Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
142.93.103.141 attackspambots
Sep 27 00:29:05 mx sshd[993026]: Invalid user admin from 142.93.103.141 port 48748
Sep 27 00:29:05 mx sshd[993026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.103.141 
Sep 27 00:29:05 mx sshd[993026]: Invalid user admin from 142.93.103.141 port 48748
Sep 27 00:29:07 mx sshd[993026]: Failed password for invalid user admin from 142.93.103.141 port 48748 ssh2
Sep 27 00:32:21 mx sshd[993052]: Invalid user william from 142.93.103.141 port 56306
...
2020-09-27 03:49:57
142.93.103.141 attackspam
2020-09-26T11:26:28.286018abusebot-2.cloudsearch.cf sshd[16260]: Invalid user edgar from 142.93.103.141 port 45194
2020-09-26T11:26:28.292070abusebot-2.cloudsearch.cf sshd[16260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.103.141
2020-09-26T11:26:28.286018abusebot-2.cloudsearch.cf sshd[16260]: Invalid user edgar from 142.93.103.141 port 45194
2020-09-26T11:26:30.552828abusebot-2.cloudsearch.cf sshd[16260]: Failed password for invalid user edgar from 142.93.103.141 port 45194 ssh2
2020-09-26T11:30:52.533310abusebot-2.cloudsearch.cf sshd[16320]: Invalid user elena from 142.93.103.141 port 34666
2020-09-26T11:30:52.539487abusebot-2.cloudsearch.cf sshd[16320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.103.141
2020-09-26T11:30:52.533310abusebot-2.cloudsearch.cf sshd[16320]: Invalid user elena from 142.93.103.141 port 34666
2020-09-26T11:30:54.709888abusebot-2.cloudsearch.cf sshd[16320]:
...
2020-09-26 19:50:49
142.93.103.141 attackspam
SSH_attack
2020-09-12 20:34:08
142.93.103.141 attackbots
fail2ban -- 142.93.103.141
...
2020-09-12 12:36:26
142.93.103.141 attack
fail2ban -- 142.93.103.141
...
2020-09-12 04:25:26
142.93.103.141 attackspambots
2020-07-25T07:27:15.811789randservbullet-proofcloud-66.localdomain sshd[7443]: Invalid user dev from 142.93.103.141 port 42888
2020-07-25T07:27:15.816093randservbullet-proofcloud-66.localdomain sshd[7443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.103.141
2020-07-25T07:27:15.811789randservbullet-proofcloud-66.localdomain sshd[7443]: Invalid user dev from 142.93.103.141 port 42888
2020-07-25T07:27:17.767384randservbullet-proofcloud-66.localdomain sshd[7443]: Failed password for invalid user dev from 142.93.103.141 port 42888 ssh2
...
2020-07-25 19:27:45
142.93.103.141 attackspam
(sshd) Failed SSH login from 142.93.103.141 (DE/Germany/-): 5 in the last 3600 secs
2020-07-21 03:20:31
142.93.103.141 attackspam
Jun  3 07:55:58 server1 sshd\[24401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.103.141  user=root
Jun  3 07:56:00 server1 sshd\[24401\]: Failed password for root from 142.93.103.141 port 38182 ssh2
Jun  3 07:59:34 server1 sshd\[25866\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.103.141  user=root
Jun  3 07:59:36 server1 sshd\[25866\]: Failed password for root from 142.93.103.141 port 43072 ssh2
Jun  3 08:03:06 server1 sshd\[27075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.103.141  user=root
...
2020-06-04 03:23:56
142.93.103.194 attackspam
Invalid user jenkins from 142.93.103.194 port 41754
2020-03-14 08:02:59
142.93.103.103 attackspambots
Automatic report - Banned IP Access
2019-07-24 08:48:55
142.93.103.103 attack
Detected by ModSecurity. Request URI: /wp-login.php
2019-07-14 23:11:09
142.93.103.103 attackspam
Automatic report - Banned IP Access
2019-07-14 01:22:46
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.103.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39855
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.93.103.80.			IN	A

