Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: DigitalOcean LLC

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
Nov 24 14:59:52 sbg01 sshd[22060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.197
Nov 24 14:59:54 sbg01 sshd[22060]: Failed password for invalid user b34t3r from 142.93.222.197 port 57622 ssh2
Nov 24 15:03:42 sbg01 sshd[22100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.197
2019-11-24 22:39:52
attack
Invalid user gopher from 142.93.222.197 port 47386
2019-11-23 17:32:17
attackbotsspam
Nov 16 18:53:45 SilenceServices sshd[24638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.197
Nov 16 18:53:47 SilenceServices sshd[24638]: Failed password for invalid user teste from 142.93.222.197 port 50638 ssh2
Nov 16 18:57:41 SilenceServices sshd[27174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.197
2019-11-17 05:05:21
attackbotsspam
2019-11-10T15:57:30.886998Z c8e38fe044bc New connection: 142.93.222.197:36684 (172.17.0.3:2222) [session: c8e38fe044bc]
2019-11-10T16:05:11.543377Z 7555013c4977 New connection: 142.93.222.197:44200 (172.17.0.3:2222) [session: 7555013c4977]
2019-11-11 05:00:06
attack
Automatic report - Banned IP Access
2019-11-08 05:43:29
attackspam
Invalid user mailbot from 142.93.222.197 port 56704
2019-11-01 08:25:06
attack
Oct 26 17:28:59 firewall sshd[14779]: Invalid user -,0m from 142.93.222.197
Oct 26 17:28:59 firewall sshd[14779]: Invalid user -,0m from 142.93.222.197
Oct 26 17:28:59 firewall sshd[14779]: Failed password for invalid user -,0m from 142.93.222.197 port 40150 ssh2
...
2019-10-27 04:53:59
attackbots
2019-10-25T07:04:30.674408abusebot-4.cloudsearch.cf sshd\[5374\]: Invalid user kathi from 142.93.222.197 port 48786
2019-10-25 15:50:08
attack
Oct 23 07:49:31 dev0-dcde-rnet sshd[27500]: Failed password for root from 142.93.222.197 port 46142 ssh2
Oct 23 07:53:34 dev0-dcde-rnet sshd[27516]: Failed password for root from 142.93.222.197 port 55684 ssh2
2019-10-23 19:01:10
attackbotsspam
Oct 13 10:32:02 [host] sshd[10318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.197  user=root
Oct 13 10:32:04 [host] sshd[10318]: Failed password for root from 142.93.222.197 port 37606 ssh2
Oct 13 10:36:11 [host] sshd[10371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.197  user=root
2019-10-13 17:09:39
attackspambots
Triggered by Fail2Ban at Vostok web server
2019-10-11 03:00:11
attackbotsspam
Triggered by Fail2Ban at Vostok web server
2019-10-10 19:56:02
attack
Oct  6 06:53:32 pkdns2 sshd\[11604\]: Address 142.93.222.197 maps to jira-support.terasoftware.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Oct  6 06:53:35 pkdns2 sshd\[11604\]: Failed password for root from 142.93.222.197 port 45024 ssh2Oct  6 06:57:39 pkdns2 sshd\[11835\]: Address 142.93.222.197 maps to jira-support.terasoftware.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Oct  6 06:57:41 pkdns2 sshd\[11835\]: Failed password for root from 142.93.222.197 port 56662 ssh2Oct  6 07:01:43 pkdns2 sshd\[12072\]: Address 142.93.222.197 maps to jira-support.terasoftware.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Oct  6 07:01:43 pkdns2 sshd\[12072\]: Invalid user 12345 from 142.93.222.197
...
