Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: San Diego

Region: California

Country: United States

Internet Service Provider: CARInet Inc.

Hostname: unknown

Organization: CariNet, Inc.

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
botsattackproxy
Botnet DB Scanner
2024-04-27 11:24:15
attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 65 - port: 5060 proto: sip cat: Misc Attackbytes: 271
2020-10-14 05:06:43
attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 62 - port: 5006 proto: udp cat: Misc Attackbytes: 83
2020-10-08 03:22:01
attack
 TCP (SYN) 71.6.167.142:20832 -> port 995, len 44
2020-10-07 19:36:34
attack
 TCP (SYN) 71.6.167.142:20041 -> port 22, len 44
2020-09-04 00:39:49
attackspambots
[Tue Aug 18 06:17:35 2020] - DDoS Attack From IP: 71.6.167.142 Port: 24858
2020-09-03 08:14:32
attackspam
Hit honeypot r.
2020-08-27 20:53:54
attackspam
Fail2Ban Ban Triggered
2020-08-16 01:25:23
attackbots
Port scanning [2 denied]
2020-08-12 18:39:35
attack
Unauthorized connection attempt detected from IP address 71.6.167.142 to port 7218
2020-08-07 20:54:56
attackspambots
Unauthorized connection attempt detected from IP address 71.6.167.142 to port 11300
2020-07-21 20:56:57
attack
 UDP 71.6.167.142:14016 -> port 5353, len 74
2020-07-18 14:56:17
attack
 TCP (SYN) 71.6.167.142:27153 -> port 992, len 44
2020-07-07 01:08:13
attackspam
 TCP (SYN) 71.6.167.142:31802 -> port 993, len 44
2020-06-26 04:21:24
attack
Unauthorized connection attempt detected from IP address 71.6.167.142 to port 25
2020-06-25 18:19:00
attack
Unauthorized connection attempt detected from IP address 71.6.167.142 to port 9200
2020-06-06 08:40:18
attackbots
06/04/2020-13:14:40.824354 71.6.167.142 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 71
2020-06-05 01:37:46
attack
Unauthorized connection attempt detected from IP address 71.6.167.142 to port 6697
2020-06-04 12:56:27
attack
 TCP (SYN) 71.6.167.142:23320 -> port 55443, len 44
2020-06-01 00:53:38
attackspambots
 UDP 71.6.167.142:14187 -> port 623, len 51
2020-05-16 02:58:41
attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 60 - port: 37 proto: TCP cat: Misc Attack
2020-05-11 08:03:58
attack
05/06/2020-15:08:00.190447 71.6.167.142 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 71
2020-05-07 03:36:34
attack
Unauthorized connection attempt detected from IP address 71.6.167.142 to port 8008
2020-04-26 00:18:26
attackspambots
scans once in preceeding hours on the ports (in chronological order) 5672 resulting in total of 13 scans from 71.6.128.0/17 block.
2020-04-24 21:25:23
attackspam
Unauthorized connection attempt detected from IP address 71.6.167.142 to port 4444
2020-04-17 15:37:35
attackspambots
Port 3001 scan denied
2020-04-17 07:09:10
attackspam
Port scan: Attack repeated for 24 hours
2020-04-11 06:31:03
attackbotsspam
[portscan] tcp/143 [IMAP]
*(RWIN=31689)(03311119)
2020-03-31 16:43:55
attack
Automatic report - Banned IP Access
2020-03-29 03:24:36
attackspambots
Unauthorized connection attempt detected from IP address 71.6.167.142 to port 84
2020-03-28 20:14:38
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 71.6.167.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15478
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;71.6.167.142.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019033000 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sat Mar 30 16:39:24 +08 2019
;; MSG SIZE  rcvd: 116

Host info
142.167.6.71.in-addr.arpa domain name pointer census9.shodan.io.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
142.167.6.71.in-addr.arpa	name = census9.shodan.io.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
222.186.15.62 attack
Aug 12 23:24:42 theomazars sshd[10459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62  user=root
Aug 12 23:24:44 theomazars sshd[10459]: Failed password for root from 222.186.15.62 port 13987 ssh2
2020-08-13 05:32:30
49.233.147.108 attack
Aug 12 22:56:24 piServer sshd[7953]: Failed password for root from 49.233.147.108 port 56268 ssh2
Aug 12 23:00:19 piServer sshd[8499]: Failed password for root from 49.233.147.108 port 42094 ssh2
Aug 12 23:04:15 piServer sshd[9071]: Failed password for root from 49.233.147.108 port 56150 ssh2
...
2020-08-13 05:07:05
13.65.240.44 attackbots
port
2020-08-13 05:44:02
104.223.197.142 attackspam
Fail2Ban
2020-08-13 05:20:53
43.225.194.75 attack
Aug 12 22:58:21 prox sshd[25606]: Failed password for root from 43.225.194.75 port 35164 ssh2
2020-08-13 05:09:06
119.197.77.72 attackspambots
Aug 13 07:03:52 localhost sshd[1518474]: Invalid user pi from 119.197.77.72 port 42218
...
2020-08-13 05:30:08
124.156.114.53 attack
Aug 13 04:00:13 webhost01 sshd[25634]: Failed password for root from 124.156.114.53 port 46204 ssh2
...
2020-08-13 05:38:43
185.176.27.26 attackspambots
[MK-VM3] Blocked by UFW
2020-08-13 05:05:59
62.28.253.197 attackbots
Aug 12 22:29:28 rocket sshd[15285]: Failed password for root from 62.28.253.197 port 46615 ssh2
Aug 12 22:33:10 rocket sshd[15955]: Failed password for root from 62.28.253.197 port 18559 ssh2
...
2020-08-13 05:33:27
94.102.51.202 attackspam
Brute Force attack - banned by Fail2Ban
2020-08-13 05:16:41
41.75.92.98 attack
SMB Server BruteForce Attack
2020-08-13 05:37:57
201.234.178.151 attackbotsspam
Unauthorized connection attempt from IP address 201.234.178.151 on Port 445(SMB)
2020-08-13 05:40:21
106.12.45.110 attackspam
malicious Brute-Force reported by https://www.patrick-binder.de
...
2020-08-13 05:41:03
222.186.173.226 attackbotsspam
Aug 12 21:33:05 scw-6657dc sshd[1801]: Failed password for root from 222.186.173.226 port 37165 ssh2
Aug 12 21:33:05 scw-6657dc sshd[1801]: Failed password for root from 222.186.173.226 port 37165 ssh2
Aug 12 21:33:09 scw-6657dc sshd[1801]: Failed password for root from 222.186.173.226 port 37165 ssh2
...
2020-08-13 05:37:26
161.35.69.152 attackspam
161.35.69.152 - - [12/Aug/2020:22:03:50 +0100] "POST /wp-login.php HTTP/1.1" 200 1967 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
161.35.69.152 - - [12/Aug/2020:22:03:54 +0100] "POST /wp-login.php HTTP/1.1" 200 1996 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
161.35.69.152 - - [12/Aug/2020:22:03:55 +0100] "POST /wp-login.php HTTP/1.1" 200 1947 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-13 05:09:32

Recently Reported IPs

202.155.149.162 23.229.29.237 213.32.69.98 177.67.48.198
121.49.99.9 99.149.251.77 186.116.196.212 180.64.71.114
109.255.228.154 107.170.202.91 174.22.165.106 114.35.191.170
64.76.49.68 152.249.226.38 106.13.89.192 162.243.165.39
83.208.68.198 76.25.119.25 181.39.1.37 200.206.92.194