Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Santa Clara

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: DigitalOcean, LLC

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
142.93.83.242 attack
Email rejected due to spam filtering
2020-04-23 01:06:53
142.93.83.218 attackbotsspam
Mar  4 09:23:31 NPSTNNYC01T sshd[28847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.83.218
Mar  4 09:23:33 NPSTNNYC01T sshd[28847]: Failed password for invalid user spark from 142.93.83.218 port 45148 ssh2
Mar  4 09:25:23 NPSTNNYC01T sshd[29064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.83.218
...
2020-03-05 02:03:42
142.93.83.218 attackspam
Feb 27 03:29:13 server sshd\[8030\]: Invalid user admin from 142.93.83.218
Feb 27 03:29:13 server sshd\[8030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.83.218 
Feb 27 03:29:15 server sshd\[8030\]: Failed password for invalid user admin from 142.93.83.218 port 40316 ssh2
Feb 27 03:31:35 server sshd\[8794\]: Invalid user test1 from 142.93.83.218
Feb 27 03:31:35 server sshd\[8794\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.83.218 
...
2020-02-27 08:35:15
142.93.83.218 attackbotsspam
*Port Scan* detected from 142.93.83.218 (US/United States/-). 4 hits in the last 150 seconds
2020-02-12 16:14:04
142.93.83.218 attackbotsspam
Feb  8 06:04:47 srv-ubuntu-dev3 sshd[34041]: Invalid user ntz from 142.93.83.218
Feb  8 06:04:47 srv-ubuntu-dev3 sshd[34041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.83.218
Feb  8 06:04:47 srv-ubuntu-dev3 sshd[34041]: Invalid user ntz from 142.93.83.218
Feb  8 06:04:49 srv-ubuntu-dev3 sshd[34041]: Failed password for invalid user ntz from 142.93.83.218 port 39128 ssh2
Feb  8 06:07:48 srv-ubuntu-dev3 sshd[34301]: Invalid user bxz from 142.93.83.218
Feb  8 06:07:48 srv-ubuntu-dev3 sshd[34301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.83.218
Feb  8 06:07:48 srv-ubuntu-dev3 sshd[34301]: Invalid user bxz from 142.93.83.218
Feb  8 06:07:50 srv-ubuntu-dev3 sshd[34301]: Failed password for invalid user bxz from 142.93.83.218 port 40686 ssh2
Feb  8 06:10:47 srv-ubuntu-dev3 sshd[34751]: Invalid user km from 142.93.83.218
...
2020-02-08 18:00:05
142.93.83.218 attack
detected by Fail2Ban
2020-02-02 03:19:42
142.93.83.218 attackspambots
$f2bV_matches
2020-01-11 22:57:13
142.93.83.218 attackspam
SSH Brute Force, server-1 sshd[1184]: Failed password for invalid user gkk from 142.93.83.218 port 32922 ssh2
2020-01-08 16:56:31
142.93.83.218 attack
IP blocked
2020-01-03 07:25:14
142.93.83.218 attackbotsspam
Dec 31 05:38:07 server sshd\[20070\]: Invalid user home from 142.93.83.218
Dec 31 05:38:07 server sshd\[20070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.83.218 
Dec 31 05:38:09 server sshd\[20070\]: Failed password for invalid user home from 142.93.83.218 port 53500 ssh2
Dec 31 12:03:00 server sshd\[13378\]: Invalid user brimo from 142.93.83.218
Dec 31 12:03:00 server sshd\[13378\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.83.218 
...
2019-12-31 18:52:25
142.93.83.218 attackbots
Dec  8 06:24:03 eddieflores sshd\[12034\]: Invalid user guest from 142.93.83.218
Dec  8 06:24:03 eddieflores sshd\[12034\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.83.218
Dec  8 06:24:04 eddieflores sshd\[12034\]: Failed password for invalid user guest from 142.93.83.218 port 42212 ssh2
Dec  8 06:30:57 eddieflores sshd\[13585\]: Invalid user dunnett from 142.93.83.218
Dec  8 06:30:57 eddieflores sshd\[13585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.83.218
2019-12-09 00:42:46
142.93.83.218 attackbotsspam
SSH bruteforce (Triggered fail2ban)
2019-12-02 23:07:34
142.93.83.218 attackspambots
$f2bV_matches
2019-11-29 02:25:28
142.93.83.218 attackspam
Nov 17 17:09:12 sd-53420 sshd\[22667\]: Invalid user holbrook from 142.93.83.218
Nov 17 17:09:12 sd-53420 sshd\[22667\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.83.218
Nov 17 17:09:14 sd-53420 sshd\[22667\]: Failed password for invalid user holbrook from 142.93.83.218 port 57924 ssh2
Nov 17 17:12:57 sd-53420 sshd\[23704\]: User root from 142.93.83.218 not allowed because none of user's groups are listed in AllowGroups
Nov 17 17:12:58 sd-53420 sshd\[23704\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.83.218  user=root
...
2019-11-18 00:35:48
142.93.83.218 attackspambots
Nov 17 07:41:45 legacy sshd[5322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.83.218
Nov 17 07:41:48 legacy sshd[5322]: Failed password for invalid user squid from 142.93.83.218 port 46744 ssh2
Nov 17 07:45:51 legacy sshd[5425]: Failed password for bin from 142.93.83.218 port 55336 ssh2
...
2019-11-17 14:50:32
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.83.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5336
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.93.83.136.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041302 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sun Apr 14 09:21:07 +08 2019
;; MSG SIZE  rcvd: 117

