Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
142.93.170.135 attackbots
Unauthorised Access Attempt
2020-09-28 03:20:59
142.93.170.135 attackspam
Bruteforce detected by fail2ban
2020-09-27 19:30:56
142.93.170.135 attackspam
142.93.170.135 (DE/Germany/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 19 08:08:04 server4 sshd[14579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.170.135  user=root
Sep 19 08:04:39 server4 sshd[12443]: Failed password for root from 106.12.166.167 port 32149 ssh2
Sep 19 08:11:35 server4 sshd[17259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.14.77.102  user=root
Sep 19 08:06:23 server4 sshd[13559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.136.185  user=root
Sep 19 08:06:25 server4 sshd[13559]: Failed password for root from 206.189.136.185 port 53096 ssh2
Sep 19 08:08:06 server4 sshd[14579]: Failed password for root from 142.93.170.135 port 49956 ssh2

IP Addresses Blocked:
2020-09-19 21:02:25
142.93.170.135 attack
Sep 18 13:57:46 ws12vmsma01 sshd[21511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.170.135  user=root
Sep 18 13:57:48 ws12vmsma01 sshd[21511]: Failed password for root from 142.93.170.135 port 40128 ssh2
Sep 18 14:02:17 ws12vmsma01 sshd[22129]: Invalid user frank from 142.93.170.135
...
2020-09-19 04:36:40
142.93.170.135 attackspam
Sep 14 18:50:29 neko-world sshd[5595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.170.135  user=root
Sep 14 18:50:31 neko-world sshd[5595]: Failed password for invalid user root from 142.93.170.135 port 37482 ssh2
2020-09-15 02:48:15
142.93.170.135 attack
Sep 13 22:20:17 firewall sshd[6151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.170.135
Sep 13 22:20:17 firewall sshd[6151]: Invalid user murakami from 142.93.170.135
Sep 13 22:20:19 firewall sshd[6151]: Failed password for invalid user murakami from 142.93.170.135 port 54340 ssh2
...
2020-09-14 18:36:50
142.93.170.135 attack
Aug 23 07:31:54 PorscheCustomer sshd[3295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.170.135
Aug 23 07:31:56 PorscheCustomer sshd[3295]: Failed password for invalid user dcj from 142.93.170.135 port 56602 ssh2
Aug 23 07:35:40 PorscheCustomer sshd[3363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.170.135
...
2020-08-23 19:03:56
142.93.170.135 attack
Aug 17 07:05:00 scw-tender-jepsen sshd[10328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.170.135
Aug 17 07:05:02 scw-tender-jepsen sshd[10328]: Failed password for invalid user jin from 142.93.170.135 port 50666 ssh2
2020-08-17 18:11:08
142.93.170.135 attack
Aug 12 00:16:38 ip106 sshd[6884]: Failed password for root from 142.93.170.135 port 55982 ssh2
...
2020-08-12 08:50:28
142.93.170.135 attackspam
Aug  2 15:03:13 hosting sshd[15812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.170.135  user=root
Aug  2 15:03:15 hosting sshd[15812]: Failed password for root from 142.93.170.135 port 54016 ssh2
Aug  2 15:07:03 hosting sshd[16714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.170.135  user=root
Aug  2 15:07:05 hosting sshd[16714]: Failed password for root from 142.93.170.135 port 36030 ssh2
...
2020-08-03 01:42:06
142.93.170.135 attackspambots
SSH Invalid Login
2020-08-01 06:30:26
142.93.170.135 attackbots
Jul 31 06:21:13 vmd36147 sshd[18976]: Failed password for root from 142.93.170.135 port 52622 ssh2
Jul 31 06:24:59 vmd36147 sshd[27127]: Failed password for root from 142.93.170.135 port 34810 ssh2
...
2020-07-31 13:51:22
142.93.170.135 attackspambots
Jul 29 08:42:36 h2829583 sshd[21030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.170.135
2020-07-29 17:23:22
142.93.170.135 attackbots
Jul 28 14:46:39 NPSTNNYC01T sshd[28102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.170.135
Jul 28 14:46:40 NPSTNNYC01T sshd[28102]: Failed password for invalid user eddyhang from 142.93.170.135 port 50906 ssh2
Jul 28 14:51:18 NPSTNNYC01T sshd[28480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.170.135
...
2020-07-29 02:51:45
142.93.170.135 attack
Jul 26 22:31:11 fhem-rasp sshd[12944]: Invalid user dem from 142.93.170.135 port 39272
...
2020-07-27 04:50:35
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.170.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51194
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.93.170.161.			IN	A

