Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: San Diego

Region: California

Country: United States

Internet Service Provider: CARInet Inc.

Hostname: unknown

Organization: CariNet, Inc.

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
botsattackproxy
Botnet DB Scanner
2024-04-27 11:24:15
attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 65 - port: 5060 proto: sip cat: Misc Attackbytes: 271
2020-10-14 05:06:43
attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 62 - port: 5006 proto: udp cat: Misc Attackbytes: 83
2020-10-08 03:22:01
attack
 TCP (SYN) 71.6.167.142:20832 -> port 995, len 44
2020-10-07 19:36:34
attack
 TCP (SYN) 71.6.167.142:20041 -> port 22, len 44
2020-09-04 00:39:49
attackspambots
[Tue Aug 18 06:17:35 2020] - DDoS Attack From IP: 71.6.167.142 Port: 24858
2020-09-03 08:14:32
attackspam
Hit honeypot r.
2020-08-27 20:53:54
attackspam
Fail2Ban Ban Triggered
2020-08-16 01:25:23
attackbots
Port scanning [2 denied]
2020-08-12 18:39:35
attack
Unauthorized connection attempt detected from IP address 71.6.167.142 to port 7218
2020-08-07 20:54:56
attackspambots
Unauthorized connection attempt detected from IP address 71.6.167.142 to port 11300
2020-07-21 20:56:57
attack
 UDP 71.6.167.142:14016 -> port 5353, len 74
2020-07-18 14:56:17
attack
 TCP (SYN) 71.6.167.142:27153 -> port 992, len 44
2020-07-07 01:08:13
attackspam
 TCP (SYN) 71.6.167.142:31802 -> port 993, len 44
2020-06-26 04:21:24
attack
Unauthorized connection attempt detected from IP address 71.6.167.142 to port 25
2020-06-25 18:19:00
attack
Unauthorized connection attempt detected from IP address 71.6.167.142 to port 9200
2020-06-06 08:40:18
attackbots
06/04/2020-13:14:40.824354 71.6.167.142 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 71
2020-06-05 01:37:46
attack
Unauthorized connection attempt detected from IP address 71.6.167.142 to port 6697
2020-06-04 12:56:27
attack
 TCP (SYN) 71.6.167.142:23320 -> port 55443, len 44
2020-06-01 00:53:38
attackspambots
 UDP 71.6.167.142:14187 -> port 623, len 51
2020-05-16 02:58:41
attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 60 - port: 37 proto: TCP cat: Misc Attack
2020-05-11 08:03:58
attack
05/06/2020-15:08:00.190447 71.6.167.142 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 71
2020-05-07 03:36:34
attack
Unauthorized connection attempt detected from IP address 71.6.167.142 to port 8008
2020-04-26 00:18:26
attackspambots
scans once in preceeding hours on the ports (in chronological order) 5672 resulting in total of 13 scans from 71.6.128.0/17 block.
2020-04-24 21:25:23
attackspam
Unauthorized connection attempt detected from IP address 71.6.167.142 to port 4444
2020-04-17 15:37:35
attackspambots
Port 3001 scan denied
2020-04-17 07:09:10
attackspam
Port scan: Attack repeated for 24 hours
2020-04-11 06:31:03
attackbotsspam
[portscan] tcp/143 [IMAP]
*(RWIN=31689)(03311119)
2020-03-31 16:43:55
attack
Automatic report - Banned IP Access
2020-03-29 03:24:36
attackspambots
Unauthorized connection attempt detected from IP address 71.6.167.142 to port 84
2020-03-28 20:14:38
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 71.6.167.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15478
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;71.6.167.142.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019033000 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sat Mar 30 16:39:24 +08 2019
;; MSG SIZE  rcvd: 116

