Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
142.93.134.215 attack
Aug 31 11:48:58 george sshd[17407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.134.215 
Aug 31 11:49:00 george sshd[17407]: Failed password for invalid user tzq from 142.93.134.215 port 50072 ssh2
Aug 31 11:52:56 george sshd[17429]: Invalid user yxu from 142.93.134.215 port 59324
Aug 31 11:52:56 george sshd[17429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.134.215 
Aug 31 11:52:59 george sshd[17429]: Failed password for invalid user yxu from 142.93.134.215 port 59324 ssh2
...
2020-09-01 00:18:11
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.134.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11229
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.93.134.57.			IN	A

;; AUTHORITY SECTION:
.			530	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 09:43:08 CST 2022
;; MSG SIZE  rcvd: 106
Host info
57.134.93.142.in-addr.arpa domain name pointer host1.chart.dk-1533625125149-s-2vcpu-4gb-ams3-01.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
57.134.93.142.in-addr.arpa	name = host1.chart.dk-1533625125149-s-2vcpu-4gb-ams3-01.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
40.112.255.39 attackspam
Invalid user andree from 40.112.255.39 port 40192
2019-10-29 06:35:25
51.75.255.166 attackspambots
Oct 29 00:44:58 hosting sshd[15808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=166.ip-51-75-255.eu  user=root
Oct 29 00:45:00 hosting sshd[15808]: Failed password for root from 51.75.255.166 port 42758 ssh2
Oct 29 00:50:50 hosting sshd[16323]: Invalid user 123456 from 51.75.255.166 port 39572
Oct 29 00:50:50 hosting sshd[16323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=166.ip-51-75-255.eu
Oct 29 00:50:50 hosting sshd[16323]: Invalid user 123456 from 51.75.255.166 port 39572
Oct 29 00:50:51 hosting sshd[16323]: Failed password for invalid user 123456 from 51.75.255.166 port 39572 ssh2
...
2019-10-29 06:33:23
211.232.39.8 attackspambots
Oct 28 22:24:53 vps58358 sshd\[2661\]: Invalid user yhntgb from 211.232.39.8Oct 28 22:24:55 vps58358 sshd\[2661\]: Failed password for invalid user yhntgb from 211.232.39.8 port 30736 ssh2Oct 28 22:29:36 vps58358 sshd\[2689\]: Invalid user ROOT!1@2 from 211.232.39.8Oct 28 22:29:38 vps58358 sshd\[2689\]: Failed password for invalid user ROOT!1@2 from 211.232.39.8 port 13236 ssh2Oct 28 22:34:12 vps58358 sshd\[2711\]: Invalid user lg@123456 from 211.232.39.8Oct 28 22:34:14 vps58358 sshd\[2711\]: Failed password for invalid user lg@123456 from 211.232.39.8 port 52222 ssh2
...
2019-10-29 06:15:48
185.56.153.231 attackspambots
Invalid user adi from 185.56.153.231 port 43840
2019-10-29 06:41:02
118.24.197.243 attackspam
Invalid user admin from 118.24.197.243 port 36720
2019-10-29 06:48:34
51.255.174.215 attackbots
Invalid user www from 51.255.174.215 port 33637
2019-10-29 06:32:58
185.74.4.189 attack
Invalid user jerry from 185.74.4.189 port 36084
2019-10-29 06:18:20
110.249.254.66 attackbots
Invalid user ahren from 110.249.254.66 port 58820
2019-10-29 06:27:49
51.15.118.122 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.118.122  user=root
Failed password for root from 51.15.118.122 port 40412 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.118.122  user=root
Failed password for root from 51.15.118.122 port 51426 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.118.122  user=root
2019-10-29 06:33:47
117.232.127.50 attackbots
Unauthorized SSH login attempts
2019-10-29 06:26:52
176.107.131.128 attackspambots
Oct 24 03:49:06 heissa sshd\[19566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.107.131.128  user=root
Oct 24 03:49:08 heissa sshd\[19566\]: Failed password for root from 176.107.131.128 port 56824 ssh2
Oct 24 03:57:27 heissa sshd\[20858\]: Invalid user db2inst from 176.107.131.128 port 53480
Oct 24 03:57:27 heissa sshd\[20858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.107.131.128
Oct 24 03:57:30 heissa sshd\[20858\]: Failed password for invalid user db2inst from 176.107.131.128 port 53480 ssh2
2019-10-29 06:42:28
43.247.156.168 attackbotsspam
Invalid user ako from 43.247.156.168 port 52055
2019-10-29 06:34:54
96.251.179.115 attackbotsspam
Invalid user sinusbot from 96.251.179.115 port 41068
2019-10-29 06:52:15
192.207.205.98 attack
Invalid user oracle from 192.207.205.98 port 61007
2019-10-29 06:16:31
175.213.185.129 attack
Invalid user root1 from 175.213.185.129 port 51984
2019-10-29 06:19:43

Recently Reported IPs

142.93.134.54 142.93.134.3 142.93.135.255 142.93.136.94
142.93.137.118 142.93.137.172 142.93.137.191 142.93.137.192
142.93.137.230 142.93.134.71 142.93.134.90 142.93.137.161
142.93.137.44 142.93.137.88 142.93.138.149 142.93.138.217
118.96.98.31 142.93.138.76 142.93.138.151 142.93.139.224