Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frankfurt am Main

Region: Hessen

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
142.93.105.174 attackbots
Port scan: Attack repeated for 24 hours
2020-07-21 06:11:40
142.93.105.174 attack
 TCP (SYN) 142.93.105.174:44000 -> port 32747, len 44
2020-07-18 18:52:10
142.93.105.96 attackspam
Jul 17 12:17:46 XXX sshd[36102]: Invalid user test from 142.93.105.96 port 37312
2020-07-17 21:34:44
142.93.105.96 attackspam
Jul  7 15:14:23 santamaria sshd\[5284\]: Invalid user test from 142.93.105.96
Jul  7 15:14:23 santamaria sshd\[5284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.105.96
Jul  7 15:14:25 santamaria sshd\[5284\]: Failed password for invalid user test from 142.93.105.96 port 54302 ssh2
...
2020-07-08 01:52:26
142.93.105.174 attack
scans 2 times in preceeding hours on the ports (in chronological order) 3926 30638
2020-07-06 23:16:14
142.93.105.96 attackbots
Jul  3 19:46:54 auw2 sshd\[15742\]: Invalid user test1 from 142.93.105.96
Jul  3 19:46:54 auw2 sshd\[15742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.105.96
Jul  3 19:46:56 auw2 sshd\[15742\]: Failed password for invalid user test1 from 142.93.105.96 port 37122 ssh2
Jul  3 19:50:02 auw2 sshd\[16047\]: Invalid user qli from 142.93.105.96
Jul  3 19:50:02 auw2 sshd\[16047\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.105.96
2020-07-04 14:22:22
142.93.105.174 attackspam
Port scan denied
2020-06-01 02:09:25
142.93.105.17 attack
SSH Scan
2019-11-01 23:04:03
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.105.170
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4944
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.93.105.170.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025050200 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 02 21:30:31 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 170.105.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 170.105.93.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
170.231.154.196 attackbots
WordPress brute force
2020-06-26 07:04:02
36.71.89.99 attackspam
Unauthorized connection attempt from IP address 36.71.89.99 on Port 445(SMB)
2020-06-26 07:08:18
109.237.40.220 attackspambots
WordPress brute force
2020-06-26 07:15:10
200.56.88.60 attackbots
Automatic report - Port Scan Attack
2020-06-26 07:19:22
137.74.132.175 attackspambots
344. On Jun 25 2020 experienced a Brute Force SSH login attempt -> 4 unique times by 137.74.132.175.
2020-06-26 07:28:45
125.214.50.153 attack
445/tcp
[2020-06-25]1pkt
2020-06-26 07:34:24
192.241.235.85 attackbots
" "
2020-06-26 07:37:17
35.222.9.73 attackbots
Jun 25 05:13:17 v26 sshd[25809]: Invalid user ubnt from 35.222.9.73 port 1039
Jun 25 05:13:19 v26 sshd[25809]: Failed password for invalid user ubnt from 35.222.9.73 port 1039 ssh2
Jun 25 05:13:19 v26 sshd[25809]: Received disconnect from 35.222.9.73 port 1039:11: Bye Bye [preauth]
Jun 25 05:13:19 v26 sshd[25809]: Disconnected from 35.222.9.73 port 1039 [preauth]
Jun 25 05:18:50 v26 sshd[26219]: Invalid user user from 35.222.9.73 port 1055
Jun 25 05:18:52 v26 sshd[26219]: Failed password for invalid user user from 35.222.9.73 port 1055 ssh2
Jun 25 05:18:53 v26 sshd[26219]: Received disconnect from 35.222.9.73 port 1055:11: Bye Bye [preauth]
Jun 25 05:18:53 v26 sshd[26219]: Disconnected from 35.222.9.73 port 1055 [preauth]
Jun 25 05:20:01 v26 sshd[26293]: Invalid user mfg from 35.222.9.73 port 1037
Jun 25 05:20:02 v26 sshd[26293]: Failed password for invalid user mfg from 35.222.9.73 port 1037 ssh2
Jun 25 05:20:03 v26 sshd[26293]: Received disconnect from 35.222.9.73 por........
-------------------------------
2020-06-26 07:10:12
186.147.236.4 attackspam
Jun 26 00:19:02 pornomens sshd\[2021\]: Invalid user bot from 186.147.236.4 port 10143
Jun 26 00:19:02 pornomens sshd\[2021\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.147.236.4
Jun 26 00:19:03 pornomens sshd\[2021\]: Failed password for invalid user bot from 186.147.236.4 port 10143 ssh2
...
2020-06-26 07:00:12
123.180.62.48 attackbots
Jun 25 22:29:01 nirvana postfix/smtpd[16437]: connect from unknown[123.180.62.48]
Jun 25 22:29:02 nirvana postfix/smtpd[16437]: warning: unknown[123.180.62.48]: SASL LOGIN authentication failed: authentication failure
Jun 25 22:29:03 nirvana postfix/smtpd[16437]: warning: unknown[123.180.62.48]: SASL LOGIN authentication failed: authentication failure
Jun 25 22:29:03 nirvana postfix/smtpd[16437]: warning: unknown[123.180.62.48]: SASL LOGIN authentication failed: authentication failure
Jun 25 22:29:04 nirvana postfix/smtpd[16437]: warning: unknown[123.180.62.48]: SASL LOGIN authentication failed: authentication failure
Jun 25 22:29:05 nirvana postfix/smtpd[16437]: warning: unknown[123.180.62.48]: SASL LOGIN authentication failed: authentication failure


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=123.180.62.48
2020-06-26 07:04:51
219.77.163.13 attack
554/tcp
[2020-06-25]1pkt
2020-06-26 07:06:07
103.137.93.73 attack
WordPress brute force
2020-06-26 07:26:19
222.186.175.150 attackbotsspam
Jun 26 01:30:25 * sshd[14776]: Failed password for root from 222.186.175.150 port 3536 ssh2
Jun 26 01:30:28 * sshd[14776]: Failed password for root from 222.186.175.150 port 3536 ssh2
2020-06-26 07:35:12
82.178.175.156 attackspam
445/tcp
[2020-06-25]1pkt
2020-06-26 07:29:34
211.23.125.95 attackbotsspam
2020-06-25T15:29:55.690718linuxbox-skyline sshd[210971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.23.125.95  user=root
2020-06-25T15:29:58.194347linuxbox-skyline sshd[210971]: Failed password for root from 211.23.125.95 port 52134 ssh2
...
2020-06-26 06:59:50

Recently Reported IPs

47.116.124.146 134.122.66.248 178.128.235.140 44.220.188.145
199.45.154.139 20.65.193.150 59.82.21.81 34.140.249.122
170.106.163.48 141.98.11.110 20.62.52.60 210.3.159.183
43.131.243.61 8.153.202.230 8.153.163.126 46.101.172.218
11.86.170.226 13.233.114.81 13.233.114.183 13.233.114.82