Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: DigitalOcean LLC

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackbots
Nov 30 09:29:14 v22018076590370373 sshd[31698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.74.45 
...
2020-02-02 03:21:00
attackbotsspam
$f2bV_matches
2020-01-15 21:50:10
attackbotsspam
$f2bV_matches
2020-01-11 22:57:32
attackspam
Jan 10 04:58:10 hanapaa sshd\[23117\]: Invalid user pye from 142.93.74.45
Jan 10 04:58:10 hanapaa sshd\[23117\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.74.45
Jan 10 04:58:13 hanapaa sshd\[23117\]: Failed password for invalid user pye from 142.93.74.45 port 58486 ssh2
Jan 10 05:00:58 hanapaa sshd\[23375\]: Invalid user ppc from 142.93.74.45
Jan 10 05:00:58 hanapaa sshd\[23375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.74.45
2020-01-11 00:44:10
attackbotsspam
Jan  3 09:48:40 * sshd[24190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.74.45
Jan  3 09:48:42 * sshd[24190]: Failed password for invalid user server from 142.93.74.45 port 51726 ssh2
2020-01-03 20:00:29
attackbots
SSH Bruteforce attempt
2019-12-06 16:42:22
attackbots
Automatic report: SSH brute force attempt
2019-12-05 21:07:03
attack
Invalid user www from 142.93.74.45 port 46800
2019-08-20 18:58:18
attackbotsspam
Invalid user one from 142.93.74.45 port 33672
2019-07-24 15:56:43
attackspambots
Jul 22 16:45:29 OPSO sshd\[17312\]: Invalid user jeanne from 142.93.74.45 port 40358
Jul 22 16:45:29 OPSO sshd\[17312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.74.45
Jul 22 16:45:31 OPSO sshd\[17312\]: Failed password for invalid user jeanne from 142.93.74.45 port 40358 ssh2
Jul 22 16:50:01 OPSO sshd\[17590\]: Invalid user basesystem from 142.93.74.45 port 53886
Jul 22 16:50:01 OPSO sshd\[17590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.74.45
2019-07-22 23:37:57
attack
Jul 13 19:13:28 SilenceServices sshd[5737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.74.45
Jul 13 19:13:30 SilenceServices sshd[5737]: Failed password for invalid user alessandra from 142.93.74.45 port 51900 ssh2
Jul 13 19:18:26 SilenceServices sshd[10615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.74.45
2019-07-14 01:34:32
attackbots
Jul  8 06:02:31 core01 sshd\[5836\]: Invalid user ubuntu from 142.93.74.45 port 46414
Jul  8 06:02:31 core01 sshd\[5836\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.74.45
...
2019-07-08 12:08:36
attack
Jun 29 22:29:10 ovpn sshd\[32609\]: Invalid user musicbot from 142.93.74.45
Jun 29 22:29:10 ovpn sshd\[32609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.74.45
Jun 29 22:29:11 ovpn sshd\[32609\]: Failed password for invalid user musicbot from 142.93.74.45 port 36072 ssh2
Jun 29 22:30:46 ovpn sshd\[463\]: Invalid user hue from 142.93.74.45
Jun 29 22:30:46 ovpn sshd\[463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.74.45
2019-06-30 05:22:36
attack
Jun 29 04:46:07 icinga sshd[18643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.74.45
Jun 29 04:46:09 icinga sshd[18643]: Failed password for invalid user user from 142.93.74.45 port 34312 ssh2
...
2019-06-29 11:48:15
Comments on same subnet:
IP Type Details Datetime
142.93.74.248 attackspambots
firewall-block, port(s): 20512/tcp
2020-06-27 08:48:34
142.93.74.248 attack
TCP port : 14311
2020-06-26 13:30:38
142.93.74.248 attackspam
TCP port : 3718
2020-06-25 00:29:38
142.93.74.248 attack
Port scanning [2 denied]
2020-05-22 15:42:44
142.93.74.248 attackbots
" "
2020-05-02 21:44:23
142.93.74.248 attackspambots
Port 12235 scan denied
2020-04-17 19:00:50
142.93.74.250 attack
firewall-block, port(s): 9090/tcp
2020-02-18 23:21:40
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.74.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33328
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.93.74.45.			IN	A

;; AUTHORITY SECTION:
.			2997	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019032900 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Fri Mar 29 16:29:13 +08 2019
;; MSG SIZE  rcvd: 116

