Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: North Bergen

Region: New Jersey

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
142.93.240.62 spamattack
PHISHING AND SPAM ATTACK
FROM "Important Notification - newsletter@app.ksinergy.biz - " : 
SUBJECT "Congrats! Open Immediately! " :
RECEIVED "from mail-02.ksinergy.biz ([142.93.240.62]:39126) " :
DATE/TIMESENT "Mon, 01 Mar 2021 10:14:52 ":
IP ADDRESS "inetnum: 142.93.0.0 - 142.93.255.255  OrgName: DigitalOcean, LLC
2021-03-01 08:16:37
142.93.240.62 spamattack
PHISHING AND SPAM ATTACK
FROM "Casino For You - newsletter@app.ksinergy.biz -" : 
SUBJECT "Join today and receive an amazing welcome bonus " :
RECEIVED "from mail-02.ksinergy.biz ([142.93.240.62]:57421) " :
DATE/TIMESENT "Tue, 23 Feb 2021 01:27:07 "
2021-02-23 04:32:24
142.93.212.91 attackbotsspam
SSH BruteForce Attack
2020-10-13 01:56:49
142.93.237.57 attack
Multiport scan 2 ports : 1583 27080
2020-10-12 21:16:28
142.93.212.91 attack
Oct 12 10:23:09 localhost sshd\[19098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.212.91  user=root
Oct 12 10:23:11 localhost sshd\[19098\]: Failed password for root from 142.93.212.91 port 59394 ssh2
Oct 12 10:27:27 localhost sshd\[19552\]: Invalid user sanjeev from 142.93.212.91
Oct 12 10:27:27 localhost sshd\[19552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.212.91
Oct 12 10:27:29 localhost sshd\[19552\]: Failed password for invalid user sanjeev from 142.93.212.91 port 36984 ssh2
...
2020-10-12 17:20:25
142.93.237.57 attack
1089/tcp 5984/tcp
[2020-10-11]2pkt
2020-10-12 12:46:46
142.93.211.36 attackspambots
Oct 12 00:25:27 *hidden* sshd[869]: Failed password for *hidden* from 142.93.211.36 port 56534 ssh2 Oct 12 00:28:28 *hidden* sshd[1320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.211.36 user=root Oct 12 00:28:30 *hidden* sshd[1320]: Failed password for *hidden* from 142.93.211.36 port 40212 ssh2
2020-10-12 07:11:11
142.93.209.251 attackbotsspam
Oct 11 22:07:55 v2202009116398126984 sshd[2515868]: Invalid user elke from 142.93.209.251 port 44534
...
2020-10-12 06:24:15
142.93.223.118 attackspam
SSH login attempts.
2020-10-12 04:12:31
142.93.211.36 attackspam
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-10-11 23:23:00
142.93.209.251 attack
Oct 11 16:26:57 sso sshd[30604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.209.251
Oct 11 16:26:59 sso sshd[30604]: Failed password for invalid user chris from 142.93.209.251 port 59794 ssh2
...
2020-10-11 22:34:31
142.93.223.118 attackspam
SSH login attempts.
2020-10-11 20:11:30
142.93.211.36 attack
Fail2Ban
2020-10-11 15:21:45
142.93.209.251 attackbots
(sshd) Failed SSH login from 142.93.209.251 (IN/India/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 11 00:54:24 optimus sshd[28004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.209.251  user=root
Oct 11 00:54:27 optimus sshd[28004]: Failed password for root from 142.93.209.251 port 54930 ssh2
Oct 11 01:19:11 optimus sshd[6951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.209.251  user=root
Oct 11 01:19:13 optimus sshd[6951]: Failed password for root from 142.93.209.251 port 56072 ssh2
Oct 11 01:24:49 optimus sshd[11852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.209.251  user=root
2020-10-11 14:29:57
142.93.223.118 attackspam
2020-10-11T07:03:53.476597lavrinenko.info sshd[19701]: Failed password for root from 142.93.223.118 port 55582 ssh2
2020-10-11T07:07:58.292860lavrinenko.info sshd[19798]: Invalid user next from 142.93.223.118 port 33376
2020-10-11T07:07:58.302917lavrinenko.info sshd[19798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.223.118
2020-10-11T07:07:58.292860lavrinenko.info sshd[19798]: Invalid user next from 142.93.223.118 port 33376
2020-10-11T07:08:00.553715lavrinenko.info sshd[19798]: Failed password for invalid user next from 142.93.223.118 port 33376 ssh2
...
2020-10-11 12:10:33
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.2.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59315
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.93.2.89.			IN	A