;; AUTHORITY SECTION:
.			484	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 09:43:54 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 161.170.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 161.170.93.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.175.93.24 attackbots
05/26/2020-11:09:45.874857 185.175.93.24 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-26 23:45:35
128.14.11.107 attackspambots
Unauthorized access detected from black listed ip!
2020-05-27 00:05:15
113.162.160.27 attackspambots
Automatic report - Port Scan Attack
2020-05-27 00:15:18
59.126.75.5 attack
May 26 14:31:59 debian-2gb-nbg1-2 kernel: \[12755118.437370\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=59.126.75.5 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=52 ID=18003 PROTO=TCP SPT=59698 DPT=23 WINDOW=47445 RES=0x00 SYN URGP=0
2020-05-26 23:51:17
194.63.159.134 attack
May 26 15:59:58 ip-172-31-61-156 sshd[2893]: Failed password for root from 194.63.159.134 port 41595 ssh2
May 26 16:03:46 ip-172-31-61-156 sshd[3058]: Invalid user luszczek from 194.63.159.134
May 26 16:03:46 ip-172-31-61-156 sshd[3058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.63.159.134
May 26 16:03:46 ip-172-31-61-156 sshd[3058]: Invalid user luszczek from 194.63.159.134
May 26 16:03:48 ip-172-31-61-156 sshd[3058]: Failed password for invalid user luszczek from 194.63.159.134 port 43684 ssh2
...
2020-05-27 00:09:47
157.230.153.75 attackbotsspam
May 26 17:52:41 vps333114 sshd[28978]: Failed password for root from 157.230.153.75 port 48670 ssh2
May 26 18:03:09 vps333114 sshd[29289]: Invalid user admin from 157.230.153.75
...
2020-05-27 00:14:47
183.81.106.44 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-26 23:41:49
177.87.154.2 attack
2020-05-26T11:51:07.765425devel sshd[10101]: Failed password for root from 177.87.154.2 port 43218 ssh2
2020-05-26T11:55:42.291591devel sshd[10413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=r-2.154-87-177.nrttelecom.com.br  user=root
2020-05-26T11:55:44.745295devel sshd[10413]: Failed password for root from 177.87.154.2 port 48936 ssh2
2020-05-27 00:04:27
159.65.159.17 attack
May 12 06:55:41 localhost sshd[1131188]: Invalid user tsbot from 159.65.159.17 port 56344
May 12 06:55:41 localhost sshd[1131188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.159.17 
May 12 06:55:41 localhost sshd[1131188]: Invalid user tsbot from 159.65.159.17 port 56344
May 12 06:55:43 localhost sshd[1131188]: Failed password for invalid user tsbot from 159.65.159.17 port 56344 ssh2
May 12 07:04:29 localhost sshd[1132629]: Invalid user joshua from 159.65.159.17 port 55436
May 12 07:04:29 localhost sshd[1132629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.159.17 
May 12 07:04:29 localhost sshd[1132629]: Invalid user joshua from 159.65.159.17 port 55436
May 12 07:04:31 localhost sshd[1132629]: Failed password for invalid user joshua from 159.65.159.17 port 55436 ssh2
May 12 07:09:22 localhost sshd[1134004]: Invalid user spam1 from 159.65.159.17 port 35948


........
------------------------------------------
2020-05-26 23:47:03
216.218.206.98 attackspambots
srv02 Mass scanning activity detected Target: 1883  ..
2020-05-26 23:34:14
36.111.182.35 attackbots
May 26 12:24:26 ns382633 sshd\[11858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.111.182.35  user=root
May 26 12:24:28 ns382633 sshd\[11858\]: Failed password for root from 36.111.182.35 port 40290 ssh2
May 26 12:30:10 ns382633 sshd\[13336\]: Invalid user etherpad from 36.111.182.35 port 39208
May 26 12:30:10 ns382633 sshd\[13336\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.111.182.35
May 26 12:30:12 ns382633 sshd\[13336\]: Failed password for invalid user etherpad from 36.111.182.35 port 39208 ssh2
2020-05-26 23:33:40
42.117.20.181 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-05-27 00:14:09
68.99.85.62 attack
May 26 15:09:14 ns382633 sshd\[10033\]: Invalid user kay from 68.99.85.62 port 47140
May 26 15:09:14 ns382633 sshd\[10033\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.99.85.62
May 26 15:09:16 ns382633 sshd\[10033\]: Failed password for invalid user kay from 68.99.85.62 port 47140 ssh2
May 26 15:24:22 ns382633 sshd\[12858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.99.85.62  user=root
May 26 15:24:25 ns382633 sshd\[12858\]: Failed password for root from 68.99.85.62 port 49266 ssh2
2020-05-26 23:39:46
65.191.76.227 attackbots
2020-05-25 09:50:29 server sshd[48821]: Failed password for invalid user root from 65.191.76.227 port 40054 ssh2
2020-05-27 00:00:07
159.65.132.170 attackspam
May 26 19:05:31 ift sshd\[10526\]: Failed password for bin from 159.65.132.170 port 45270 ssh2May 26 19:09:36 ift sshd\[10950\]: Invalid user hung from 159.65.132.170May 26 19:09:38 ift sshd\[10950\]: Failed password for invalid user hung from 159.65.132.170 port 49360 ssh2May 26 19:13:41 ift sshd\[11464\]: Invalid user claude from 159.65.132.170May 26 19:13:43 ift sshd\[11464\]: Failed password for invalid user claude from 159.65.132.170 port 53446 ssh2
...
2020-05-27 00:16:59

Recently Reported IPs

142.93.170.150 142.93.171.181 142.93.171.64 142.93.170.92
142.93.171.13 142.93.172.154 142.93.172.136 142.93.173.244
142.93.172.161 142.93.173.220 142.93.172.24 142.93.173.138
142.93.174.112 142.93.173.34 142.93.174.154 142.93.174.131
142.93.174.199 142.93.174.188 118.97.103.26 142.93.174.191