Host info
Host 136.83.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 136.83.93.142.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
212.73.81.242 attack
Oct 10 08:32:36 inter-technics sshd[29025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.73.81.242  user=root
Oct 10 08:32:38 inter-technics sshd[29025]: Failed password for root from 212.73.81.242 port 17228 ssh2
Oct 10 08:37:07 inter-technics sshd[29326]: Invalid user photo from 212.73.81.242 port 60676
Oct 10 08:37:07 inter-technics sshd[29326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.73.81.242
Oct 10 08:37:07 inter-technics sshd[29326]: Invalid user photo from 212.73.81.242 port 60676
Oct 10 08:37:09 inter-technics sshd[29326]: Failed password for invalid user photo from 212.73.81.242 port 60676 ssh2
...
2020-10-10 15:54:40
192.241.224.82 attack
Sep 9 19:54:22 *hidden* postfix/postscreen[54836]: DNSBL rank 3 for [192.241.224.82]:39638
2020-10-10 16:11:38
80.11.61.235 attackspambots
$f2bV_matches
2020-10-10 16:06:33
210.212.237.67 attack
2020-10-10T02:54:58.066083abusebot-4.cloudsearch.cf sshd[7563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.212.237.67  user=root
2020-10-10T02:55:00.468949abusebot-4.cloudsearch.cf sshd[7563]: Failed password for root from 210.212.237.67 port 35216 ssh2
2020-10-10T02:59:24.566156abusebot-4.cloudsearch.cf sshd[7568]: Invalid user gpadmin from 210.212.237.67 port 39870
2020-10-10T02:59:24.575214abusebot-4.cloudsearch.cf sshd[7568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.212.237.67
2020-10-10T02:59:24.566156abusebot-4.cloudsearch.cf sshd[7568]: Invalid user gpadmin from 210.212.237.67 port 39870
2020-10-10T02:59:26.831810abusebot-4.cloudsearch.cf sshd[7568]: Failed password for invalid user gpadmin from 210.212.237.67 port 39870 ssh2
2020-10-10T03:04:01.095341abusebot-4.cloudsearch.cf sshd[7594]: Invalid user anthony from 210.212.237.67 port 44534
...
2020-10-10 16:25:18
176.120.203.122 attackspambots
Sep 29 11:25:23 *hidden* postfix/postscreen[5420]: DNSBL rank 3 for [176.120.203.122]:53220
2020-10-10 16:25:36
222.186.15.62 attack
2020-10-10T07:56:46.351469abusebot-3.cloudsearch.cf sshd[1254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62  user=root
2020-10-10T07:56:47.999389abusebot-3.cloudsearch.cf sshd[1254]: Failed password for root from 222.186.15.62 port 48701 ssh2
2020-10-10T07:56:50.161407abusebot-3.cloudsearch.cf sshd[1254]: Failed password for root from 222.186.15.62 port 48701 ssh2
2020-10-10T07:56:46.351469abusebot-3.cloudsearch.cf sshd[1254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62  user=root
2020-10-10T07:56:47.999389abusebot-3.cloudsearch.cf sshd[1254]: Failed password for root from 222.186.15.62 port 48701 ssh2
2020-10-10T07:56:50.161407abusebot-3.cloudsearch.cf sshd[1254]: Failed password for root from 222.186.15.62 port 48701 ssh2
2020-10-10T07:56:46.351469abusebot-3.cloudsearch.cf sshd[1254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhos
...
2020-10-10 16:02:50
64.225.26.88 attackbots
xmlrpc attack
2020-10-10 16:19:34
192.35.168.218 attack
Sep 14 15:16:21 *hidden* postfix/postscreen[30880]: DNSBL rank 3 for [192.35.168.218]:35522
2020-10-10 15:55:11
148.101.124.111 attack
Oct  8 23:57:56 v11 sshd[3616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.101.124.111  user=r.r