;; AUTHORITY SECTION:
.			582	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020111500 1800 900 604800 86400

;; Query time: 79 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 15 17:27:11 CST 2020
;; MSG SIZE  rcvd: 115
Host info
Host 89.2.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 89.2.93.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
13.67.74.251 attack
SSH/22 MH Probe, BF, Hack -
2019-07-29 23:14:09
80.82.77.19 attackspambots
Scanning random ports - tries to find possible vulnerable services
2019-07-29 22:15:02
104.41.147.212 attackbotsspam
20 attempts against mh-ssh on star.magehost.pro
2019-07-29 23:17:02
119.63.83.76 attackspam
Jul 29 08:23:17 tamoto postfix/smtpd[30621]: connect from unknown[119.63.83.76]
Jul 29 08:23:17 tamoto postfix/smtpd[30623]: connect from unknown[119.63.83.76]
Jul 29 08:23:18 tamoto postfix/smtpd[30624]: connect from unknown[119.63.83.76]
Jul 29 08:23:19 tamoto postfix/smtpd[30625]: connect from unknown[119.63.83.76]
Jul 29 08:23:19 tamoto postfix/smtpd[30626]: connect from unknown[119.63.83.76]
Jul 29 08:23:19 tamoto postfix/smtpd[30621]: SSL_accept error from unknown[119.63.83.76]: lost connection
Jul 29 08:23:19 tamoto postfix/smtpd[30626]: SSL_accept error from unknown[119.63.83.76]: lost connection
Jul 29 08:23:19 tamoto postfix/smtpd[30623]: lost connection after CONNECT from unknown[119.63.83.76]
Jul 29 08:23:19 tamoto postfix/smtpd[30621]: lost connection after CONNECT from unknown[119.63.83.76]
Jul 29 08:23:19 tamoto postfix/smtpd[30621]: disconnect from unknown[119.63.83.76]
Jul 29 08:23:19 tamoto postfix/smtpd[30624]: SSL_accept error from unknown[119.63.83.........
-------------------------------
2019-07-29 23:12:52
82.94.246.31 attackbots
blocked by firewall for SQL Injection in query string: id=29%22%20or%20(1%2C2)%3D(select*from(select%20name_const(CHAR(111%2C108%2C111%2C108%2C111%2C115%2C104…
2019-07-29 22:53:13
66.249.73.142 attackbots
Automatic report - Banned IP Access
2019-07-29 23:20:31
117.93.96.62 attackbots
Jul 29 09:47:50 s64-1 sshd[28901]: Failed password for root from 117.93.96.62 port 53208 ssh2
Jul 29 09:52:04 s64-1 sshd[28990]: Failed password for root from 117.93.96.62 port 34492 ssh2
...
2019-07-29 23:13:29
115.164.45.96 attackbotsspam
PHI,WP GET /wp-login.php
2019-07-29 23:06:18
66.240.192.39 attackspam
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-07-29 22:18:50
46.3.96.70 attackbotsspam
29.07.2019 13:50:30 Connection to port 34319 blocked by firewall
2019-07-29 22:21:34
91.206.15.33 attack
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-07-29 22:10:28
61.10.164.114 attack
Trying to (more than 3 packets) bruteforce (not open) SSH port 22
2019-07-29 22:37:35
193.81.36.50 attackbots
Jul 29 05:29:00 TORMINT sshd\[26037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.81.36.50  user=root
Jul 29 05:29:02 TORMINT sshd\[26037\]: Failed password for root from 193.81.36.50 port 59166 ssh2
Jul 29 05:33:37 TORMINT sshd\[26173\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.81.36.50  user=root
...
2019-07-29 23:10:47
217.11.74.114 attackbots
Trying to (more than 3 packets) bruteforce (not open) Samba/Microsoft-DS port 445
2019-07-29 22:23:11
77.247.109.30 attackspambots
Jul 29 15:15:16 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=77.247.109.30 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=39965 PROTO=TCP SPT=55665 DPT=3390 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-07-29 22:17:06

Recently Reported IPs

181.44.74.16 78.83.175.208 175.196.134.64 161.97.94.216
77.148.29.86 77.148.29.180 136.233.14.6 109.38.130.106
114.124.212.183 185.237.74.243 179.107.149.124 46.199.230.6
80.181.130.250 138.204.25.61 173.235.96.131 90.101.223.195
194.114.37.55 119.74.223.170 102.50.50.153 91.218.240.75