Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: DigitalOcean LLC

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
Aug 21 14:44:18 vmd36147 sshd[5727]: Failed password for root from 142.93.167.34 port 35516 ssh2
Aug 21 14:44:28 vmd36147 sshd[6194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.167.34
...
2020-08-21 20:53:13
Comments on same subnet:
IP Type Details Datetime
142.93.167.15 attackspambots
Oct 13 15:48:41 ns308116 sshd[31987]: Invalid user saraki from 142.93.167.15 port 59792
Oct 13 15:48:41 ns308116 sshd[31987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.167.15
Oct 13 15:48:43 ns308116 sshd[31987]: Failed password for invalid user saraki from 142.93.167.15 port 59792 ssh2
Oct 13 15:54:40 ns308116 sshd[32151]: Invalid user gary from 142.93.167.15 port 35222
Oct 13 15:54:40 ns308116 sshd[32151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.167.15
...
2020-10-14 01:08:08
142.93.167.15 attackbotsspam
Oct 13 08:18:35 pornomens sshd\[30328\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.167.15  user=root
Oct 13 08:18:37 pornomens sshd\[30328\]: Failed password for root from 142.93.167.15 port 60700 ssh2
Oct 13 08:25:54 pornomens sshd\[30453\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.167.15  user=root
...
2020-10-13 16:18:54
142.93.167.15 attackspambots
Oct 13 05:34:47 gw1 sshd[9174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.167.15
Oct 13 05:34:50 gw1 sshd[9174]: Failed password for invalid user space from 142.93.167.15 port 33896 ssh2
...
2020-10-13 08:52:06
142.93.167.48 attack
Feb 14 20:21:53 auw2 sshd\[2688\]: Invalid user 123password123 from 142.93.167.48
Feb 14 20:21:53 auw2 sshd\[2688\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.167.48
Feb 14 20:21:56 auw2 sshd\[2688\]: Failed password for invalid user 123password123 from 142.93.167.48 port 58420 ssh2
Feb 14 20:24:55 auw2 sshd\[2998\]: Invalid user teamspeak3 from 142.93.167.48
Feb 14 20:24:55 auw2 sshd\[2998\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.167.48
2020-02-15 14:25:14
142.93.167.36 attack
4782/tcp 4664/tcp 4444/tcp...
[2020-01-09/27]10pkt,6pt.(tcp)
2020-01-28 04:05:00
142.93.167.254 attackspam
Unauthorized connection attempt detected from IP address 142.93.167.254 to port 8088 [T]
2020-01-21 04:13:25
142.93.167.36 attackbots
Unauthorized SSH login attempts
2020-01-18 15:13:59
142.93.167.254 attackbots
Jan 15 10:22:45 debian-2gb-nbg1-2 kernel: \[1339464.139954\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=142.93.167.254 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=54321 PROTO=TCP SPT=41406 DPT=8088 WINDOW=65535 RES=0x00 SYN URGP=0
2020-01-15 18:33:56
142.93.167.254 attack
Unauthorized connection attempt detected from IP address 142.93.167.254 to port 8088
2020-01-14 09:26:50
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.167.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2228
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.93.167.34.			IN	A

;; AUTHORITY SECTION:
.			565	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020082001 1800 900 604800 86400

;; Query time: 48 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Aug 21 20:53:08 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 34.167.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 34.167.93.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
46.38.150.94 attackbots
Jul  9 10:00:59 srv01 postfix/smtpd\[6302\]: warning: unknown\[46.38.150.94\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  9 10:01:43 srv01 postfix/smtpd\[30910\]: warning: unknown\[46.38.150.94\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  9 10:02:28 srv01 postfix/smtpd\[30889\]: warning: unknown\[46.38.150.94\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  9 10:03:12 srv01 postfix/smtpd\[30889\]: warning: unknown\[46.38.150.94\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  9 10:03:58 srv01 postfix/smtpd\[30889\]: warning: unknown\[46.38.150.94\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-09 16:15:54
125.164.103.142 attack
Unauthorized connection attempt from IP address 125.164.103.142 on Port 445(SMB)
2020-07-09 16:18:12
200.2.127.154 attackbots
 TCP (SYN) 200.2.127.154:53881 -> port 445, len 40
2020-07-09 16:37:36
201.33.207.247 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-07-09 16:35:54
89.149.85.28 attackbots
Honeypot attack, port: 445, PTR: 28-85-149-89.orange.md.
2020-07-09 16:49:04
125.165.234.37 attack
1594266834 - 07/09/2020 05:53:54 Host: 125.165.234.37/125.165.234.37 Port: 445 TCP Blocked
2020-07-09 16:24:59
198.23.207.134 attack
Honeypot attack, port: 445, PTR: 198-23-207-134-host.colocrossing.com.
2020-07-09 16:29:17
101.255.81.91 attackbots
Jul  9 09:10:42 hosting sshd[26039]: Invalid user lry from 101.255.81.91 port 39370
...
2020-07-09 16:33:13
217.75.222.138 attackspambots
Honeypot attack, port: 445, PTR: user138.ibg-net.cz.
2020-07-09 16:15:41
111.33.3.146 attackbotsspam
Port probing on unauthorized port 1433
2020-07-09 16:16:51
141.98.9.161 attackbots
Jul  9 10:19:14 debian64 sshd[6728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.161 
Jul  9 10:19:16 debian64 sshd[6728]: Failed password for invalid user admin from 141.98.9.161 port 46045 ssh2
...
2020-07-09 16:46:35
82.255.38.238 attackspam
Automatic report - Banned IP Access
2020-07-09 16:54:04
95.213.143.211 attack
Automatic report - Banned IP Access
2020-07-09 16:18:56
218.92.0.158 attackspambots
Jul  9 08:40:55 localhost sshd[22237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.158  user=root
Jul  9 08:40:57 localhost sshd[22237]: Failed password for root from 218.92.0.158 port 56945 ssh2
Jul  9 08:41:01 localhost sshd[22237]: Failed password for root from 218.92.0.158 port 56945 ssh2
Jul  9 08:40:55 localhost sshd[22237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.158  user=root
Jul  9 08:40:57 localhost sshd[22237]: Failed password for root from 218.92.0.158 port 56945 ssh2
Jul  9 08:41:01 localhost sshd[22237]: Failed password for root from 218.92.0.158 port 56945 ssh2
Jul  9 08:40:55 localhost sshd[22237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.158  user=root
Jul  9 08:40:57 localhost sshd[22237]: Failed password for root from 218.92.0.158 port 56945 ssh2
Jul  9 08:41:01 localhost sshd[22237]: Failed password fo
...
2020-07-09 16:43:37
222.186.30.218 attack
Jul  9 08:17:44 scw-6657dc sshd[31696]: Failed password for root from 222.186.30.218 port 33424 ssh2
Jul  9 08:17:44 scw-6657dc sshd[31696]: Failed password for root from 222.186.30.218 port 33424 ssh2
Jul  9 08:17:48 scw-6657dc sshd[31696]: Failed password for root from 222.186.30.218 port 33424 ssh2
...
2020-07-09 16:25:57

Recently Reported IPs

130.34.28.152 205.18.49.191 194.141.228.202 253.241.118.75
230.250.8.91 244.236.121.141 83.154.105.7 191.91.64.147
93.39.184.17 49.72.181.188 152.136.96.220 1.10.230.37
221.122.56.2 111.72.195.254 49.146.13.68 211.218.2.118
134.60.30.36 113.179.130.62 171.115.162.99 186.119.97.227