Host info
Host 45.74.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 45.74.93.142.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
184.30.210.217 attack
09/27/2019-00:13:45.163078 184.30.210.217 Protocol: 6 SURICATA TLS invalid record/traffic
2019-09-27 06:16:37
106.12.28.36 attackspambots
Sep 26 18:06:42 xtremcommunity sshd\[42033\]: Invalid user dev from 106.12.28.36 port 58046
Sep 26 18:06:42 xtremcommunity sshd\[42033\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.28.36
Sep 26 18:06:44 xtremcommunity sshd\[42033\]: Failed password for invalid user dev from 106.12.28.36 port 58046 ssh2
Sep 26 18:10:44 xtremcommunity sshd\[47584\]: Invalid user trendimsa1.0 from 106.12.28.36 port 34106
Sep 26 18:10:44 xtremcommunity sshd\[47584\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.28.36
...
2019-09-27 06:16:59
182.61.104.218 attackbots
Sep 26 23:49:33 core sshd[30253]: Invalid user martine from 182.61.104.218 port 59328
Sep 26 23:49:35 core sshd[30253]: Failed password for invalid user martine from 182.61.104.218 port 59328 ssh2
...
2019-09-27 06:12:06
183.131.82.99 attackspambots
2019-09-26T22:41:25.691627abusebot-7.cloudsearch.cf sshd\[22598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.131.82.99  user=root
2019-09-27 06:44:06
91.231.128.62 attackbotsspam
Unauthorised access (Sep 27) SRC=91.231.128.62 LEN=52 TTL=117 ID=23416 DF TCP DPT=445 WINDOW=8192 SYN
2019-09-27 06:41:38
141.89.192.238 attack
Sep 26 12:03:49 wbs sshd\[13299\]: Invalid user admin from 141.89.192.238
Sep 26 12:03:49 wbs sshd\[13299\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.89.192.238
Sep 26 12:03:51 wbs sshd\[13299\]: Failed password for invalid user admin from 141.89.192.238 port 32996 ssh2
Sep 26 12:07:41 wbs sshd\[13640\]: Invalid user adm from 141.89.192.238
Sep 26 12:07:41 wbs sshd\[13640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.89.192.238
2019-09-27 06:18:28
51.77.200.62 attack
xmlrpc attack
2019-09-27 06:14:24
37.187.23.116 attackbotsspam
Sep 27 01:21:04 server sshd\[20845\]: Invalid user jjj from 37.187.23.116 port 60912
Sep 27 01:21:04 server sshd\[20845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.23.116
Sep 27 01:21:05 server sshd\[20845\]: Failed password for invalid user jjj from 37.187.23.116 port 60912 ssh2
Sep 27 01:25:18 server sshd\[29130\]: Invalid user fof from 37.187.23.116 port 45086
Sep 27 01:25:18 server sshd\[29130\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.23.116
2019-09-27 06:27:58
222.186.175.182 attackbots
Sep 27 00:37:20 MainVPS sshd[24554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
Sep 27 00:37:22 MainVPS sshd[24554]: Failed password for root from 222.186.175.182 port 16772 ssh2
Sep 27 00:37:41 MainVPS sshd[24554]: error: maximum authentication attempts exceeded for root from 222.186.175.182 port 16772 ssh2 [preauth]
Sep 27 00:37:20 MainVPS sshd[24554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
Sep 27 00:37:22 MainVPS sshd[24554]: Failed password for root from 222.186.175.182 port 16772 ssh2
Sep 27 00:37:41 MainVPS sshd[24554]: error: maximum authentication attempts exceeded for root from 222.186.175.182 port 16772 ssh2 [preauth]
Sep 27 00:37:49 MainVPS sshd[24586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
Sep 27 00:37:51 MainVPS sshd[24586]: Failed password for root from 222.186.175.182 port
2019-09-27 06:43:12
49.88.112.80 attackbotsspam
Sep 27 00:29:10 srv206 sshd[21165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.80  user=root
Sep 27 00:29:13 srv206 sshd[21165]: Failed password for root from 49.88.112.80 port 18546 ssh2
...
2019-09-27 06:29:24
60.255.230.202 attackbotsspam
Sep 27 03:42:47 areeb-Workstation sshd[17277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.255.230.202
Sep 27 03:42:48 areeb-Workstation sshd[17277]: Failed password for invalid user Test from 60.255.230.202 port 37480 ssh2
...
2019-09-27 06:26:36
108.195.81.230 attack
Sep 26 17:22:22 debian sshd\[15840\]: Invalid user postgres from 108.195.81.230 port 53006
Sep 26 17:22:22 debian sshd\[15840\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.195.81.230
Sep 26 17:22:24 debian sshd\[15840\]: Failed password for invalid user postgres from 108.195.81.230 port 53006 ssh2
...
2019-09-27 06:32:45
222.186.15.217 attackspam
Sep 27 00:23:57 MK-Soft-Root2 sshd[11763]: Failed password for root from 222.186.15.217 port 55318 ssh2
Sep 27 00:24:01 MK-Soft-Root2 sshd[11763]: Failed password for root from 222.186.15.217 port 55318 ssh2
...
2019-09-27 06:29:44
36.112.137.55 attack
Sep 26 12:04:35 hiderm sshd\[1983\]: Invalid user 1234567890 from 36.112.137.55
Sep 26 12:04:35 hiderm sshd\[1983\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.112.137.55
Sep 26 12:04:38 hiderm sshd\[1983\]: Failed password for invalid user 1234567890 from 36.112.137.55 port 48875 ssh2
Sep 26 12:08:30 hiderm sshd\[2295\]: Invalid user 123 from 36.112.137.55
Sep 26 12:08:30 hiderm sshd\[2295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.112.137.55
2019-09-27 06:21:41
59.56.74.165 attackbots
Sep 26 11:55:47 php1 sshd\[25066\]: Invalid user ts2 from 59.56.74.165
Sep 26 11:55:47 php1 sshd\[25066\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.56.74.165
Sep 26 11:55:49 php1 sshd\[25066\]: Failed password for invalid user ts2 from 59.56.74.165 port 55506 ssh2
Sep 26 12:00:39 php1 sshd\[25954\]: Invalid user iptv from 59.56.74.165
Sep 26 12:00:39 php1 sshd\[25954\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.56.74.165
2019-09-27 06:12:23

Recently Reported IPs

104.236.78.228 104.131.93.33 103.10.30.224 71.6.142.80
223.197.153.106 213.190.194.227 203.188.243.182 199.195.252.213
188.254.96.132 187.185.70.10 179.232.1.254 179.191.65.122
167.99.66.166 165.227.97.108 159.89.235.61 159.65.174.81
139.59.34.17 134.175.129.225 134.175.49.215 130.105.68.200