City: unknown
Region: unknown
Country: United States of America
Internet Service Provider: QuadraNet Enterprises LLC
Hostname: unknown
Organization: unknown
Usage Type: Data Center/Web Hosting/Transit
| Type | Details | Datetime |
|---|---|---|
| attack | $f2bV_matches |
2020-05-16 18:36:57 |
| IP | Type | Details | Datetime |
|---|---|---|---|
| 104.129.29.92 | attack | Unauthorized IMAP connection attempt |
2020-08-08 15:59:58 |
| 104.129.25.27 | attackbotsspam | Brute forcing email accounts |
2020-07-27 00:50:00 |
| 104.129.2.174 | attack | Jun 24 03:39:10 mail postfix/postscreen[10005]: DNSBL rank 4 for [104.129.2.174]:37414 ... |
2020-07-14 13:51:10 |
| 104.129.2.174 | attack | 3 failed Login Attempts - (Email Service) |
2020-06-21 21:23:32 |
| 104.129.2.67 | attack | Feb 25 19:59:26 WHD8 postfix/smtpd\[27531\]: warning: unknown\[104.129.2.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Feb 25 19:59:33 WHD8 postfix/smtpd\[27538\]: warning: unknown\[104.129.2.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Feb 25 19:59:49 WHD8 postfix/smtpd\[27375\]: warning: unknown\[104.129.2.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-05-06 04:44:17 |
| 104.129.2.168 | attackbotsspam | Brute forcing email accounts |
2020-03-03 09:12:47 |
| 104.129.204.80 | attackproxy | appears to ipv6 to ipv4 redirect ssl with dns cache poisoning |
2020-02-11 02:35:32 |
| 104.129.204.79 | attackbots | 20/1/11@23:57:20: FAIL: Alarm-Network address from=104.129.204.79 ... |
2020-01-12 14:04:23 |
| 104.129.29.26 | attackspambots | fire |
2019-11-17 02:35:58 |
| 104.129.200.69 | attack | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-11 23:50:59,525 INFO [amun_request_handler] PortScan Detected on Port: 445 (104.129.200.69) |
2019-07-12 16:09:05 |
| 104.129.202.132 | attack | NAME : ZSCALER-QLA1 CIDR : 104.129.198.0/24 DDoS attack USA - California - block certain countries :) IP: 104.129.202.132 Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN - data recovery https://help-dysk.pl |
2019-07-01 05:47:39 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.129.2.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32265
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.129.2.80. IN A
;; AUTHORITY SECTION:
. 421 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020051600 1800 900 604800 86400
;; Query time: 95 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 16 18:36:52 CST 2020
;; MSG SIZE rcvd: 116
80.2.129.104.in-addr.arpa domain name pointer 104.129.2.80.static.quadranet.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
80.2.129.104.in-addr.arpa name = 104.129.2.80.static.quadranet.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 222.186.30.12 | attack | Feb 3 09:06:28 OPSO sshd\[27335\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.12 user=root Feb 3 09:06:30 OPSO sshd\[27335\]: Failed password for root from 222.186.30.12 port 11599 ssh2 Feb 3 09:06:32 OPSO sshd\[27335\]: Failed password for root from 222.186.30.12 port 11599 ssh2 Feb 3 09:06:35 OPSO sshd\[27335\]: Failed password for root from 222.186.30.12 port 11599 ssh2 Feb 3 09:12:45 OPSO sshd\[27775\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.12 user=root |
2020-02-03 16:15:08 |
