Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: DigitalOcean LLC

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackbotsspam
Mar  8 02:15:35 ArkNodeAT sshd\[22085\]: Invalid user narciso from 128.199.142.148
Mar  8 02:15:35 ArkNodeAT sshd\[22085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.148
Mar  8 02:15:37 ArkNodeAT sshd\[22085\]: Failed password for invalid user narciso from 128.199.142.148 port 39287 ssh2
2020-03-08 10:12:24
attackbots
SSH Brute Force
2020-03-08 03:02:36
attackspam
Feb 29 13:29:38 webhost01 sshd[14778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.148
Feb 29 13:29:41 webhost01 sshd[14778]: Failed password for invalid user discordbot from 128.199.142.148 port 37676 ssh2
...
2020-02-29 20:41:52
attackspam
Feb 13 04:45:37 web8 sshd\[32015\]: Invalid user cemergen from 128.199.142.148
Feb 13 04:45:37 web8 sshd\[32015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.148
Feb 13 04:45:39 web8 sshd\[32015\]: Failed password for invalid user cemergen from 128.199.142.148 port 38512 ssh2
Feb 13 04:48:18 web8 sshd\[974\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.148  user=root
Feb 13 04:48:20 web8 sshd\[974\]: Failed password for root from 128.199.142.148 port 50500 ssh2
2020-02-13 18:35:07
attackspambots
Feb 10 15:44:11 dedicated sshd[32363]: Invalid user mvc from 128.199.142.148 port 51570
2020-02-11 04:49:51
attackspam
2020-02-09T06:37:14.804528-07:00 suse-nuc sshd[15786]: Invalid user gsj from 128.199.142.148 port 35247
...
2020-02-09 22:14:46
attackbots
Feb  2 16:06:33 markkoudstaal sshd[31228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.148
Feb  2 16:06:35 markkoudstaal sshd[31228]: Failed password for invalid user test from 128.199.142.148 port 39071 ssh2
Feb  2 16:09:18 markkoudstaal sshd[31720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.148
2020-02-03 00:09:50
attackbots
Unauthorized connection attempt detected from IP address 128.199.142.148 to port 2220 [J]
2020-01-23 18:41:34
attackspam
leo_www
2020-01-10 18:43:52
attackspambots
IP blocked
2019-12-28 17:21:26
attackspam
Dec 27 20:23:59 zulu412 sshd\[20656\]: Invalid user http from 128.199.142.148 port 57402
Dec 27 20:23:59 zulu412 sshd\[20656\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.148
Dec 27 20:24:01 zulu412 sshd\[20656\]: Failed password for invalid user http from 128.199.142.148 port 57402 ssh2
...
2019-12-28 04:12:55
attackbotsspam
Dec 23 07:21:20 ns3042688 sshd\[13178\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.148  user=root
Dec 23 07:21:22 ns3042688 sshd\[13178\]: Failed password for root from 128.199.142.148 port 57961 ssh2
Dec 23 07:27:35 ns3042688 sshd\[15952\]: Invalid user temp from 128.199.142.148
Dec 23 07:27:35 ns3042688 sshd\[15952\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.148 
Dec 23 07:27:36 ns3042688 sshd\[15952\]: Failed password for invalid user temp from 128.199.142.148 port 32777 ssh2
...
2019-12-23 18:10:43
attackspam
Dec 23 00:51:16 heissa sshd\[8792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.148  user=mail
Dec 23 00:51:18 heissa sshd\[8792\]: Failed password for mail from 128.199.142.148 port 58388 ssh2
Dec 23 00:56:40 heissa sshd\[9628\]: Invalid user tamiyasu from 128.199.142.148 port 60265
Dec 23 00:56:40 heissa sshd\[9628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.148
Dec 23 00:56:42 heissa sshd\[9628\]: Failed password for invalid user tamiyasu from 128.199.142.148 port 60265 ssh2
2019-12-23 08:41:04
attackspambots
Dec 20 19:36:23 legacy sshd[23638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.148
Dec 20 19:36:25 legacy sshd[23638]: Failed password for invalid user guest from 128.199.142.148 port 50398 ssh2
Dec 20 19:42:53 legacy sshd[23938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.148
...
2019-12-21 02:47:33
Comments on same subnet:
IP Type Details Datetime
128.199.142.0 attackspambots
Sep 12 16:16:37 serwer sshd\[3065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.0  user=root
Sep 12 16:16:38 serwer sshd\[3065\]: Failed password for root from 128.199.142.0 port 36918 ssh2
Sep 12 16:25:32 serwer sshd\[3957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.0  user=root
...