2019-10-06 12:12:54
attackspambots
Oct  4 19:36:05 wbs sshd\[15996\]: Invalid user Winkel2017 from 142.93.222.197
Oct  4 19:36:05 wbs sshd\[15996\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.197
Oct  4 19:36:07 wbs sshd\[15996\]: Failed password for invalid user Winkel2017 from 142.93.222.197 port 36124 ssh2
Oct  4 19:40:19 wbs sshd\[16466\]: Invalid user Retail123 from 142.93.222.197
Oct  4 19:40:19 wbs sshd\[16466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.197
2019-10-05 14:24:21
attackbotsspam
Oct  4 00:28:38 tdfoods sshd\[7568\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.197  user=root
Oct  4 00:28:40 tdfoods sshd\[7568\]: Failed password for root from 142.93.222.197 port 49978 ssh2
Oct  4 00:32:56 tdfoods sshd\[7936\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.197  user=root
Oct  4 00:32:57 tdfoods sshd\[7936\]: Failed password for root from 142.93.222.197 port 34618 ssh2
Oct  4 00:37:15 tdfoods sshd\[8297\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.197  user=root
2019-10-04 18:57:54
attackbots
Sep 26 17:51:49 rotator sshd\[31533\]: Address 142.93.222.197 maps to jira-support.terasoftware.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Sep 26 17:51:49 rotator sshd\[31533\]: Invalid user invitado from 142.93.222.197Sep 26 17:51:52 rotator sshd\[31533\]: Failed password for invalid user invitado from 142.93.222.197 port 38820 ssh2Sep 26 17:56:14 rotator sshd\[32307\]: Address 142.93.222.197 maps to jira-support.terasoftware.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Sep 26 17:56:14 rotator sshd\[32307\]: Invalid user hackett from 142.93.222.197Sep 26 17:56:16 rotator sshd\[32307\]: Failed password for invalid user hackett from 142.93.222.197 port 52252 ssh2
...
2019-09-27 00:48:06
attackspambots
Sep 17 15:30:47 core sshd[17492]: Invalid user temp from 142.93.222.197 port 56728
Sep 17 15:30:49 core sshd[17492]: Failed password for invalid user temp from 142.93.222.197 port 56728 ssh2
...
2019-09-18 03:24:32
attackbotsspam
Sep 15 04:05:58 www sshd\[45573\]: Address 142.93.222.197 maps to jira-support.terasoftware.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Sep 15 04:05:58 www sshd\[45573\]: Invalid user ud from 142.93.222.197Sep 15 04:05:59 www sshd\[45573\]: Failed password for invalid user ud from 142.93.222.197 port 55854 ssh2
...
2019-09-15 09:08:49
attackbots
Aug 27 20:41:09 auw2 sshd\[6075\]: Invalid user tecnico from 142.93.222.197
Aug 27 20:41:09 auw2 sshd\[6075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.197
Aug 27 20:41:10 auw2 sshd\[6075\]: Failed password for invalid user tecnico from 142.93.222.197 port 57228 ssh2
Aug 27 20:45:59 auw2 sshd\[6503\]: Invalid user oracle@123 from 142.93.222.197
Aug 27 20:45:59 auw2 sshd\[6503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.197
2019-08-28 14:48:25
attackbotsspam
Aug 24 03:58:47 php1 sshd\[14327\]: Invalid user epmeneze from 142.93.222.197
Aug 24 03:58:47 php1 sshd\[14327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.197
Aug 24 03:58:49 php1 sshd\[14327\]: Failed password for invalid user epmeneze from 142.93.222.197 port 33986 ssh2
Aug 24 04:03:51 php1 sshd\[14760\]: Invalid user pulse from 142.93.222.197
Aug 24 04:03:51 php1 sshd\[14760\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.197
2019-08-25 04:52:32
attackspam
Too many connections or unauthorized access detected from Arctic banned ip
2019-08-22 04:08:47
attackbots
Aug 21 00:33:55 lcprod sshd\[12717\]: Invalid user stephan from 142.93.222.197
Aug 21 00:33:55 lcprod sshd\[12717\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.197
Aug 21 00:33:58 lcprod sshd\[12717\]: Failed password for invalid user stephan from 142.93.222.197 port 50996 ssh2
Aug 21 00:38:38 lcprod sshd\[13183\]: Invalid user baker from 142.93.222.197
Aug 21 00:38:38 lcprod sshd\[13183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.197
2019-08-21 18:53:23
attack
Aug 20 12:51:44 vps200512 sshd\[13871\]: Invalid user it from 142.93.222.197
Aug 20 12:51:44 vps200512 sshd\[13871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.197
Aug 20 12:51:47 vps200512 sshd\[13871\]: Failed password for invalid user it from 142.93.222.197 port 46844 ssh2
Aug 20 12:56:50 vps200512 sshd\[13981\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.197  user=root
Aug 20 12:56:53 vps200512 sshd\[13981\]: Failed password for root from 142.93.222.197 port 37024 ssh2
2019-08-21 06:56:35
Comments on same subnet:
IP Type Details Datetime
142.93.222.83 attack
Jul 29 12:11:36 scw-6657dc sshd[21983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.83
Jul 29 12:11:36 scw-6657dc sshd[21983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.83
Jul 29 12:11:38 scw-6657dc sshd[21983]: Failed password for invalid user cam from 142.93.222.83 port 60458 ssh2
...