Host info
142.167.6.71.in-addr.arpa domain name pointer census9.shodan.io.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
142.167.6.71.in-addr.arpa	name = census9.shodan.io.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
64.145.94.160 attackspambots
Automatic report - Banned IP Access
2019-11-22 05:37:56
1.180.133.42 attackbotsspam
Nov 21 17:34:44 microserver sshd[51837]: Invalid user schermerhorn from 1.180.133.42 port 63598
Nov 21 17:34:44 microserver sshd[51837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.180.133.42
Nov 21 17:34:45 microserver sshd[51837]: Failed password for invalid user schermerhorn from 1.180.133.42 port 63598 ssh2
Nov 21 17:39:28 microserver sshd[52502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.180.133.42  user=root
Nov 21 17:39:29 microserver sshd[52502]: Failed password for root from 1.180.133.42 port 34835 ssh2
Nov 21 17:52:51 microserver sshd[54413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.180.133.42  user=mysql
Nov 21 17:52:53 microserver sshd[54413]: Failed password for mysql from 1.180.133.42 port 33966 ssh2
Nov 21 17:57:56 microserver sshd[55071]: Invalid user test from 1.180.133.42 port 61700
Nov 21 17:57:56 microserver sshd[55071]: pam_unix(sshd:auth): authent
2019-11-22 05:58:34
173.236.144.82 attackspam
173.236.144.82 - - \[21/Nov/2019:14:48:11 +0000\] "POST /wp-login.php HTTP/1.1" 200 4358 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
173.236.144.82 - - \[21/Nov/2019:14:48:11 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-11-22 05:28:08
139.59.9.251 attackbotsspam
xmlrpc attack
2019-11-22 05:27:26
125.166.90.5 attack
Telnet/23 MH Probe, BF, Hack -
2019-11-22 05:33:33
51.75.248.241 attack
ssh failed login
2019-11-22 05:31:25
114.246.194.191 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-22 05:43:24
200.5.230.11 attackbotsspam
port scan and connect, tcp 8080 (http-proxy)
2019-11-22 05:45:51
178.128.221.237 attackspambots
Nov 21 16:24:49 ny01 sshd[17190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.221.237
Nov 21 16:24:51 ny01 sshd[17190]: Failed password for invalid user kiran from 178.128.221.237 port 37770 ssh2
Nov 21 16:28:56 ny01 sshd[18151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.221.237
2019-11-22 05:40:20
140.143.134.86 attackbots
Nov 21 23:10:06 itv-usvr-01 sshd[31762]: Invalid user guest from 140.143.134.86
Nov 21 23:10:06 itv-usvr-01 sshd[31762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.134.86
Nov 21 23:10:06 itv-usvr-01 sshd[31762]: Invalid user guest from 140.143.134.86
Nov 21 23:10:09 itv-usvr-01 sshd[31762]: Failed password for invalid user guest from 140.143.134.86 port 54227 ssh2
2019-11-22 06:01:10
85.139.127.31 attackspam
Automatic report - XMLRPC Attack
2019-11-22 05:39:46
188.93.75.148 attackspambots
Please Block this user fast
2019-11-22 05:36:07
178.33.12.237 attack
Invalid user merrick from 178.33.12.237 port 53767
2019-11-22 05:48:05
152.136.165.226 attack
Nov 21 00:33:05 *** sshd[20617]: Failed password for invalid user glucksman from 152.136.165.226 port 36264 ssh2
2019-11-22 05:42:53
148.70.128.197 attackbots
Nov 21 16:21:16 Tower sshd[3121]: Connection from 148.70.128.197 port 57710 on 192.168.10.220 port 22
Nov 21 16:21:18 Tower sshd[3121]: Invalid user langone from 148.70.128.197 port 57710
Nov 21 16:21:18 Tower sshd[3121]: error: Could not get shadow information for NOUSER
Nov 21 16:21:18 Tower sshd[3121]: Failed password for invalid user langone from 148.70.128.197 port 57710 ssh2
Nov 21 16:21:18 Tower sshd[3121]: Received disconnect from 148.70.128.197 port 57710:11: Bye Bye [preauth]
Nov 21 16:21:18 Tower sshd[3121]: Disconnected from invalid user langone 148.70.128.197 port 57710 [preauth]
2019-11-22 05:55:10

Recently Reported IPs

202.155.149.162 23.229.29.237 213.32.69.98 177.67.48.198
121.49.99.9 99.149.251.77 186.116.196.212 180.64.71.114
109.255.228.154 107.170.202.91 174.22.165.106 114.35.191.170
64.76.49.68 152.249.226.38 106.13.89.192 162.243.165.39
83.208.68.198 76.25.119.25 181.39.1.37 200.206.92.194