| 46.38.144.17 | attack | 2020-02-03 09:25:31 dovecot_login authenticator failed for \(User\) \[46.38.144.17\]: 535 Incorrect authentication data \(set_id=exams@no-server.de\) 2020-02-03 09:25:37 dovecot_login authenticator failed for \(User\) \[46.38.144.17\]: 535 Incorrect authentication data \(set_id=exams@no-server.de\) 2020-02-03 09:25:52 dovecot_login authenticator failed for \(User\) \[46.38.144.17\]: 535 Incorrect authentication data \(set_id=marta@no-server.de\) 2020-02-03 09:26:06 dovecot_login authenticator failed for \(User\) \[46.38.144.17\]: 535 Incorrect authentication data \(set_id=marta@no-server.de\) 2020-02-03 09:26:07 dovecot_login authenticator failed for \(User\) \[46.38.144.17\]: 535 Incorrect authentication data \(set_id=marta@no-server.de\) ... |
2020-02-03 16:26:21 |
| 182.61.177.109 | attackbotsspam | Feb 3 08:16:48 server sshd\[13103\]: Invalid user desiderio from 182.61.177.109 Feb 3 08:16:48 server sshd\[13103\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.177.109 Feb 3 08:16:50 server sshd\[13103\]: Failed password for invalid user desiderio from 182.61.177.109 port 42354 ssh2 Feb 3 08:36:07 server sshd\[18454\]: Invalid user teste from 182.61.177.109 Feb 3 08:36:07 server sshd\[18454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.177.109 ... |
2020-02-03 16:04:12 |
| 58.20.129.76 | attackspam | Automatic report - Banned IP Access |
2020-02-03 16:34:04 |
| 193.112.113.196 | attack | POST /App3b30c98a.php HTTP/1.1 404 10079 Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) |
2020-02-03 16:06:49 |
| 78.29.32.173 | attack | Unauthorized connection attempt detected from IP address 78.29.32.173 to port 2220 [J] |
2020-02-03 16:06:05 |
| 91.208.184.72 | attackspambots | unauthorized connection attempt |
2020-02-03 16:04:56 |
| 123.207.235.247 | attackbotsspam | Feb 3 06:47:56 ns382633 sshd\[12092\]: Invalid user rivas from 123.207.235.247 port 55204 Feb 3 06:47:56 ns382633 sshd\[12092\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.235.247 Feb 3 06:47:58 ns382633 sshd\[12092\]: Failed password for invalid user rivas from 123.207.235.247 port 55204 ssh2 Feb 3 07:23:07 ns382633 sshd\[18075\]: Invalid user test from 123.207.235.247 port 42610 Feb 3 07:23:07 ns382633 sshd\[18075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.235.247 |
2020-02-03 16:10:14 |
| 184.105.247.199 | attackbotsspam | firewall-block, port(s): 5351/udp |
2020-02-03 16:20:35 |
| 198.50.197.223 | attack | Feb 3 07:51:01 v22018076622670303 sshd\[30193\]: Invalid user riot from 198.50.197.223 port 48664 Feb 3 07:51:01 v22018076622670303 sshd\[30193\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.50.197.223 Feb 3 07:51:04 v22018076622670303 sshd\[30193\]: Failed password for invalid user riot from 198.50.197.223 port 48664 ssh2 ... |
2020-02-03 16:37:57 |
| 193.112.12.35 | attackspam | POST /wuwu11.php HTTP/1.1 404 10068 Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0) |
2020-02-03 16:03:49 |
| 129.146.160.176 | attackbots | 2020-02-03T05:51:30.985878homeassistant sshd[7238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.160.176 user=root 2020-02-03T05:51:33.019311homeassistant sshd[7238]: Failed password for root from 129.146.160.176 port 37804 ssh2 ... |
2020-02-03 16:11:27 |
| 222.186.175.148 | attackbotsspam | Feb 3 09:19:06 MK-Soft-VM6 sshd[23550]: Failed password for root from 222.186.175.148 port 53216 ssh2 Feb 3 09:19:10 MK-Soft-VM6 sshd[23550]: Failed password for root from 222.186.175.148 port 53216 ssh2 ... |
2020-02-03 16:23:35 |
| 113.194.135.250 | attackbots | Feb 3 05:50:55 haigwepa sshd[12769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.194.135.250 Feb 3 05:50:57 haigwepa sshd[12769]: Failed password for invalid user admin from 113.194.135.250 port 50944 ssh2 ... |
2020-02-03 16:22:07 |
| 59.27.124.26 | attackspam | Feb 3 09:25:45 dedicated sshd[11000]: Invalid user elle from 59.27.124.26 port 47084 |
2020-02-03 16:29:39 |