Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frankfurt am Main

Region: Hesse

Country: Germany

Internet Service Provider: DigitalOcean LLC

Hostname: unknown

Organization: DigitalOcean, LLC

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackspambots
Invalid user patalano from 142.93.162.141 port 38978
2019-07-13 21:34:22
attack
Jun  6 10:14:27 server sshd\[217537\]: Invalid user ching from 142.93.162.141
Jun  6 10:14:27 server sshd\[217537\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.162.141
Jun  6 10:14:29 server sshd\[217537\]: Failed password for invalid user ching from 142.93.162.141 port 39848 ssh2
...
2019-07-12 05:06:15
attack
Invalid user patalano from 142.93.162.141 port 38978
2019-07-11 14:33:08
attackbots
Jul  7 06:43:02 lnxweb62 sshd[30878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.162.141
Jul  7 06:43:04 lnxweb62 sshd[30878]: Failed password for invalid user shao from 142.93.162.141 port 58744 ssh2
Jul  7 06:47:15 lnxweb62 sshd[676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.162.141
2019-07-07 12:49:00
Comments on same subnet:
IP Type Details Datetime
142.93.162.84 attackspambots
$f2bV_matches
2020-07-20 19:55:40
142.93.162.84 attack
Jul 19 12:18:55 rancher-0 sshd[455681]: Invalid user test2 from 142.93.162.84 port 37270
...
2020-07-19 18:43:42
142.93.162.84 attackspambots
Invalid user user from 142.93.162.84 port 42830
2020-07-12 18:42:37
142.93.162.84 attackbotsspam
2020-06-27T08:01:06.138154afi-git.jinr.ru sshd[22071]: Invalid user cloud from 142.93.162.84 port 54710
2020-06-27T08:01:06.141398afi-git.jinr.ru sshd[22071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.162.84
2020-06-27T08:01:06.138154afi-git.jinr.ru sshd[22071]: Invalid user cloud from 142.93.162.84 port 54710
2020-06-27T08:01:08.234922afi-git.jinr.ru sshd[22071]: Failed password for invalid user cloud from 142.93.162.84 port 54710 ssh2
2020-06-27T08:04:16.572822afi-git.jinr.ru sshd[22681]: Invalid user orca from 142.93.162.84 port 55514
...
2020-06-27 13:04:58
142.93.162.84 attackspambots
Jun 17 11:05:51 ns3033917 sshd[15351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.162.84
Jun 17 11:05:51 ns3033917 sshd[15351]: Invalid user rust from 142.93.162.84 port 35646
Jun 17 11:05:53 ns3033917 sshd[15351]: Failed password for invalid user rust from 142.93.162.84 port 35646 ssh2
...
2020-06-17 19:56:32
142.93.162.84 attack
Jun 10 21:26:54 mout sshd[15814]: Invalid user max from 142.93.162.84 port 57246
Jun 10 21:26:56 mout sshd[15814]: Failed password for invalid user max from 142.93.162.84 port 57246 ssh2
Jun 10 21:26:58 mout sshd[15814]: Disconnected from invalid user max 142.93.162.84 port 57246 [preauth]
2020-06-11 04:05:47
142.93.162.84 attackspam
Jun  3 15:00:04 sip sshd[521823]: Failed password for root from 142.93.162.84 port 41750 ssh2
Jun  3 15:03:26 sip sshd[521868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.162.84  user=root
Jun  3 15:03:28 sip sshd[521868]: Failed password for root from 142.93.162.84 port 45580 ssh2
...
2020-06-03 22:28:32
142.93.162.84 attackspambots
$f2bV_matches
2020-05-21 18:49:24
142.93.162.84 attack
invalid user
2020-05-15 23:01:36
142.93.162.84 attackbotsspam
$f2bV_matches
2020-05-01 18:01:48
142.93.162.84 attack
Brute-force attempt banned
2020-04-28 02:59:44
142.93.162.84 attack
k+ssh-bruteforce
2020-04-26 16:50:21
142.93.162.84 attackspambots
Hits on port : 10604
2020-04-23 02:39:51
142.93.162.84 attack
Apr 20 05:57:25 hell sshd[17915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.162.84
Apr 20 05:57:27 hell sshd[17915]: Failed password for invalid user test from 142.93.162.84 port 44650 ssh2
...
2020-04-20 14:24:31
142.93.162.223 attack
Port probing on unauthorized port 2307
2020-04-18 19:15:46
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.162.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48828
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.93.162.141.			IN	A

;; AUTHORITY SECTION:
.			1950	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019032900 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Fri Mar 29 18:15:25 +08 2019
;; MSG SIZE  rcvd: 118

Host info
Host 141.162.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 141.162.93.142.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
129.204.89.115 attackspam
5x Failed Password
2020-03-22 00:28:35
123.206.62.112 attackspam
Invalid user kasandra from 123.206.62.112 port 59317
2020-03-22 00:29:39
77.60.37.105 attack
$f2bV_matches
2020-03-22 00:43:11
142.44.242.38 attackspam
Invalid user muki from 142.44.242.38 port 33496
2020-03-22 01:02:58
138.197.32.150 attackspambots
ssh brute force
2020-03-22 00:26:02
106.13.63.253 attack
Invalid user tomesek from 106.13.63.253 port 55490
2020-03-22 00:36:59
118.89.161.136 attackspam
Invalid user mailtest from 118.89.161.136 port 58448
2020-03-22 00:31:23
210.120.112.18 attack
Invalid user rc from 210.120.112.18 port 50112
2020-03-22 00:52:44
52.156.39.108 attackspam
Invalid user fabercastell from 52.156.39.108 port 32884
2020-03-22 00:44:07
157.230.31.236 attack
Mar 21 16:24:27 debian-2gb-nbg1-2 kernel: \[7063364.936114\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=157.230.31.236 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=32263 PROTO=TCP SPT=51749 DPT=18243 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-22 00:22:40
104.198.16.231 attackspam
Mar 21 16:05:41 ns382633 sshd\[8629\]: Invalid user didba from 104.198.16.231 port 59818
Mar 21 16:05:41 ns382633 sshd\[8629\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.198.16.231
Mar 21 16:05:43 ns382633 sshd\[8629\]: Failed password for invalid user didba from 104.198.16.231 port 59818 ssh2
Mar 21 16:14:40 ns382633 sshd\[9931\]: Invalid user fatima from 104.198.16.231 port 51622
Mar 21 16:14:40 ns382633 sshd\[9931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.198.16.231
2020-03-22 00:40:38
138.68.18.232 attack
SSH_attack
2020-03-22 00:27:06
111.231.75.5 attackbots
Invalid user angela from 111.231.75.5 port 43644
2020-03-22 01:11:48
45.232.73.83 attackbots
$f2bV_matches
2020-03-22 00:49:17
49.234.25.49 attack
Invalid user ellora from 49.234.25.49 port 54328
2020-03-22 00:48:26

Recently Reported IPs

142.93.218.84 139.59.169.37 134.175.38.205 129.144.180.57
128.199.123.170 121.185.124.20 118.163.181.157 112.169.9.149
104.248.126.68 104.236.38.105 103.1.40.189 84.99.109.15
82.131.209.179 81.130.234.235 81.3.191.91 66.49.84.65
61.0.242.100 59.120.243.8 51.254.210.53 51.75.253.80