34 attacks HackingBrute-Force AbuseIPDB Sep 1 21:50:15 mercury smtpd[4691]: b28327e8c53a22de smtp event=bad-input address=93.174.95.106 host=battery.census.shodan.io result="500 5.5.1 I
2019-09-19 21:59 attacks Port ScanHacking AbuseIPDB MultiHost/MultiPort Probe, Scan, Hack -
2019-09-19 21:05 attacks Port Scan AbuseIPDB Automatic report - Port Scan Attack
2019-09-19 19:39 attacks Port Scan AbuseIPDB UTC: 2019-09-19 pkts: 2(1, 1) port(tcp): 83 port(udp): 129
2019-09-19 17:57 attacks Port Scan AbuseIPDB 503/tcp 3386/udp 60001/tcp... [2019-07-20/09-19]616pkt,340pt.(tcp),37pt.(udp)
2019-09-19 11:59 attacks Port Scan AbuseIPDB 09/19/2019-16:59:42.395395 93.174.95.106 Protocol: 17 GPL DNS named version attempt
2019-09-19 10:17 attacks Port Scan AbuseIPDB Scanning random ports - tries to find possible vulnerable services
2019-09-19 06:35 attacks Port Scan AbuseIPDB " "
2019-09-19 03:43 attacks Hacking AbuseIPDB 09/19/2019-08:43:46.820005 93.174.95.106 Protocol: 6 ET SCAN Suspicious inbound to PostgreSQL port 5432
2019-09-18 19:14 attacks Port Scan AbuseIPDB UTC: 2019-09-18 port: 502/tcp
2019-09-18 17:26 attacks Web App Attack AbuseIPDB Automatic report - Banned IP Access
2019-09-18 15:18 attacks Port Scan AbuseIPDB Unauthorised access (Sep 19) SRC=93.174.95.106 LEN=44 TTL=122 ID=25794 TCP DPT=5432 WINDOW=51859 SYN
2019-09-18 14:51 attacks Brute-Force AbuseIPDB 3389BruteforceFW21
2019-09-18 11:49 attacks Hacking AbuseIPDB @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-18 19:58:22,667 INFO [
2019-09-18 08:00 attacks Port Scan AbuseIPDB Port scan attempt detected by AWS-CCS, CTS, India
2019-09-18 07:32 attacks Port ScanBrute-Force AbuseIPDB  
2019-09-18 06:20 attacks Brute-Force AbuseIPDB SMTP:25. Blocked 6 login attempts in 884 days. Low frequency hacking for 2.4 years
2019-09-18 05:35 attacks Port ScanHackingExploited Host AbuseIPDB Port scan: Attack repeated for 24 hours
2019-09-18 01:47 attacks Brute-Force AbuseIPDB Attempts against Pop3/IMAP
2019-09-18 00:33 attacks Web App Attack AbuseIPDB  
2019-09-17 18:41 attacks Port ScanHacking AbuseIPDB MultiHost/MultiPort Probe, Scan, Hack -
2019-09-17 18:24 attacks Port Scan AbuseIPDB " "
2019-09-17 12:11 abuse Bad Web BotWeb App Attack AbuseIPDB continuously scanning my web pages for noob vulnerabilities
2019-09-17 10:28 attacks Brute-ForceSSH AbuseIPDB RDP Brute force
2019-09-17 10:05 attacks Port Scan AbuseIPDB Multiport scan : 5 ports scanned 53 1024 1883 2000 52869
2019-09-17 08:05 attacks Port ScanHackingExploited Host AbuseIPDB Honeypot hit.
