Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Osijek

Region: Osijek-Baranja county

Country: Croatia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
93.142.179.65 attackspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-09-03 01:46:06
93.142.179.65 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-09-02 17:14:25
93.142.169.1 attackspambots
93.142.169.1 - - [06/Aug/2020:07:17:39 +0200] "POST /xmlrpc.php HTTP/1.1" 301 162 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
93.142.169.1 - - [06/Aug/2020:07:20:02 +0200] "POST /xmlrpc.php HTTP/1.1" 301 162 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
...
2020-08-06 18:39:41
93.142.175.155 attackspambots
Unauthorized connection attempt from IP address 93.142.175.155 on Port 445(SMB)
2020-04-25 02:42:53
93.142.139.255 attackbots
2019-10-23 18:11:57 1iNJEp-0001Ei-9u SMTP connection from 93-142-139-255.adsl.net.t-com.hr \[93.142.139.255\]:48485 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-10-23 18:12:09 1iNJF2-0001Ev-TN SMTP connection from 93-142-139-255.adsl.net.t-com.hr \[93.142.139.255\]:48584 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-10-23 18:12:19 1iNJFB-0001F1-GY SMTP connection from 93-142-139-255.adsl.net.t-com.hr \[93.142.139.255\]:48640 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-28 03:34:17
93.142.169.23 attackbotsspam
Automatic report - Port Scan Attack
2019-11-10 08:31:06
93.142.122.122 attack
TCP Port Scanning
2019-10-30 01:24:46
93.142.195.27 attack
namecheap spam
2019-08-31 22:05:18
93.142.14.113 attack
Relay access denied
2019-07-25 19:23:05
93.142.114.30 attackspam
2019-07-07 22:07:27
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.142.1.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37010
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;93.142.1.168.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 09:37:11 CST 2025
;; MSG SIZE  rcvd: 105
Host info
168.1.142.93.in-addr.arpa domain name pointer 93-142-1-168.adsl.net.t-com.hr.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
168.1.142.93.in-addr.arpa	name = 93-142-1-168.adsl.net.t-com.hr.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
61.178.19.67 attackbotsspam
Unauthorized connection attempt detected from IP address 61.178.19.67 to port 445 [T]
2020-01-16 00:29:54
42.119.139.190 attackbots
Telnetd brute force attack detected by fail2ban
2020-01-16 01:08:06
119.165.5.206 attack
Unauthorized connection attempt detected from IP address 119.165.5.206 to port 23 [J]
2020-01-16 00:53:01
101.251.70.85 attackspam
Unauthorized connection attempt detected from IP address 101.251.70.85 to port 23 [T]
2020-01-16 01:02:20
87.244.5.18 attackspambots
Unauthorized connection attempt detected from IP address 87.244.5.18 to port 81 [T]
2020-01-16 00:28:50
42.112.110.165 attack
Unauthorized connection attempt detected from IP address 42.112.110.165 to port 445 [T]
2020-01-16 00:35:46
103.90.220.214 attackbotsspam
10026/tcp 10024/tcp 65432/tcp...
[2020-01-07/15]41pkt,21pt.(tcp)
2020-01-16 01:01:57
81.171.75.178 attack
[2020-01-15 11:19:34] NOTICE[2175] chan_sip.c: Registration from '' failed for '81.171.75.178:49224' - Wrong password
[2020-01-15 11:19:34] SECURITY[2212] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-01-15T11:19:34.702-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="3972",SessionID="0x7f5ac48ee978",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/81.171.75.178/49224",Challenge="474b6f5a",ReceivedChallenge="474b6f5a",ReceivedHash="84c9a8734ef6bb11545fd20a98660828"
[2020-01-15 11:20:01] NOTICE[2175] chan_sip.c: Registration from '' failed for '81.171.75.178:51493' - Wrong password
[2020-01-15 11:20:01] SECURITY[2212] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-01-15T11:20:01.158-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="5236",SessionID="0x7f5ac400f638",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/81.171.75.178
...
2020-01-16 00:29:04
114.116.235.87 attackspam
Unauthorized connection attempt detected from IP address 114.116.235.87 to port 8545 [J]
2020-01-16 00:56:47
91.239.206.107 attackspambots
Unauthorized connection attempt detected from IP address 91.239.206.107 to port 3389 [T]
2020-01-16 01:03:03
129.204.108.71 attack
Unauthorized connection attempt detected from IP address 129.204.108.71 to port 23 [T]
2020-01-16 00:49:55
180.95.181.28 attackbotsspam
Unauthorized connection attempt detected from IP address 180.95.181.28 to port 23 [J]
2020-01-16 00:47:32
65.19.174.198 attackspambots
Unauthorized connection attempt detected from IP address 65.19.174.198 to port 10025 [T]
2020-01-16 00:29:38
113.26.84.51 attack
Unauthorized connection attempt detected from IP address 113.26.84.51 to port 23 [J]
2020-01-16 00:58:15
115.69.106.184 attackbotsspam
Unauthorized connection attempt detected from IP address 115.69.106.184 to port 5555 [T]
2020-01-16 00:55:46

Recently Reported IPs

234.57.103.30 236.194.179.1 174.220.235.12 231.215.241.211
88.15.64.51 206.237.174.109 21.72.121.70 45.103.40.152
120.3.169.204 228.63.206.68 32.27.24.169 203.121.82.95
150.183.232.143 246.103.218.59 214.103.231.81 14.242.73.122
244.128.72.108 146.82.201.185 155.93.59.190 217.41.9.116