Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Santa Clara

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: DigitalOcean, LLC

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
142.93.83.242 attack
Email rejected due to spam filtering
2020-04-23 01:06:53
142.93.83.218 attackbotsspam
Mar  4 09:23:31 NPSTNNYC01T sshd[28847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.83.218
Mar  4 09:23:33 NPSTNNYC01T sshd[28847]: Failed password for invalid user spark from 142.93.83.218 port 45148 ssh2
Mar  4 09:25:23 NPSTNNYC01T sshd[29064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.83.218
...
2020-03-05 02:03:42
142.93.83.218 attackspam
Feb 27 03:29:13 server sshd\[8030\]: Invalid user admin from 142.93.83.218
Feb 27 03:29:13 server sshd\[8030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.83.218 
Feb 27 03:29:15 server sshd\[8030\]: Failed password for invalid user admin from 142.93.83.218 port 40316 ssh2
Feb 27 03:31:35 server sshd\[8794\]: Invalid user test1 from 142.93.83.218
Feb 27 03:31:35 server sshd\[8794\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.83.218 
...
2020-02-27 08:35:15
142.93.83.218 attackbotsspam
*Port Scan* detected from 142.93.83.218 (US/United States/-). 4 hits in the last 150 seconds
2020-02-12 16:14:04
142.93.83.218 attackbotsspam
Feb  8 06:04:47 srv-ubuntu-dev3 sshd[34041]: Invalid user ntz from 142.93.83.218
Feb  8 06:04:47 srv-ubuntu-dev3 sshd[34041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.83.218
Feb  8 06:04:47 srv-ubuntu-dev3 sshd[34041]: Invalid user ntz from 142.93.83.218
Feb  8 06:04:49 srv-ubuntu-dev3 sshd[34041]: Failed password for invalid user ntz from 142.93.83.218 port 39128 ssh2
Feb  8 06:07:48 srv-ubuntu-dev3 sshd[34301]: Invalid user bxz from 142.93.83.218
Feb  8 06:07:48 srv-ubuntu-dev3 sshd[34301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.83.218
Feb  8 06:07:48 srv-ubuntu-dev3 sshd[34301]: Invalid user bxz from 142.93.83.218
Feb  8 06:07:50 srv-ubuntu-dev3 sshd[34301]: Failed password for invalid user bxz from 142.93.83.218 port 40686 ssh2
Feb  8 06:10:47 srv-ubuntu-dev3 sshd[34751]: Invalid user km from 142.93.83.218
...
2020-02-08 18:00:05
142.93.83.218 attack
detected by Fail2Ban
2020-02-02 03:19:42
142.93.83.218 attackspambots
$f2bV_matches
2020-01-11 22:57:13
142.93.83.218 attackspam
SSH Brute Force, server-1 sshd[1184]: Failed password for invalid user gkk from 142.93.83.218 port 32922 ssh2
2020-01-08 16:56:31
142.93.83.218 attack
IP blocked
2020-01-03 07:25:14
142.93.83.218 attackbotsspam
Dec 31 05:38:07 server sshd\[20070\]: Invalid user home from 142.93.83.218
Dec 31 05:38:07 server sshd\[20070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.83.218 
Dec 31 05:38:09 server sshd\[20070\]: Failed password for invalid user home from 142.93.83.218 port 53500 ssh2
Dec 31 12:03:00 server sshd\[13378\]: Invalid user brimo from 142.93.83.218
Dec 31 12:03:00 server sshd\[13378\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.83.218 
...
2019-12-31 18:52:25
142.93.83.218 attackbots
Dec  8 06:24:03 eddieflores sshd\[12034\]: Invalid user guest from 142.93.83.218
Dec  8 06:24:03 eddieflores sshd\[12034\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.83.218
Dec  8 06:24:04 eddieflores sshd\[12034\]: Failed password for invalid user guest from 142.93.83.218 port 42212 ssh2
Dec  8 06:30:57 eddieflores sshd\[13585\]: Invalid user dunnett from 142.93.83.218
Dec  8 06:30:57 eddieflores sshd\[13585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.83.218
2019-12-09 00:42:46
142.93.83.218 attackbotsspam
SSH bruteforce (Triggered fail2ban)
2019-12-02 23:07:34
142.93.83.218 attackspambots
$f2bV_matches
2019-11-29 02:25:28
142.93.83.218 attackspam
Nov 17 17:09:12 sd-53420 sshd\[22667\]: Invalid user holbrook from 142.93.83.218
Nov 17 17:09:12 sd-53420 sshd\[22667\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.83.218
Nov 17 17:09:14 sd-53420 sshd\[22667\]: Failed password for invalid user holbrook from 142.93.83.218 port 57924 ssh2
Nov 17 17:12:57 sd-53420 sshd\[23704\]: User root from 142.93.83.218 not allowed because none of user's groups are listed in AllowGroups
Nov 17 17:12:58 sd-53420 sshd\[23704\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.83.218  user=root
...
2019-11-18 00:35:48
142.93.83.218 attackspambots
Nov 17 07:41:45 legacy sshd[5322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.83.218
Nov 17 07:41:48 legacy sshd[5322]: Failed password for invalid user squid from 142.93.83.218 port 46744 ssh2
Nov 17 07:45:51 legacy sshd[5425]: Failed password for bin from 142.93.83.218 port 55336 ssh2
...
2019-11-17 14:50:32
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.83.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5336
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.93.83.136.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041302 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sun Apr 14 09:21:07 +08 2019
;; MSG SIZE  rcvd: 117