2020-07-29 22:56:55
142.93.222.215 attack
Apr 27 14:01:54 ns382633 sshd\[7540\]: Invalid user br from 142.93.222.215 port 45138
Apr 27 14:01:54 ns382633 sshd\[7540\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.215
Apr 27 14:01:56 ns382633 sshd\[7540\]: Failed password for invalid user br from 142.93.222.215 port 45138 ssh2
Apr 27 14:13:21 ns382633 sshd\[9897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.215  user=root
Apr 27 14:13:23 ns382633 sshd\[9897\]: Failed password for root from 142.93.222.215 port 35452 ssh2
2020-04-28 01:45:59
142.93.222.215 attackbots
Apr 27 07:24:33 localhost sshd[22260]: Invalid user ping from 142.93.222.215 port 34226
Apr 27 07:24:33 localhost sshd[22260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.215
Apr 27 07:24:33 localhost sshd[22260]: Invalid user ping from 142.93.222.215 port 34226
Apr 27 07:24:36 localhost sshd[22260]: Failed password for invalid user ping from 142.93.222.215 port 34226 ssh2
Apr 27 07:27:33 localhost sshd[22549]: Invalid user david from 142.93.222.215 port 50836
...
2020-04-27 16:28:59
142.93.222.215 attackspambots
Apr 25 19:01:29 pkdns2 sshd\[36278\]: Invalid user proba from 142.93.222.215Apr 25 19:01:32 pkdns2 sshd\[36278\]: Failed password for invalid user proba from 142.93.222.215 port 43510 ssh2Apr 25 19:05:37 pkdns2 sshd\[36447\]: Invalid user packer123 from 142.93.222.215Apr 25 19:05:39 pkdns2 sshd\[36447\]: Failed password for invalid user packer123 from 142.93.222.215 port 51272 ssh2Apr 25 19:09:53 pkdns2 sshd\[36587\]: Invalid user ku from 142.93.222.215Apr 25 19:09:55 pkdns2 sshd\[36587\]: Failed password for invalid user ku from 142.93.222.215 port 59034 ssh2
...
2020-04-26 00:49:25
142.93.222.215 attackbotsspam
Apr 23 10:56:56 ns382633 sshd\[5822\]: Invalid user xl from 142.93.222.215 port 53680
Apr 23 10:56:56 ns382633 sshd\[5822\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.215
Apr 23 10:56:57 ns382633 sshd\[5822\]: Failed password for invalid user xl from 142.93.222.215 port 53680 ssh2
Apr 23 11:09:53 ns382633 sshd\[7940\]: Invalid user admin from 142.93.222.215 port 34670
Apr 23 11:09:53 ns382633 sshd\[7940\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.215
2020-04-23 17:12:14
142.93.222.215 attack
2020-04-19T14:07:22.379225sd-86998 sshd[42958]: Invalid user admin from 142.93.222.215 port 56908
2020-04-19T14:07:22.384419sd-86998 sshd[42958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.215
2020-04-19T14:07:22.379225sd-86998 sshd[42958]: Invalid user admin from 142.93.222.215 port 56908
2020-04-19T14:07:23.770080sd-86998 sshd[42958]: Failed password for invalid user admin from 142.93.222.215 port 56908 ssh2
2020-04-19T14:13:11.488968sd-86998 sshd[43389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.215  user=root
2020-04-19T14:13:13.451716sd-86998 sshd[43389]: Failed password for root from 142.93.222.215 port 57678 ssh2
...