2020-09-12 23:12:22
128.199.142.0 attackspambots
$f2bV_matches
2020-09-12 15:17:07
128.199.142.0 attack
SSH Invalid Login
2020-09-12 07:03:24
128.199.142.0 attack
(sshd) Failed SSH login from 128.199.142.0 (SG/Singapore/-): 5 in the last 3600 secs
2020-08-21 00:59:43
128.199.142.138 attackspam
Aug 15 07:06:35 piServer sshd[16442]: Failed password for root from 128.199.142.138 port 56860 ssh2
Aug 15 07:09:24 piServer sshd[16715]: Failed password for root from 128.199.142.138 port 54146 ssh2
...
2020-08-15 14:57:07
128.199.142.0 attack
Aug 14 22:59:53 jumpserver sshd[155239]: Failed password for root from 128.199.142.0 port 56510 ssh2
Aug 14 23:04:02 jumpserver sshd[155283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.0  user=root
Aug 14 23:04:05 jumpserver sshd[155283]: Failed password for root from 128.199.142.0 port 39556 ssh2
...
2020-08-15 07:49:09
128.199.142.138 attackbotsspam
Aug 14 16:26:15 vps sshd[1025149]: Failed password for invalid user Asdfg%TGB123 from 128.199.142.138 port 48686 ssh2
Aug 14 16:30:19 vps sshd[1046148]: Invalid user %username%qwert from 128.199.142.138 port 57634
Aug 14 16:30:19 vps sshd[1046148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.138
Aug 14 16:30:21 vps sshd[1046148]: Failed password for invalid user %username%qwert from 128.199.142.138 port 57634 ssh2
Aug 14 16:34:27 vps sshd[15694]: Invalid user qwert@123123 from 128.199.142.138 port 38322
...
2020-08-15 03:01:23
128.199.142.0 attackbots
2020-08-14T07:27:17.993455lavrinenko.info sshd[9049]: Failed password for root from 128.199.142.0 port 40734 ssh2
2020-08-14T07:28:35.008729lavrinenko.info sshd[9057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.0  user=root
2020-08-14T07:28:36.458512lavrinenko.info sshd[9057]: Failed password for root from 128.199.142.0 port 59172 ssh2
2020-08-14T07:29:53.718300lavrinenko.info sshd[9064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.0  user=root
2020-08-14T07:29:55.679886lavrinenko.info sshd[9064]: Failed password for root from 128.199.142.0 port 49378 ssh2
...
2020-08-14 14:06:02
128.199.142.138 attackspam
Aug 13 12:18:41 itv-usvr-01 sshd[7872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.138  user=root
Aug 13 12:18:43 itv-usvr-01 sshd[7872]: Failed password for root from 128.199.142.138 port 45424 ssh2
Aug 13 12:19:13 itv-usvr-01 sshd[7900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.138  user=root
Aug 13 12:19:15 itv-usvr-01 sshd[7900]: Failed password for root from 128.199.142.138 port 41368 ssh2
2020-08-13 13:27:42
128.199.142.138 attack
prod6
...
2020-08-11 01:11:48
128.199.142.138 attackbots
Jul 22 00:29:21 journals sshd\[92219\]: Invalid user sunny from 128.199.142.138
Jul 22 00:29:21 journals sshd\[92219\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.138
Jul 22 00:29:23 journals sshd\[92219\]: Failed password for invalid user sunny from 128.199.142.138 port 33938 ssh2
Jul 22 00:34:20 journals sshd\[92660\]: Invalid user arijit from 128.199.142.138
Jul 22 00:34:20 journals sshd\[92660\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.138
...
2020-07-22 05:51:14
128.199.142.0 attackbotsspam
Jul 17 14:07:19 master sshd[13017]: Failed password for invalid user postgres from 128.199.142.0 port 53320 ssh2
2020-07-18 00:33:10
128.199.142.0 attack
SSH login attempts.
2020-07-10 02:27:08
128.199.142.0 attackbots
2020-07-07T14:58:12.930016vps773228.ovh.net sshd[15365]: Invalid user hxlong from 128.199.142.0 port 35054
2020-07-07T14:58:12.940193vps773228.ovh.net sshd[15365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.0
2020-07-07T14:58:12.930016vps773228.ovh.net sshd[15365]: Invalid user hxlong from 128.199.142.0 port 35054
2020-07-07T14:58:14.703660vps773228.ovh.net sshd[15365]: Failed password for invalid user hxlong from 128.199.142.0 port 35054 ssh2
2020-07-07T15:00:59.579535vps773228.ovh.net sshd[15447]: Invalid user bryan from 128.199.142.0 port 48872
...
2020-07-08 04:08:11
128.199.142.138 attackspambots
SSH Brute Force
2020-07-05 21:14:58
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 128.199.142.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14600
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;128.199.142.148.		IN	A