2019-09-17 06:58 attacks Port Scan AbuseIPDB Automatic report - Port Scan Attack
2019-09-17 06:11 attacks Port ScanHackingBrute-Force AbuseIPDB Portscan or hack attempt detected by psad/fwsnort
2019-09-17 03:39 attacks HackingBad Web BotWeb App Attack AbuseIPDB Fail2Ban Ban Triggered
2019-09-16 22:15 attacks Port ScanHacking AbuseIPDB 1568704538 - 09/17/2019 14:15:38 Host: battery.census.shodan.io/93.174.95.106 Port: 7 UDP Blocked
2019-09-16 16:04 attacks Port ScanHackingExploited Host AbuseIPDB Port scan: Attack repeated for 24 hours
2019-09-16 10:04 attacks Port ScanHackingExploited Host AbuseIPDB scan r
2019-09-16 08:13 abuse Email Spam AbuseIPDB T: f2b postfix aggressive 3x
2019-09-16 07:57 attacks Port Scan AbuseIPDB " "
2019-09-16 02:11 attacks Port ScanHacking AbuseIPDB MultiHost/MultiPort Probe, Scan, Hack -
2019-09-16 01:26 abuse Bad Web BotWeb App Attack AbuseIPDB continuously scanning my web pages for noob vulnerabilities
2019-09-15 15:10 attacks HackingBad Web BotWeb App Attack AbuseIPDB Fail2Ban Ban Triggered
2019-09-15 13:07 attacks Port Scan AbuseIPDB Sep 15 08:27:34 lenivpn01 kernel: \[761646.113817\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=93.174.95.106 DST=195
2019-09-15 11:59 attacks Port ScanHackingExploited Host AbuseIPDB Port scan: Attack repeated for 24 hours
2019-09-15 06:08 attacks Hacking AbuseIPDB 15-Sep-2019 17:08:46.755 client 93.174.95.106#47559 (direct.shodan.io): query (cache) 'direct.shodan.io/A/IN' denied
2019-09-15 05:33 attacks HackingBad Web BotWeb App Attack AbuseIPDB Fail2Ban Ban Triggered
2019-09-15 01:48 attacks Fraud VoIPPort Scan AbuseIPDB Automatic report - Port Scan Attack
2019-09-14 17:27 attacks Port Scan AbuseIPDB " "
2019-09-14 13:54 attacks Port Scan AbuseIPDB  
2019-09-14 11:22 attacks Port ScanHackingExploited Host AbuseIPDB Port scan: Attack repeated for 24 hours
2019-09-14 07:42 attacks Port Scan AbuseIPDB 93.174.95.106 on port: 389 at 9/14/2019 9:05:43 AM
2017-12-02 11:34 attacks Brute-Force AbuseIPDB  
2017-12-02 11:34 attacks Port ScanHacking AbuseIPDB Portscan or hack attempt detected by psad/fwsnort
2017-12-02 11:52 attacks Port Scan AbuseIPDB Port scan attempt detected by AWS-CCS, CTS, India
2019-01-06 22:40 attacks Port Scan AbuseIPDB Hit our honeypot for 41 times at 465/TCP -- Resubmit, still active.
2019-01-07 06:20 attacks Web App Attack AbuseIPDB 93.174.95.106 - - \[07/Jan/2019:17:20:57 +0100\] "GET / HTTP/1.1" 403 427 "-" "Mozilla/5.0 \(Windows NT 6.1\) AppleWebKit/537
2019-01-07 14:41 attacks Port Scan AbuseIPDB 9002/tcp 1911/tcp 8008/tcp... [2018-11-07/2019-01-07]349pkt,187pt.(tcp),32pt.(udp)
2019-01-07 15:45 attacks Web App Attack AbuseIPDB 404 NOT FOUND
2019-01-07 16:09 attacks Port Scan AbuseIPDB 08.01.2019 02:09:31 Connection to port 27015 blocked by firewall
2019-01-07 17:51 attacks Port Scan AbuseIPDB 08.01.2019 03:51:36 Connection to port 631 blocked by firewall
2019-01-07 20:11 attacks Port ScanHacking AbuseIPDB MultiHost/MultiPort Probe, Scan, Hack -