Host info
Host 136.83.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 136.83.93.142.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
77.69.181.58 attackspambots
Unauthorized connection attempt from IP address 77.69.181.58 on Port 445(SMB)
2019-11-26 05:02:07
170.238.50.222 attackbotsspam
Automatic report - Port Scan Attack
2019-11-26 05:19:43
185.53.88.75 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-26 05:13:23
60.51.112.157 attack
Tried to hack a Wordpress website.
2019-11-26 05:16:44
31.163.140.116 attackspambots
Unauthorised access (Nov 25) SRC=31.163.140.116 LEN=40 TTL=52 ID=3904 TCP DPT=23 WINDOW=37556 SYN
2019-11-26 05:02:57
52.187.132.251 attackspam
Nov 25 10:07:35 hanapaa sshd\[19236\]: Invalid user pvm from 52.187.132.251
Nov 25 10:07:35 hanapaa sshd\[19236\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.187.132.251
Nov 25 10:07:37 hanapaa sshd\[19236\]: Failed password for invalid user pvm from 52.187.132.251 port 55336 ssh2
Nov 25 10:14:44 hanapaa sshd\[19915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.187.132.251  user=root
Nov 25 10:14:45 hanapaa sshd\[19915\]: Failed password for root from 52.187.132.251 port 36716 ssh2
2019-11-26 04:43:19
36.77.95.116 attackbots
Unauthorized connection attempt from IP address 36.77.95.116 on Port 445(SMB)
2019-11-26 04:41:12
180.180.148.43 attackspambots
port scan and connect, tcp 23 (telnet)
2019-11-26 04:56:14
106.54.139.117 attack
$f2bV_matches
2019-11-26 05:05:24
195.210.28.164 attackbots
Nov 25 20:50:49 localhost sshd\[96105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.210.28.164  user=backup
Nov 25 20:50:51 localhost sshd\[96105\]: Failed password for backup from 195.210.28.164 port 52404 ssh2
Nov 25 20:56:54 localhost sshd\[96321\]: Invalid user juoyu from 195.210.28.164 port 33712
Nov 25 20:56:54 localhost sshd\[96321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.210.28.164
Nov 25 20:56:55 localhost sshd\[96321\]: Failed password for invalid user juoyu from 195.210.28.164 port 33712 ssh2
...
2019-11-26 05:03:55
77.111.107.114 attackbotsspam
detected by Fail2Ban
2019-11-26 05:08:43
201.249.196.74 attackbotsspam
Unauthorized connection attempt from IP address 201.249.196.74 on Port 445(SMB)
2019-11-26 04:58:22
177.106.150.166 attack
Unauthorized connection attempt from IP address 177.106.150.166 on Port 445(SMB)
2019-11-26 05:04:40
218.92.0.178 attackspam
Nov 26 03:50:11 webhost01 sshd[26565]: Failed password for root from 218.92.0.178 port 24315 ssh2
Nov 26 03:50:24 webhost01 sshd[26565]: error: maximum authentication attempts exceeded for root from 218.92.0.178 port 24315 ssh2 [preauth]
...
2019-11-26 04:50:33
219.250.188.2 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-26 04:41:36

Recently Reported IPs

213.239.80.194 182.106.191.39 52.166.185.4 14.63.161.30
186.24.43.29 125.123.212.108 178.128.97.193 117.70.229.118
82.77.246.70 185.150.44.159 217.77.221.85 190.219.199.135
124.18.81.215 139.59.93.104 185.254.139.183 144.76.114.135
5.62.43.150 117.159.7.51 177.18.225.226 112.113.136.224