Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America

Internet Service Provider: DigitalOcean LLC

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackbotsspam
Fail2Ban Ban Triggered
2020-02-23 00:17:42
Comments on same subnet:
IP Type Details Datetime
162.243.134.57 attack
Malicious IP
2024-04-30 13:38:55
162.243.134.31 attack
Apr 28 07:00:37 askasleikir sshd[20315]: Connection closed by 162.243.134.31 port 41312 [preauth]
2020-04-28 20:46:56
162.243.134.4 attackspam
scans once in preceeding hours on the ports (in chronological order) 5800 resulting in total of 50 scans from 162.243.0.0/16 block.
2020-04-25 23:28:29
162.243.134.59 attackspambots
scans once in preceeding hours on the ports (in chronological order) 2049 resulting in total of 50 scans from 162.243.0.0/16 block.
2020-04-25 23:28:12
162.243.134.25 attackbots
Port scan(s) denied
2020-04-22 17:32:16
162.243.134.59 attack
20/4/18@16:43:59: FAIL: Alarm-SSH address from=162.243.134.59
...
2020-04-19 06:11:22
162.243.134.17 attackbotsspam
Port Scan: Events[1] countPorts[1]: 7210 ..
2020-04-15 21:43:05
162.243.134.25 attackspambots
Unauthorized connection attempt detected from IP address 162.243.134.25 to port 7574
2020-04-15 01:13:56
162.243.134.31 attackbots
Unauthorized connection attempt detected from IP address 162.243.134.31 to port 22
2020-04-14 17:40:01
162.243.134.36 attackspambots
firewall-block, port(s): 1583/tcp
2020-04-09 00:39:08
162.243.134.30 attackbots
firewall-block, port(s): 65197/tcp
2020-04-06 09:26:48
162.243.134.56 attackbotsspam
9160/tcp 3001/tcp 6379/tcp...
[2020-03-14/04-04]28pkt,25pt.(tcp),1pt.(udp)
2020-04-06 04:10:33
162.243.134.15 attackspam
Unauthorized connection attempt detected from IP address 162.243.134.15 to port 5007
2020-04-06 04:04:33
162.243.134.15 attackbotsspam
[SMTP/25/465/587 Probe]
TLS/SSL handshake failed:[ wrong version number]

*(03281322)
2020-03-28 18:32:08
162.243.134.30 attack
firewall-block, port(s): 8889/tcp
2020-03-27 16:07:35
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 162.243.134.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14290
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;162.243.134.142.		IN	A

;; AUTHORITY SECTION:
.			527	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020022200 1800 900 604800 86400

;; Query time: 124 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 00:17:36 CST 2020
;; MSG SIZE  rcvd: 119
Host info
142.134.243.162.in-addr.arpa domain name pointer zg0213a-411.stretchoid.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.134.243.162.in-addr.arpa	name = zg0213a-411.stretchoid.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
111.231.54.248 attack
Jul  1 23:04:06 *** sshd[25342]: Invalid user berline from 111.231.54.248
2019-07-02 11:03:30
46.242.60.178 attack
Unauthorized connection attempt from IP address 46.242.60.178 on Port 445(SMB)
2019-07-02 10:43:46
165.22.81.168 attackspam
SSHScan
2019-07-02 10:37:23
201.213.94.208 attackbotsspam
Trying to deliver email spam, but blocked by RBL
2019-07-02 10:34:31
128.134.187.155 attack
02.07.2019 02:41:07 SSH access blocked by firewall
2019-07-02 10:50:35
187.167.68.31 attack
Unauthorized connection attempt from IP address 187.167.68.31 on Port 445(SMB)
2019-07-02 10:39:43
72.14.199.229 attack
Probing to gain illegal access
2019-07-02 10:43:12
51.68.220.249 attackspambots
Jul  2 03:24:30 mail sshd\[3268\]: Failed password for invalid user connie from 51.68.220.249 port 60450 ssh2
Jul  2 03:47:14 mail sshd\[3839\]: Invalid user pul from 51.68.220.249 port 56716
...
2019-07-02 11:05:35
109.245.38.42 attackspam
Trying to deliver email spam, but blocked by RBL
2019-07-02 10:42:40
134.175.36.61 attackspam
Jul  2 01:04:22 vps647732 sshd[7345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.36.61
Jul  2 01:04:23 vps647732 sshd[7345]: Failed password for invalid user chase from 134.175.36.61 port 42890 ssh2
...
2019-07-02 10:46:06
187.207.3.152 attackbots
Jul  2 00:51:31 shared10 sshd[18714]: Invalid user spd from 187.207.3.152
Jul  2 00:51:31 shared10 sshd[18714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.207.3.152
Jul  2 00:51:33 shared10 sshd[18714]: Failed password for invalid user spd from 187.207.3.152 port 48790 ssh2
Jul  2 00:51:33 shared10 sshd[18714]: Received disconnect from 187.207.3.152 port 48790:11: Bye Bye [preauth]
Jul  2 00:51:33 shared10 sshd[18714]: Disconnected from 187.207.3.152 port 48790 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=187.207.3.152
2019-07-02 10:51:51
188.213.166.163 attackbotsspam
2019-07-01T23:04:31.104415abusebot-4.cloudsearch.cf sshd\[29137\]: Invalid user sys from 188.213.166.163 port 54310
2019-07-02 10:36:58
103.53.188.122 attackspambots
Unauthorized connection attempt from IP address 103.53.188.122 on Port 445(SMB)
2019-07-02 11:06:19
182.76.7.171 attackspambots
Jul  2 01:28:39 dedicated sshd[4507]: Invalid user elizabet from 182.76.7.171 port 37945
2019-07-02 10:40:53
218.48.51.216 attackbotsspam
Jul  2 01:04:18 rpi sshd[7935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.48.51.216 
Jul  2 01:04:20 rpi sshd[7935]: Failed password for invalid user ssh from 218.48.51.216 port 42302 ssh2
2019-07-02 10:48:30

Recently Reported IPs

115.73.215.127 67.234.203.24 186.121.202.2 194.87.156.255
100.79.36.38 95.148.4.94 105.240.240.54 240.117.83.109
193.111.27.232 77.205.138.64 29.134.220.14 131.210.0.142
220.202.47.86 148.112.203.88 49.232.165.42 5.222.81.127
130.186.71.249 222.112.245.182 251.217.87.65 172.78.43.218