Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Johannesburg

Region: Gauteng

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '93.152.208.0 - 93.152.208.255'

% Abuse contact for '93.152.208.0 - 93.152.208.255' is 'ripe@evro.net'

inetnum:        93.152.208.0 - 93.152.208.255
netname:        IPv4
country:        BG
admin-c:        STE648-RIPE
tech-c:         STE648-RIPE
status:         ASSIGNED PA
mnt-by:         mnt-bg-eurocrypt-1
created:        2025-07-17T10:47:29Z
last-modified:  2026-04-28T07:21:30Z
source:         RIPE

person:         Support Team EvroNet
address:        Sofia,Bulgaria
phone:          +359 700 300 69
nic-hdl:        STE648-RIPE
mnt-by:         MNT-TelecomAset
created:        2016-03-07T14:12:07Z
last-modified:  2017-10-30T23:09:48Z
source:         RIPE # Filtered

% Information related to '93.152.208.0/24AS211486'

route:          93.152.208.0/24
origin:         AS211486
created:        2026-04-28T07:21:59Z
last-modified:  2026-04-28T07:21:59Z
source:         RIPE
mnt-by:         mnt-bg-eurocrypt-1

% Information related to '93.152.208.0/24AS25211'

route:          93.152.208.0/24
origin:         AS25211
created:        2026-02-27T15:54:37Z
last-modified:  2026-02-27T15:54:37Z
source:         RIPE
mnt-by:         mnt-bg-eurocrypt-1

% This query was served by the RIPE Database Query Service version 1.122 (DEXTER)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.152.208.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50132
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;93.152.208.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026051301 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 14 05:30:11 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 42.208.152.93.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.208.152.93.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.231.112.36 attackspam
Jul 10 22:02:20 meumeu sshd[8651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.112.36 
Jul 10 22:02:21 meumeu sshd[8651]: Failed password for invalid user sinusbot from 111.231.112.36 port 45366 ssh2
Jul 10 22:05:30 meumeu sshd[9324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.112.36 
Jul 10 22:05:32 meumeu sshd[9324]: Failed password for invalid user sophie from 111.231.112.36 port 48692 ssh2
...
2019-07-11 07:27:35
177.128.122.88 attack
Unauthorized connection attempt from IP address 177.128.122.88 on Port 445(SMB)
2019-07-11 07:26:46
218.242.55.86 attackbots
Jul 10 19:47:32 MK-Soft-VM5 sshd\[12565\]: Invalid user xavier from 218.242.55.86 port 33544
Jul 10 19:47:32 MK-Soft-VM5 sshd\[12565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.242.55.86
Jul 10 19:47:34 MK-Soft-VM5 sshd\[12565\]: Failed password for invalid user xavier from 218.242.55.86 port 33544 ssh2
...
2019-07-11 07:50:36
114.69.249.178 attackspambots
Unauthorized connection attempt from IP address 114.69.249.178 on Port 445(SMB)
2019-07-11 07:22:10
91.242.162.41 attackbots
Automatic report - Web App Attack
2019-07-11 07:18:09
37.187.111.218 attack
Jul 10 22:43:46 vps647732 sshd[16987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.111.218
Jul 10 22:43:48 vps647732 sshd[16987]: Failed password for invalid user ec2-user from 37.187.111.218 port 49182 ssh2
...
2019-07-11 07:20:33
201.46.61.101 attackbots
$f2bV_matches
2019-07-11 07:48:59
193.169.252.174 attackbotsspam
Brute force attack stopped by firewall
2019-07-11 07:18:44
85.201.213.223 attack
Jul 11 00:55:30 MainVPS sshd[8752]: Invalid user itadmin from 85.201.213.223 port 48165
Jul 11 00:55:30 MainVPS sshd[8752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.201.213.223
Jul 11 00:55:30 MainVPS sshd[8752]: Invalid user itadmin from 85.201.213.223 port 48165
Jul 11 00:55:32 MainVPS sshd[8752]: Failed password for invalid user itadmin from 85.201.213.223 port 48165 ssh2
Jul 11 00:57:43 MainVPS sshd[8896]: Invalid user nexus from 85.201.213.223 port 54213
...
2019-07-11 07:12:29
177.84.244.96 attack
2019-07-10T21:15:04.319069cavecanem sshd[32164]: Invalid user zookeeper from 177.84.244.96 port 49301
2019-07-10T21:15:04.321453cavecanem sshd[32164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.84.244.96
2019-07-10T21:15:04.319069cavecanem sshd[32164]: Invalid user zookeeper from 177.84.244.96 port 49301
2019-07-10T21:15:05.870560cavecanem sshd[32164]: Failed password for invalid user zookeeper from 177.84.244.96 port 49301 ssh2
2019-07-10T21:17:13.732483cavecanem sshd[32754]: Invalid user helpdesk from 177.84.244.96 port 57914
2019-07-10T21:17:13.734983cavecanem sshd[32754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.84.244.96
2019-07-10T21:17:13.732483cavecanem sshd[32754]: Invalid user helpdesk from 177.84.244.96 port 57914
2019-07-10T21:17:15.324534cavecanem sshd[32754]: Failed password for invalid user helpdesk from 177.84.244.96 port 57914 ssh2
2019-07-10T21:19:31.549865cavecanem ssh
...
2019-07-11 07:50:03
14.167.62.190 attackbotsspam
Unauthorized connection attempt from IP address 14.167.62.190 on Port 445(SMB)
2019-07-11 07:09:54
92.63.194.70 attackspambots
RDP brute forcing (d)
2019-07-11 07:05:03
181.55.188.187 attackspambots
Invalid user ce from 181.55.188.187 port 59578
2019-07-11 07:26:15
167.99.75.174 attackbotsspam
2019-07-10T23:41:58.930779abusebot-6.cloudsearch.cf sshd\[16710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.75.174  user=root
2019-07-11 07:52:37
124.156.103.34 attackspam
Jul 11 01:41:07 srv-4 sshd\[3521\]: Invalid user amal from 124.156.103.34
Jul 11 01:41:07 srv-4 sshd\[3521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.103.34
Jul 11 01:41:09 srv-4 sshd\[3521\]: Failed password for invalid user amal from 124.156.103.34 port 43414 ssh2
...
2019-07-11 07:06:13

Recently Reported IPs

2606:4700:10::6814:9068 2606:4700:10::ac43:2353 2606:4700:10::6814:9769 2606:4700:10::6814:6742
85.217.149.59 43.99.49.236 43.135.75.28 150.109.79.164
47.95.208.211 98.94.39.8 3.83.106.176 2606:4700:10::6814:6392
252.120.242.173 2606:4700:10::6814:5271 188.168.20.224 172.86.117.157
156.235.89.236 2606:4700:10::6814:6303 172.86.114.117 103.152.113.33