Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: North Bergen

Region: New Jersey

Country: United States

Internet Service Provider: DigitalOcean LLC

Hostname: unknown

Organization: DigitalOcean, LLC

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackbots
2019-08-19 03:25:53,459 fail2ban.actions        [878]: NOTICE  [sshd] Ban 142.93.117.249
2019-08-19 06:33:21,777 fail2ban.actions        [878]: NOTICE  [sshd] Ban 142.93.117.249
2019-08-19 09:39:17,491 fail2ban.actions        [878]: NOTICE  [sshd] Ban 142.93.117.249
...
2019-10-03 13:53:36
attackspam
Sep 22 11:13:27 lnxmysql61 sshd[13188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.117.249
Sep 22 11:13:27 lnxmysql61 sshd[13188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.117.249
2019-09-22 17:29:56
attack
Sep 20 14:41:31 plusreed sshd[23195]: Invalid user admin from 142.93.117.249
...
2019-09-21 02:47:06
attack
Sep 11 10:15:51 pornomens sshd\[9738\]: Invalid user dev from 142.93.117.249 port 53062
Sep 11 10:15:51 pornomens sshd\[9738\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.117.249
Sep 11 10:15:52 pornomens sshd\[9738\]: Failed password for invalid user dev from 142.93.117.249 port 53062 ssh2
...
2019-09-11 16:25:34
attackbotsspam
Sep  4 06:33:31 hb sshd\[1482\]: Invalid user zs from 142.93.117.249
Sep  4 06:33:31 hb sshd\[1482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.117.249
Sep  4 06:33:33 hb sshd\[1482\]: Failed password for invalid user zs from 142.93.117.249 port 50572 ssh2
Sep  4 06:37:30 hb sshd\[1968\]: Invalid user liao from 142.93.117.249
Sep  4 06:37:30 hb sshd\[1968\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.117.249
2019-09-04 15:11:40
attackbotsspam
Sep  3 07:05:11 mail sshd\[14201\]: Invalid user vboxuser from 142.93.117.249
Sep  3 07:05:11 mail sshd\[14201\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.117.249
...
2019-09-04 00:15:19
attackbots
Sep  3 02:42:26 cp sshd[16034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.117.249
2019-09-03 08:49:56
attackspambots
2019-09-01T03:34:49.920774abusebot-2.cloudsearch.cf sshd\[17932\]: Invalid user whmcs from 142.93.117.249 port 58686
2019-09-01 12:01:01
attack
2019-08-20T15:24:08.908725abusebot-8.cloudsearch.cf sshd\[20844\]: Invalid user dovecot from 142.93.117.249 port 36858
2019-08-20 23:30:59
attack
2019-08-15T04:40:37.179265abusebot-8.cloudsearch.cf sshd\[13252\]: Invalid user applmgr from 142.93.117.249 port 48400
2019-08-15 13:07:56
attackspam
Jul 29 19:46:06 MK-Soft-VM7 sshd\[13634\]: Invalid user ubuntu from 142.93.117.249 port 34052
Jul 29 19:46:06 MK-Soft-VM7 sshd\[13634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.117.249
Jul 29 19:46:08 MK-Soft-VM7 sshd\[13634\]: Failed password for invalid user ubuntu from 142.93.117.249 port 34052 ssh2
...
2019-07-30 04:12:05
attackbotsspam
Jul 28 16:54:03 mail sshd\[27974\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.117.249  user=root
Jul 28 16:54:05 mail sshd\[27974\]: Failed password for root from 142.93.117.249 port 60658 ssh2
Jul 28 16:58:15 mail sshd\[28539\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.117.249  user=root
Jul 28 16:58:17 mail sshd\[28539\]: Failed password for root from 142.93.117.249 port 53832 ssh2
Jul 28 17:02:31 mail sshd\[29659\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.117.249  user=root
2019-07-29 04:50:02
attackspambots
Invalid user bwadmin from 142.93.117.249 port 39544
2019-07-28 04:35:34
attackbotsspam
Jul 14 22:13:43 vpn01 sshd\[19555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.117.249  user=root
Jul 14 22:13:45 vpn01 sshd\[19555\]: Failed password for root from 142.93.117.249 port 46848 ssh2
Jul 14 22:20:48 vpn01 sshd\[19755\]: Invalid user informix from 142.93.117.249
2019-07-15 05:15:06
attackbotsspam
Jul 13 17:16:49 icinga sshd[23824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.117.249
Jul 13 17:16:51 icinga sshd[23824]: Failed password for invalid user martin from 142.93.117.249 port 36426 ssh2
...
2019-07-13 23:45:38
attackspam
Jul 11 15:05:08 voyager sshd[43035]: Disconnected from invalid user ry 142.93.117.249 port 36358 [preauth]                                                                                                                                                                                                                   Jul 11 15:09:36 voyager sshd[19117]: Invalid user fp from 142.93.117.249 port 36474                                                                                                                                                                                                                                          Jul 11 15:09:36 voyager sshd[19117]: Failed password for invalid user fp from 142.93.117.249 port 36474 ssh2                                                                                                                                                                                                                 Jul 11 15:09:36 voyager sshd[19117]: Received disconnect from 142.93.117.
2019-07-12 15:23:06
attackbotsspam
Jul 11 19:38:08 ip-172-31-1-72 sshd\[26774\]: Invalid user abdel from 142.93.117.249
Jul 11 19:38:08 ip-172-31-1-72 sshd\[26774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.117.249
Jul 11 19:38:10 ip-172-31-1-72 sshd\[26774\]: Failed password for invalid user abdel from 142.93.117.249 port 42438 ssh2
Jul 11 19:41:16 ip-172-31-1-72 sshd\[26925\]: Invalid user us from 142.93.117.249
Jul 11 19:41:16 ip-172-31-1-72 sshd\[26925\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.117.249
2019-07-12 05:09:03
Comments on same subnet:
IP Type Details Datetime
142.93.117.203 attackbots
$f2bV_matches
2020-05-17 06:39:28
142.93.117.17 attackspambots
Dec 19 16:32:49 plusreed sshd[10910]: Invalid user nfs from 142.93.117.17
...
2019-12-20 05:36:19
142.93.117.17 attack
$f2bV_matches
2019-12-17 23:22:37
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.117.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 493
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.93.117.249.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041201 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sat Apr 13 10:20:24 +08 2019
;; MSG SIZE  rcvd: 118