2019-03-29 18:41 reputation Brute-ForceMailserver Attack packetmail  
2019-03-29 18:41 reputation Brute-ForceMailserver Attack packetmail_ramnode  
2019-03-29 18:53 attacks DNS Attack urandomusto_dns urandom.us.to  
2019-03-29 18:53 attacks urandomusto_unspecified urandom.us.to  
2019-03-29 18:53 attacks Fraud VoIP voipbl VoIPBL.org  
2019-06-14 13:52 reputation alienvault_reputation  
2019-06-14 13:54 reputation ciarmy  
2019-06-14 14:00 attacks firehol_level3 FireHOL  
2019-06-15 10:12 reputation iblocklist_ciarmy_malicious  
2019-06-17 09:24 attacks blocklist_de Blocklist.de  
2019-06-17 09:25 attacks Brute-ForceMailserver Attack blocklist_de_mail Blocklist.de  
2019-06-17 09:29 attacks firehol_level2 FireHOL  
2019-06-17 09:34 attacks normshield_all_attack NormShield.com  
2019-06-17 09:34 attacks normshield_high_attack NormShield.com  
2019-06-17 09:39 reputation turris_greylist  
2019-06-18 08:39 abuse normshield_all_suspicious NormShield.com  
2019-06-18 08:39 abuse normshield_high_suspicious NormShield.com  
2019-06-19 07:32 attacks bi_any_0_1d BadIPs.com  
2019-06-19 07:32 attacks bi_any_1_7d BadIPs.com  
2019-06-19 07:32 attacks bi_any_2_1d BadIPs.com  
2019-06-19 07:32 attacks bi_any_2_30d BadIPs.com  
2019-06-19 07:33 attacks bi_any_2_7d BadIPs.com  
2019-06-19 07:33 attacks Brute-ForceMailserver Attack bi_dovecot_0_1d BadIPs.com  
2019-06-19 07:33 attacks Brute-ForceMailserver Attack bi_dovecot_1_7d BadIPs.com  
2019-06-19 07:33 attacks Brute-ForceMailserver Attack bi_dovecot_2_30d BadIPs.com  
2019-06-19 07:33 attacks Brute-ForceMailserver Attack bi_mail_0_1d BadIPs.com  
2019-06-19 07:33 attacks Brute-ForceMailserver Attack bi_mail_1_7d BadIPs.com  
2019-06-19 07:33 attacks Brute-ForceMailserver Attack bi_mail_2_30d BadIPs.com  
2019-06-19 07:34 attacks Brute-ForceMailserver Attack blocklist_de_imap Blocklist.de  
2019-06-20 06:35 attacks greensnow GreenSnow.co  
2019-06-22 04:38 attacks SSH blocklist_de_ssh Blocklist.de  
2019-06-23 02:56 abuse Email Spam blocklist_net_ua blocklist.net.ua  
2019-06-23 03:00 attacks firehol_level4 FireHOL  
2019-06-24 02:39 attacks Brute-Force normshield_all_bruteforce NormShield.com  
2019-06-24 02:39 attacks Brute-Force normshield_high_bruteforce NormShield.com  
2019-06-28 22:41 reputation bds_atif  
2019-07-30 19:19 spam Email Spam normshield_all_spam  
2019-07-30 19:19 spam Email Spam normshield_high_spam  
2019-08-02 14:35 attacks Bad Web Bot bi_badbots_0_1d BadIPs.com  
2019-08-02 14:35 attacks Bad Web Bot bi_badbots_1_7d BadIPs.com  
2019-08-02 14:35 attacks Brute-Force bi_bruteforce_0_1d BadIPs.com  
2019-08-02 14:35 attacks Brute-Force bi_bruteforce_1_7d BadIPs.com  
2019-08-02 14:35 attacks bi_http_0_1d BadIPs.com  
2019-08-02 14:51 attacks normshield_all_webscan NormShield.com  
2019-08-03 15:01 attacks bi_http_1_7d BadIPs.com  
2019-08-03 15:01 attacks bi_http_2_30d BadIPs.com  
2019-08-10 08:46 attacks taichung Taichung Education Center  
2019-08-21 16:36 attacks DNS Attack normshield_all_dnsscan NormShield.com  