;; AUTHORITY SECTION:
.			313	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 07:38:30 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 80.103.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 80.103.93.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.188.224.195 attackbots
445/tcp
[2019-06-26]1pkt
2019-06-26 19:22:27
134.209.68.238 attackspambots
Scanning and Vuln Attempts
2019-06-26 18:56:40
154.218.1.165 attack
154.218.1.165 - - [25/Jun/2019:23:43:37 -0400] "POST /%75%73%65%72%2e%70%68%70 HTTP/1.1" 301 237 "554fcae493e564ee0dc75bdf2ebf94caads|a:3:{s:2:"id";s:3:"'/*";s:3:"num";s:141:"*/ union select 1,0x272F2A,3,4,5,6,7,8,0x7b247b24524345275d3b6469652f2a2a2f286d6435284449524543544f52595f534550415241544f5229293b2f2f7d7d,0--";s:4:"name";s:3:"ads";}554fcae493e564ee0dc75bdf2ebf94ca" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:45.0) Gecko/20100101 Firefox/45.0"
...
2019-06-26 19:38:19
36.228.20.149 attack
37215/tcp
[2019-06-26]1pkt
2019-06-26 19:40:01
129.204.237.4 attackspam
Scanning and Vuln Attempts
2019-06-26 19:38:44
148.66.132.232 attackbotsspam
Jun 26 09:30:49 unicornsoft sshd\[25520\]: Invalid user luca from 148.66.132.232
Jun 26 09:30:49 unicornsoft sshd\[25520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.132.232
Jun 26 09:30:51 unicornsoft sshd\[25520\]: Failed password for invalid user luca from 148.66.132.232 port 44648 ssh2
2019-06-26 19:23:00
178.46.209.217 attackbots
37215/tcp
[2019-06-26]1pkt
2019-06-26 18:56:03
119.130.24.40 attack
139/tcp
[2019-06-26]1pkt
2019-06-26 19:33:22
189.89.222.38 attack
failed_logins
2019-06-26 19:31:41
46.101.242.117 attack
Jun 26 13:01:17 vpn01 sshd\[13432\]: Invalid user matilda from 46.101.242.117
Jun 26 13:01:17 vpn01 sshd\[13432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.242.117
Jun 26 13:01:19 vpn01 sshd\[13432\]: Failed password for invalid user matilda from 46.101.242.117 port 48230 ssh2
2019-06-26 19:35:55
34.200.241.68 attackbotsspam
Jun 26 03:43:37   TCP Attack: SRC=34.200.241.68 DST=[Masked] LEN=250 TOS=0x00 PREC=0x00 TTL=236  DF PROTO=TCP SPT=34888 DPT=80 WINDOW=913 RES=0x00 ACK PSH URGP=0
2019-06-26 19:39:37
187.207.20.106 attackbots
k+ssh-bruteforce
2019-06-26 18:55:08
45.227.253.211 attackbotsspam
Jun 26 12:20:13 mail postfix/smtpd\[28211\]: warning: unknown\[45.227.253.211\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 26 12:20:21 mail postfix/smtpd\[28948\]: warning: unknown\[45.227.253.211\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 26 12:25:59 mail postfix/smtpd\[28948\]: warning: unknown\[45.227.253.211\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-26 19:04:07
91.238.74.251 attack
[portscan] Port scan
2019-06-26 19:33:58
113.175.206.216 attackbots
Unauthorized connection attempt from IP address 113.175.206.216 on Port 445(SMB)
2019-06-26 19:19:47

Recently Reported IPs

59.92.43.160 47.90.41.16 47.103.4.117 183.106.76.93
200.45.153.206 187.167.70.88 14.242.231.115 1.1.243.228
120.85.93.82 223.185.88.141 45.161.115.45 183.128.209.234
64.227.188.173 78.25.76.136 46.174.214.29 115.44.135.17
45.67.212.202 218.111.114.133 197.49.27.77 187.108.70.97