Oct  8 23:57:58 v11 sshd[3616]: Failed password for r.r from 148.101.124.111 port 42584 ssh2
Oct  8 23:57:58 v11 sshd[3616]: Received disconnect from 148.101.124.111 port 42584:11: Bye Bye [preauth]
Oct  8 23:57:58 v11 sshd[3616]: Disconnected from 148.101.124.111 port 42584 [preauth]
Oct  9 00:03:07 v11 sshd[4107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.101.124.111  user=r.r
Oct  9 00:03:09 v11 sshd[4107]: Failed password for r.r from 148.101.124.111 port 48633 ssh2
Oct  9 00:03:09 v11 sshd[4107]: Received disconnect from 148.101.124.111 port 48633:11: Bye Bye [preauth]
Oct  9 00:03:09 v11 sshd[4107]: Disconnected from 148.101.124.111 port 48633 [preauth]
Oct  9 00:07:27 v11 sshd[4560]: Invalid user admin from 148.101.124.111 port 48614
Oct  9 00:07:27 v11 sshd[4560]: pam_u........
-------------------------------
2020-10-10 15:49:28
41.111.133.174 attackspam
Lines containing failures of 41.111.133.174
Oct  7 08:39:11 newdogma sshd[27874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.111.133.174  user=r.r
Oct  7 08:39:13 newdogma sshd[27874]: Failed password for r.r from 41.111.133.174 port 46199 ssh2
Oct  7 08:39:15 newdogma sshd[27874]: Received disconnect from 41.111.133.174 port 46199:11: Bye Bye [preauth]
Oct  7 08:39:15 newdogma sshd[27874]: Disconnected from authenticating user r.r 41.111.133.174 port 46199 [preauth]
Oct  7 08:49:51 newdogma sshd[28308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.111.133.174  user=r.r
Oct  7 08:49:53 newdogma sshd[28308]: Failed password for r.r from 41.111.133.174 port 22788 ssh2
Oct  7 08:49:54 newdogma sshd[28308]: Received disconnect from 41.111.133.174 port 22788:11: Bye Bye [preauth]
Oct  7 08:49:54 newdogma sshd[28308]: Disconnected from authenticating user r.r 41.111.133.174 port 22788........
------------------------------
2020-10-10 16:04:39
66.70.189.203 attackbotsspam
Oct 10 09:43:01 ns37 sshd[21345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.189.203
2020-10-10 16:26:55
192.241.238.86 attack
scan
2020-10-10 16:01:21
212.70.149.36 attack
2020-10-10 11:11:15 dovecot_login authenticator failed for \(User\) \[212.70.149.36\]: 535 Incorrect authentication data \(set_id=videos2@org.ua\)2020-10-10 11:11:32 dovecot_login authenticator failed for \(User\) \[212.70.149.36\]: 535 Incorrect authentication data \(set_id=redirect@org.ua\)2020-10-10 11:11:49 dovecot_login authenticator failed for \(User\) \[212.70.149.36\]: 535 Incorrect authentication data \(set_id=cdn1@org.ua\)
...
2020-10-10 16:15:36
134.17.94.55 attackbotsspam
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-10-10T07:31:50Z and 2020-10-10T07:39:05Z
2020-10-10 15:55:48
72.12.99.140 attackbotsspam
Oct 7 20:01:18 *hidden* sshd[1857]: Failed password for *hidden* from 72.12.99.140 port 36762 ssh2 Oct 7 22:05:35 *hidden* sshd[30283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.12.99.140 user=root Oct 7 22:05:37 *hidden* sshd[30283]: Failed password for *hidden* from 72.12.99.140 port 55594 ssh2
2020-10-10 16:21:34

Recently Reported IPs

213.239.80.194 182.106.191.39 52.166.185.4 14.63.161.30
186.24.43.29 125.123.212.108 178.128.97.193 117.70.229.118
82.77.246.70 185.150.44.159 217.77.221.85 190.219.199.135
124.18.81.215 139.59.93.104 185.254.139.183 144.76.114.135
5.62.43.150 117.159.7.51 177.18.225.226 112.113.136.224