2019-08-21 16:36 attacks DNS Attack normshield_high_dnsscan NormShield.com  
2019-08-31 07:24 malware Malware normshield_all_wannacry NormShield.com  
2019-08-31 07:24 malware Malware normshield_high_wannacry NormShield.com  
2019-09-16 13:40 attacks SSH bi_ssh_0_1d BadIPs.com  
2019-09-17 12:44 attacks SSH bi_ssh_1_7d BadIPs.com  
2019-09-17 12:44 attacks SSH bi_ssh_2_30d BadIPs.com  
2019-09-22 07:35 attacks Web App AttackApache Attack bi_apache_0_1d BadIPs.com  
2019-09-22 07:35 attacks Web App AttackApache Attack bi_apache_1_7d BadIPs.com  
2019-09-22 07:35 attacks Brute-ForceMailserver Attack bi_postfix_0_1d BadIPs.com  
2019-09-22 07:35 attacks Brute-ForceMailserver Attack bi_postfix_1_7d BadIPs.com  
2019-09-23 06:38 attacks Web App AttackApache Attack bi_apache_2_30d BadIPs.com  
2019-09-23 06:39 attacks Brute-ForceMailserver Attack bi_postfix_2_30d BadIPs.com  
2020-11-05 05:13 attacks DNS Attack bi_dns_0_1d BadIPs.com  
2019-03-29 18:34 attacks firehol_webserver FireHOL  
only last 50 and first 10 AbuseIPDB logs are shown

Threats Categories :

abuse
IPs used to spam forum, boards, blogs or smtp servers, automated web scripts or scrappers (bad bots)
anonymizer
Onion Router IP addresses. TOR network IPs, TOR exit points, socks or ssl proxy.
attacks
bruteforce ssh/ftp/system account, IPs that have been detected by fail2ban, ports scan, vulnerabilities scan, DDoS.
malware
Addresses that have been identified distributing malware, form-grabber and stealer, Viruses, Worms, Trojans, Ransomware, Adware, Spyware

Whois

inetnum: 0.0.0.0 - 255.255.255.255
netname: IANA-BLK
descr: The whole IPv4 address space
country: EU # Country field is actually all countries in the world and not just EU countries
org: ORG-IANA1-RIPE
admin-c: IANA1-RIPE
tech-c: IANA1-RIPE
status: ALLOCATED UNSPECIFIED
remarks: This object represents all IPv4 addresses.
remarks: If you see this object as a result of a single IP query, it
remarks: means that the IP address you are querying is currently not
remarks: assigned to any organisation.
mnt-by: RIPE-NCC-HM-MNT
mnt-lower: RIPE-NCC-HM-MNT
created: 2002-06-25T14:19:09Z
last-modified: 2018-11-23T10:30:34Z
source: RIPE

organisation: ORG-IANA1-RIPE
org-name: Internet Assigned Numbers Authority
org-type: IANA
address: see http://www.iana.org
remarks: The IANA allocates IP addresses and AS number blocks to RIRs
remarks: see http://www.iana.org/numbers
admin-c: IANA1-RIPE
tech-c: IANA1-RIPE
mnt-ref: RIPE-NCC-HM-MNT
mnt-by: RIPE-NCC-HM-MNT
created: 2004-04-17T09:57:29Z
last-modified: 2013-07-22T12:03:42Z
source: RIPE # Filtered

role: Internet Assigned Numbers Authority
address: see http://www.iana.org.
admin-c: IANA1-RIPE
tech-c: IANA1-RIPE
nic-hdl: IANA1-RIPE
remarks: For more information on IANA services
remarks: go to IANA web site at http://www.iana.org.
mnt-by: RIPE-NCC-MNT
created: 1970-01-01T00:00:00Z
last-modified: 2001-09-22T09:31:27Z
source: RIPE # Filtered
most specific ip range is highlighted
Updated : 2021-10-23