Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.75.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3144
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.93.75.5.			IN	A

;; AUTHORITY SECTION:
.			502	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 92 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:24:20 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 5.75.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 5.75.93.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
203.241.248.18 attack
Attempted connection to port 1433.
2020-05-30 18:34:10
27.2.216.147 attackbotsspam
1590810385 - 05/30/2020 05:46:25 Host: 27.2.216.147/27.2.216.147 Port: 445 TCP Blocked
2020-05-30 18:18:23
79.42.65.236 attackspam
Attempted connection to port 8181.
2020-05-30 18:29:14
181.225.67.5 attackspam
Unauthorized connection attempt from IP address 181.225.67.5 on Port 445(SMB)
2020-05-30 18:19:54
220.133.23.205 attack
Unauthorised access (May 30) SRC=220.133.23.205 LEN=40 TTL=45 ID=4995 TCP DPT=23 WINDOW=39722 SYN
2020-05-30 18:39:45
46.218.7.227 attackbotsspam
Invalid user bye from 46.218.7.227 port 52787
2020-05-30 18:35:35
212.92.124.161 attackbotsspam
fell into ViewStateTrap:madrid
2020-05-30 18:51:09
123.20.34.72 attackspam
(eximsyntax) Exim syntax errors from 123.20.34.72 (VN/Vietnam/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-05-30 08:16:20 SMTP call from [123.20.34.72] dropped: too many syntax or protocol errors (last command was "?\034?\032?\027?\031?\034?\033?\030?\032?\026?\016?\r?\v?\f?	?")
2020-05-30 18:16:21
200.180.191.155 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-05-30 18:57:42
36.88.142.177 attackspambots
Unauthorized connection attempt from IP address 36.88.142.177 on Port 445(SMB)
2020-05-30 18:49:30
190.232.122.235 attack
Attempted connection to port 5358.
2020-05-30 18:36:18
161.35.133.166 attackbotsspam
Unauthorized connection attempt from IP address 161.35.133.166 on Port 445(SMB)
2020-05-30 18:21:55
200.5.55.199 attack
Unauthorized connection attempt from IP address 200.5.55.199 on Port 445(SMB)
2020-05-30 18:56:33
42.226.124.60 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-30 18:29:43
184.154.47.3 attackbotsspam
[Sat May 30 01:33:10 2020] - DDoS Attack From IP: 184.154.47.3 Port: 31738
2020-05-30 18:49:06

Recently Reported IPs

142.93.71.60 142.93.78.5 142.93.75.75 142.93.79.130
142.93.8.231 142.93.88.182 142.93.88.96 142.93.93.135
142.93.79.224 142.93.99.119 142.93.99.43 142.93.95.62
142.99.246.34 143.0.170.30 143.0.217.174 143.0.218.99
143.0.217.158 143.0.101.29 143.0.219.121 143.0.222.43