Host info
249.117.93.142.in-addr.arpa has no PTR record
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
*** Can't find 249.117.93.142.in-addr.arpa.: No answer

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
91.90.36.174 attackbots
Invalid user teamspeak3 from 91.90.36.174 port 37410
2020-08-30 01:15:37
222.186.173.154 attackbotsspam
Aug 29 19:18:52 minden010 sshd[10526]: Failed password for root from 222.186.173.154 port 29948 ssh2
Aug 29 19:18:55 minden010 sshd[10526]: Failed password for root from 222.186.173.154 port 29948 ssh2
Aug 29 19:18:59 minden010 sshd[10526]: Failed password for root from 222.186.173.154 port 29948 ssh2
Aug 29 19:19:05 minden010 sshd[10526]: error: maximum authentication attempts exceeded for root from 222.186.173.154 port 29948 ssh2 [preauth]
...
2020-08-30 01:25:04
192.35.169.26 attack
 TCP (SYN) 192.35.169.26:48760 -> port 2323, len 44
2020-08-30 01:18:54
183.88.172.27 attackspambots
1598702776 - 08/29/2020 14:06:16 Host: 183.88.172.27/183.88.172.27 Port: 445 TCP Blocked
2020-08-30 01:47:36
67.215.234.162 attackbots
200 SQL injection attempts in 1 minute, 10 minutes earlier an attempt from 154.211.124.176
2020-08-30 01:45:50
49.234.43.224 attackbotsspam
2020-08-29T08:02:41.377742xentho-1 sshd[290453]: Invalid user boss from 49.234.43.224 port 55238
2020-08-29T08:02:42.936744xentho-1 sshd[290453]: Failed password for invalid user boss from 49.234.43.224 port 55238 ssh2
2020-08-29T08:04:01.524618xentho-1 sshd[290475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.43.224  user=root
2020-08-29T08:04:03.059009xentho-1 sshd[290475]: Failed password for root from 49.234.43.224 port 42314 ssh2
2020-08-29T08:05:20.141452xentho-1 sshd[290497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.43.224  user=root
2020-08-29T08:05:22.187802xentho-1 sshd[290497]: Failed password for root from 49.234.43.224 port 57624 ssh2
2020-08-29T08:06:40.973382xentho-1 sshd[290509]: Invalid user ogpbot from 49.234.43.224 port 44700
2020-08-29T08:06:40.979626xentho-1 sshd[290509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.
...
2020-08-30 01:33:21
192.3.247.10 attackspambots
$f2bV_matches
2020-08-30 01:55:29
134.122.69.58 attackspambots
$f2bV_matches
2020-08-30 01:53:16
45.183.3.217 attackspam
1598702788 - 08/29/2020 14:06:28 Host: 45.183.3.217/45.183.3.217 Port: 445 TCP Blocked
2020-08-30 01:41:27
101.78.209.26 attack
root     ssh:notty    101.78.209.26
2020-08-30 01:26:10
119.28.238.101 attack
$f2bV_matches
2020-08-30 01:29:10
190.21.39.111 attackbotsspam
Aug 29 19:40:50 ip106 sshd[30193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.21.39.111 
Aug 29 19:40:51 ip106 sshd[30193]: Failed password for invalid user ec2-user from 190.21.39.111 port 54648 ssh2
...
2020-08-30 01:50:58
111.229.242.156 attack
Aug 29 15:54:53 lukav-desktop sshd\[13645\]: Invalid user konstantin from 111.229.242.156
Aug 29 15:54:53 lukav-desktop sshd\[13645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.242.156
Aug 29 15:54:55 lukav-desktop sshd\[13645\]: Failed password for invalid user konstantin from 111.229.242.156 port 35210 ssh2
Aug 29 16:02:03 lukav-desktop sshd\[13693\]: Invalid user ams from 111.229.242.156
Aug 29 16:02:03 lukav-desktop sshd\[13693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.242.156
2020-08-30 01:31:44
158.69.182.98 attackspambots
(smtpauth) Failed SMTP AUTH login from 158.69.182.98 (CA/Canada/ip98.ip-158-69-182.net): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-08-29 21:25:38 login authenticator failed for ip98.ip-158-69-182.net (ADMIN) [158.69.182.98]: 535 Incorrect authentication data (set_id=a.m.bekhradi@srooyesh.com)
2020-08-30 01:25:25
206.189.132.8 attackspambots
2020-08-29T07:06:48.921075linuxbox-skyline sshd[22344]: Invalid user ftpuser from 206.189.132.8 port 43160
...
2020-08-30 01:45:12

Recently Reported IPs

94.25.38.70 147.135.167.40 81.22.45.252 141.98.80.31
45.55.67.128 121.215.253.87 190.73.138.105 185.120.77.172
185.20.197.116 2408:8214:8000:37b:dc75:ca8d:7d20:7378 35.196.7.6 1.71.136.240
71.227.69.119 45.58.124.45 86.57.147.212 223.111.139.211
142.93.122.185 218.92.0.203 2.67.50.11 94.159.18.194