Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frankfurt am Main

Region: Hesse

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
142.93.103.141 attackspambots
Sep 27 00:29:05 mx sshd[993026]: Invalid user admin from 142.93.103.141 port 48748
Sep 27 00:29:05 mx sshd[993026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.103.141 
Sep 27 00:29:05 mx sshd[993026]: Invalid user admin from 142.93.103.141 port 48748
Sep 27 00:29:07 mx sshd[993026]: Failed password for invalid user admin from 142.93.103.141 port 48748 ssh2
Sep 27 00:32:21 mx sshd[993052]: Invalid user william from 142.93.103.141 port 56306
...
2020-09-27 03:49:57
142.93.103.141 attackspam
2020-09-26T11:26:28.286018abusebot-2.cloudsearch.cf sshd[16260]: Invalid user edgar from 142.93.103.141 port 45194
2020-09-26T11:26:28.292070abusebot-2.cloudsearch.cf sshd[16260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.103.141
2020-09-26T11:26:28.286018abusebot-2.cloudsearch.cf sshd[16260]: Invalid user edgar from 142.93.103.141 port 45194
2020-09-26T11:26:30.552828abusebot-2.cloudsearch.cf sshd[16260]: Failed password for invalid user edgar from 142.93.103.141 port 45194 ssh2
2020-09-26T11:30:52.533310abusebot-2.cloudsearch.cf sshd[16320]: Invalid user elena from 142.93.103.141 port 34666
2020-09-26T11:30:52.539487abusebot-2.cloudsearch.cf sshd[16320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.103.141
2020-09-26T11:30:52.533310abusebot-2.cloudsearch.cf sshd[16320]: Invalid user elena from 142.93.103.141 port 34666
2020-09-26T11:30:54.709888abusebot-2.cloudsearch.cf sshd[16320]:
...
2020-09-26 19:50:49
142.93.103.141 attackspam
SSH_attack
2020-09-12 20:34:08
142.93.103.141 attackbots
fail2ban -- 142.93.103.141
...
2020-09-12 12:36:26
142.93.103.141 attack
fail2ban -- 142.93.103.141
...
2020-09-12 04:25:26
142.93.103.141 attackspambots
2020-07-25T07:27:15.811789randservbullet-proofcloud-66.localdomain sshd[7443]: Invalid user dev from 142.93.103.141 port 42888
2020-07-25T07:27:15.816093randservbullet-proofcloud-66.localdomain sshd[7443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.103.141
2020-07-25T07:27:15.811789randservbullet-proofcloud-66.localdomain sshd[7443]: Invalid user dev from 142.93.103.141 port 42888
2020-07-25T07:27:17.767384randservbullet-proofcloud-66.localdomain sshd[7443]: Failed password for invalid user dev from 142.93.103.141 port 42888 ssh2
...
2020-07-25 19:27:45
142.93.103.141 attackspam
(sshd) Failed SSH login from 142.93.103.141 (DE/Germany/-): 5 in the last 3600 secs
2020-07-21 03:20:31
142.93.103.141 attackspam
Jun  3 07:55:58 server1 sshd\[24401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.103.141  user=root
Jun  3 07:56:00 server1 sshd\[24401\]: Failed password for root from 142.93.103.141 port 38182 ssh2
Jun  3 07:59:34 server1 sshd\[25866\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.103.141  user=root
Jun  3 07:59:36 server1 sshd\[25866\]: Failed password for root from 142.93.103.141 port 43072 ssh2
Jun  3 08:03:06 server1 sshd\[27075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.103.141  user=root
...
2020-06-04 03:23:56
142.93.103.194 attackspam
Invalid user jenkins from 142.93.103.194 port 41754
2020-03-14 08:02:59
142.93.103.103 attackspambots
Automatic report - Banned IP Access
2019-07-24 08:48:55
142.93.103.103 attack
Detected by ModSecurity. Request URI: /wp-login.php
2019-07-14 23:11:09
142.93.103.103 attackspam
Automatic report - Banned IP Access
2019-07-14 01:22:46
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.103.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31990
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.93.103.134.			IN	A

;; AUTHORITY SECTION:
.			452	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020601 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 12:12:28 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 134.103.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.103.93.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
92.105.54.166 attack
Unauthorized connection attempt detected from IP address 92.105.54.166 to port 23
2020-03-17 17:02:30
186.192.205.245 attack
Unauthorized connection attempt detected from IP address 186.192.205.245 to port 2323
2020-03-17 16:52:25
113.125.25.73 attackspam
detected by Fail2Ban
2020-03-17 16:10:59
197.53.195.75 attack
$f2bV_matches
2020-03-17 16:31:53
172.247.123.207 attackbotsspam
Invalid user docker from 172.247.123.207 port 9462
2020-03-17 16:28:23
58.228.63.134 attack
SSH-bruteforce attempts
2020-03-17 16:16:28
119.28.152.128 attack
Unauthorized connection attempt detected from IP address 119.28.152.128 to port 2095
2020-03-17 16:59:55
95.247.127.36 attackspam
Unauthorized connection attempt detected from IP address 95.247.127.36 to port 4567
2020-03-17 17:01:58
176.216.113.26 attackbots
Unauthorized connection attempt detected from IP address 176.216.113.26 to port 8080
2020-03-17 16:54:34
118.25.51.181 attackbots
" "
2020-03-17 16:43:38
178.128.121.137 attackspambots
Mar 17 02:19:08 vps sshd[4437]: Failed password for root from 178.128.121.137 port 49810 ssh2
Mar 17 02:47:03 vps sshd[5640]: Failed password for root from 178.128.121.137 port 42274 ssh2
...
2020-03-17 16:25:29
165.22.207.41 attackspambots
xmlrpc attack
2020-03-17 16:38:51
213.244.242.70 attack
Unauthorized connection attempt detected from IP address 213.244.242.70 to port 5555
2020-03-17 16:46:44
172.58.139.205 attackspam
Brute force attack against VPN service
2020-03-17 16:34:56
177.93.252.18 attack
firewall-block, port(s): 23/tcp
2020-03-17 16:20:28

Recently Reported IPs

43.154.60.246 211.50.79.83 199.19.225.223 120.85.115.34
211.115.228.136 116.196.122.196 5.236.214.89 50.116.58.205
124.122.235.130 36.238.36.125 219.155.234.115 188.166.236.242
181.12.6.34 158.255.7.133 106.11.152.85 1.179.88.190
1.116.8.212 87.229.23.54 192.241.203.142 114.119.147.239