Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: North Bergen

Region: New Jersey

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
142.93.240.62 spamattack
PHISHING AND SPAM ATTACK
FROM "Important Notification - newsletter@app.ksinergy.biz - " : 
SUBJECT "Congrats! Open Immediately! " :
RECEIVED "from mail-02.ksinergy.biz ([142.93.240.62]:39126) " :
DATE/TIMESENT "Mon, 01 Mar 2021 10:14:52 ":
IP ADDRESS "inetnum: 142.93.0.0 - 142.93.255.255  OrgName: DigitalOcean, LLC
2021-03-01 08:16:37
142.93.240.62 spamattack
PHISHING AND SPAM ATTACK
FROM "Casino For You - newsletter@app.ksinergy.biz -" : 
SUBJECT "Join today and receive an amazing welcome bonus " :
RECEIVED "from mail-02.ksinergy.biz ([142.93.240.62]:57421) " :
DATE/TIMESENT "Tue, 23 Feb 2021 01:27:07 "
2021-02-23 04:32:24
142.93.212.91 attackbotsspam
SSH BruteForce Attack
2020-10-13 01:56:49
142.93.237.57 attack
Multiport scan 2 ports : 1583 27080
2020-10-12 21:16:28
142.93.212.91 attack
Oct 12 10:23:09 localhost sshd\[19098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.212.91  user=root
Oct 12 10:23:11 localhost sshd\[19098\]: Failed password for root from 142.93.212.91 port 59394 ssh2
Oct 12 10:27:27 localhost sshd\[19552\]: Invalid user sanjeev from 142.93.212.91
Oct 12 10:27:27 localhost sshd\[19552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.212.91
Oct 12 10:27:29 localhost sshd\[19552\]: Failed password for invalid user sanjeev from 142.93.212.91 port 36984 ssh2
...
2020-10-12 17:20:25
142.93.237.57 attack
1089/tcp 5984/tcp
[2020-10-11]2pkt
2020-10-12 12:46:46
142.93.211.36 attackspambots
Oct 12 00:25:27 *hidden* sshd[869]: Failed password for *hidden* from 142.93.211.36 port 56534 ssh2 Oct 12 00:28:28 *hidden* sshd[1320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.211.36 user=root Oct 12 00:28:30 *hidden* sshd[1320]: Failed password for *hidden* from 142.93.211.36 port 40212 ssh2
2020-10-12 07:11:11
142.93.209.251 attackbotsspam
Oct 11 22:07:55 v2202009116398126984 sshd[2515868]: Invalid user elke from 142.93.209.251 port 44534
...
2020-10-12 06:24:15
142.93.223.118 attackspam
SSH login attempts.
2020-10-12 04:12:31
142.93.211.36 attackspam
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-10-11 23:23:00
142.93.209.251 attack
Oct 11 16:26:57 sso sshd[30604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.209.251
Oct 11 16:26:59 sso sshd[30604]: Failed password for invalid user chris from 142.93.209.251 port 59794 ssh2
...
2020-10-11 22:34:31
142.93.223.118 attackspam
SSH login attempts.
2020-10-11 20:11:30
142.93.211.36 attack
Fail2Ban
2020-10-11 15:21:45
142.93.209.251 attackbots
(sshd) Failed SSH login from 142.93.209.251 (IN/India/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 11 00:54:24 optimus sshd[28004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.209.251  user=root
Oct 11 00:54:27 optimus sshd[28004]: Failed password for root from 142.93.209.251 port 54930 ssh2
Oct 11 01:19:11 optimus sshd[6951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.209.251  user=root
Oct 11 01:19:13 optimus sshd[6951]: Failed password for root from 142.93.209.251 port 56072 ssh2
Oct 11 01:24:49 optimus sshd[11852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.209.251  user=root
2020-10-11 14:29:57
142.93.223.118 attackspam
2020-10-11T07:03:53.476597lavrinenko.info sshd[19701]: Failed password for root from 142.93.223.118 port 55582 ssh2
2020-10-11T07:07:58.292860lavrinenko.info sshd[19798]: Invalid user next from 142.93.223.118 port 33376
2020-10-11T07:07:58.302917lavrinenko.info sshd[19798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.223.118
2020-10-11T07:07:58.292860lavrinenko.info sshd[19798]: Invalid user next from 142.93.223.118 port 33376
2020-10-11T07:08:00.553715lavrinenko.info sshd[19798]: Failed password for invalid user next from 142.93.223.118 port 33376 ssh2
...
2020-10-11 12:10:33
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.2.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59315
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.93.2.89.			IN	A

;; AUTHORITY SECTION:
.			582	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020111500 1800 900 604800 86400

;; Query time: 79 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 15 17:27:11 CST 2020
;; MSG SIZE  rcvd: 115
Host info
Host 89.2.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 89.2.93.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
181.137.202.74 attack
Invalid user r00t from 181.137.202.74 port 49940
2020-05-23 19:43:37
210.245.34.243 attackbots
SSH brute-force attempt
2020-05-23 19:35:54
34.230.182.69 attackspam
Invalid user gbi from 34.230.182.69 port 56824
2020-05-23 19:29:41
178.128.164.133 spam
email scam bitcoin
2020-05-23 19:49:16
197.26.95.69 attackspam
Invalid user r00t from 197.26.95.69 port 49338
2020-05-23 19:38:32
51.68.174.177 attackspambots
2020-05-23T04:32:37.325955linuxbox-skyline sshd[17563]: Invalid user von from 51.68.174.177 port 53394
...
2020-05-23 19:21:21
193.112.191.228 attack
Invalid user kpp from 193.112.191.228 port 58218
2020-05-23 19:39:27
200.229.146.66 attackbotsspam
Invalid user administrator from 200.229.146.66 port 55336
2020-05-23 19:37:22
45.116.232.0 attack
Invalid user admin from 45.116.232.0 port 62046
2020-05-23 19:25:51
171.96.154.69 attackspam
Invalid user service from 171.96.154.69 port 62443
2020-05-23 19:47:35
49.230.80.148 attackspam
Invalid user service from 49.230.80.148 port 55697
2020-05-23 19:22:26
103.215.80.238 attack
firewall-block, port(s): 445/tcp
2020-05-23 19:13:13
200.96.115.94 attackbotsspam
Invalid user dun from 200.96.115.94 port 17484
2020-05-23 19:38:12
182.232.159.94 attack
Invalid user administrator from 182.232.159.94 port 50021
2020-05-23 19:42:49
41.50.77.135 attack
Invalid user pi from 41.50.77.135 port 56868
2020-05-23 19:26:50

Recently Reported IPs

181.44.74.16 78.83.175.208 175.196.134.64 161.97.94.216
77.148.29.86 77.148.29.180 136.233.14.6 109.38.130.106
114.124.212.183 185.237.74.243 179.107.149.124 46.199.230.6
80.181.130.250 138.204.25.61 173.235.96.131 90.101.223.195
194.114.37.55 119.74.223.170 102.50.50.153 91.218.240.75