2020-04-19 20:50:51
142.93.222.224 attack
WordPress brute force
2019-07-24 08:47:13
142.93.222.224 attackspambots
142.93.222.224 - - \[27/Jun/2019:05:34:04 +0200\] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
142.93.222.224 - - \[27/Jun/2019:05:34:09 +0200\] "POST /wp-login.php HTTP/1.1" 200 1704 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
142.93.222.224 - - \[27/Jun/2019:05:34:19 +0200\] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
142.93.222.224 - - \[27/Jun/2019:05:34:22 +0200\] "POST /wp-login.php HTTP/1.1" 200 1684 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
142.93.222.224 - - \[27/Jun/2019:05:34:26 +0200\] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
142.93.222.224 - - \[27/Jun/2019:05:34:29 +0200\] "POST /wp-login.php HTTP/1.1" 200 1688 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:6
2019-06-27 21:13:53
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.222.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33732
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.93.222.197.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081800 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Aug 18 21:21:56 CST 2019
;; MSG SIZE  rcvd: 118
Host info
197.222.93.142.in-addr.arpa domain name pointer jira-support.terasoftware.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
197.222.93.142.in-addr.arpa	name = jira-support.terasoftware.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
80.236.219.152 attackspam
Unauthorized connection attempt detected from IP address 80.236.219.152 to port 23
2020-07-25 20:41:03
179.60.84.8 attack
Unauthorized connection attempt detected from IP address 179.60.84.8 to port 80
2020-07-25 20:55:07
49.51.9.216 attack
Unauthorized connection attempt detected from IP address 49.51.9.216 to port 12000
2020-07-25 20:45:47
213.25.135.1 attackbots
Unauthorized connection attempt detected from IP address 213.25.135.1 to port 8080
2020-07-25 20:51:17
186.46.45.62 attack
Unauthorized connection attempt detected from IP address 186.46.45.62 to port 23
2020-07-25 20:28:20
178.118.253.50 attack
Unauthorized connection attempt detected from IP address 178.118.253.50 to port 80
2020-07-25 20:55:36
190.65.206.162 attack
Unauthorized connection attempt detected from IP address 190.65.206.162 to port 81
2020-07-25 20:52:42
187.178.87.45 attack
Unauthorized connection attempt detected from IP address 187.178.87.45 to port 23
2020-07-25 20:26:57
142.93.247.221 attackspam
Unauthorized connection attempt detected from IP address 142.93.247.221 to port 1759
2020-07-25 20:32:20
72.177.2.198 attackbots
Unauthorized connection attempt detected from IP address 72.177.2.198 to port 445
2020-07-25 20:17:47
189.209.26.103 attackbots
Unauthorized connection attempt detected from IP address 189.209.26.103 to port 23
2020-07-25 20:53:27
52.40.113.6 attack
Unauthorized connection attempt detected from IP address 52.40.113.6 to port 7550
2020-07-25 20:45:12
94.102.49.159 attackspam
Jul 25 14:20:09 debian-2gb-nbg1-2 kernel: \[17938125.009724\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=94.102.49.159 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=44651 PROTO=TCP SPT=55889 DPT=3003 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-25 20:38:45
116.105.33.226 attackspambots
Unauthorized connection attempt detected from IP address 116.105.33.226 to port 23
2020-07-25 20:35:13
201.156.6.76 attackbots
Unauthorized connection attempt detected from IP address 201.156.6.76 to port 23
2020-07-25 20:51:34

Recently Reported IPs

134.209.193.10 202.209.43.110 152.217.192.9 80.141.79.218
218.46.116.228 195.51.75.159 82.109.98.40 221.180.206.141
23.245.56.13 118.168.198.199 202.94.163.44 125.162.82.54
185.53.88.54 126.33.167.160 189.135.189.55 43.185.188.140
208.46.182.246 50.35.178.234 122.189.250.129 114.220.29.80