;; AUTHORITY SECTION:
.			462	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019122001 1800 900 604800 86400

;; Query time: 118 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 21 02:47:19 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 148.142.199.128.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.142.199.128.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
118.27.8.70 attackbotsspam
Jan 17 17:39:48 vpn01 sshd[25086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.27.8.70
Jan 17 17:39:50 vpn01 sshd[25086]: Failed password for invalid user server from 118.27.8.70 port 47898 ssh2
...
2020-01-18 00:53:25
91.92.125.187 attackspambots
Unauthorized connection attempt from IP address 91.92.125.187 on Port 445(SMB)
2020-01-18 00:53:37
111.95.141.34 attackspam
Unauthorized connection attempt detected from IP address 111.95.141.34 to port 2220 [J]
2020-01-18 00:41:00
5.196.110.170 attack
Jan 17 14:16:48 ws12vmsma01 sshd[1649]: Invalid user oracle from 5.196.110.170
Jan 17 14:16:53 ws12vmsma01 sshd[1649]: Failed password for invalid user oracle from 5.196.110.170 port 47826 ssh2
Jan 17 14:17:26 ws12vmsma01 sshd[1763]: Invalid user oracle from 5.196.110.170
...
2020-01-18 00:39:29
36.82.98.41 attackspam
1579266079 - 01/17/2020 14:01:19 Host: 36.82.98.41/36.82.98.41 Port: 445 TCP Blocked
2020-01-18 00:45:56
69.229.6.46 attackbotsspam
Unauthorized connection attempt detected from IP address 69.229.6.46 to port 2220 [J]
2020-01-18 01:07:23
81.51.199.86 attackspambots
Unauthorized connection attempt detected from IP address 81.51.199.86 to port 2220 [J]
2020-01-18 00:57:57
180.245.173.248 attackbotsspam
1579266087 - 01/17/2020 14:01:27 Host: 180.245.173.248/180.245.173.248 Port: 445 TCP Blocked
2020-01-18 00:39:54
112.85.42.182 attackspambots
k+ssh-bruteforce
2020-01-18 01:10:09
203.195.254.47 attackbots
Lines containing failures of 203.195.254.47
Jan 16 07:55:06 keyhelp sshd[21127]: Invalid user clark from 203.195.254.47 port 56988
Jan 16 07:55:06 keyhelp sshd[21127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.254.47
Jan 16 07:55:08 keyhelp sshd[21127]: Failed password for invalid user clark from 203.195.254.47 port 56988 ssh2
Jan 16 07:55:08 keyhelp sshd[21127]: Received disconnect from 203.195.254.47 port 56988:11: Bye Bye [preauth]
Jan 16 07:55:08 keyhelp sshd[21127]: Disconnected from invalid user clark 203.195.254.47 port 56988 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=203.195.254.47
2020-01-18 00:48:44
197.210.85.155 attackspambots
Unauthorized connection attempt from IP address 197.210.85.155 on Port 445(SMB)
2020-01-18 01:11:29
106.12.92.117 attackbots
Jan 17 17:17:06 h2177944 sshd\[17087\]: Invalid user testuser from 106.12.92.117 port 34330
Jan 17 17:17:06 h2177944 sshd\[17087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.92.117
Jan 17 17:17:08 h2177944 sshd\[17087\]: Failed password for invalid user testuser from 106.12.92.117 port 34330 ssh2
Jan 17 17:21:25 h2177944 sshd\[17295\]: Invalid user fuki from 106.12.92.117 port 50608
...
2020-01-18 00:30:50
188.15.139.245 attack
SMTP Brute-Force
2020-01-18 00:44:11
196.189.185.241 attackspambots
Unauthorized connection attempt from IP address 196.189.185.241 on Port 445(SMB)
2020-01-18 00:33:10
49.206.103.250 attackbotsspam
Unauthorized connection attempt from IP address 49.206.103.250 on Port 445(SMB)
2020-01-18 01:07:56

Recently Reported IPs

36.65.230.150 31.173.85.76 31.135.47.176 70.157.132.59
223.204.240.166 222.252.53.224 27.64.192.64 23.82.29.57
216.38.8.179 211.181.237.54 202.57.41.246 201.178.215.173
200.123.25.196 60.15.229.166 200.59.189.124 86.134.102.120
193.161.13.137 122.213.111.0 183.246.102.181 191.250.157.72