Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America

Internet Service Provider: Oracle Public Cloud

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackbots
Automatic report BANNED IP
2020-08-18 23:09:15
attackbots
$f2bV_matches
2020-08-11 13:31:21
attack
$f2bV_matches
2020-07-28 13:03:13
attack
Jul 26 05:57:10 ns381471 sshd[19890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.148.12
Jul 26 05:57:12 ns381471 sshd[19890]: Failed password for invalid user danette from 129.213.148.12 port 34820 ssh2
2020-07-26 14:22:24
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.213.148.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1703
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;129.213.148.12.			IN	A

;; AUTHORITY SECTION:
.			532	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020071701 1800 900 604800 86400

;; Query time: 215 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 18 03:21:37 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 12.148.213.129.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.148.213.129.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
141.98.81.107 attack
May 15 14:16:12 *** sshd[23744]: User root from 141.98.81.107 not allowed because not listed in AllowUsers
2020-05-15 22:54:29
178.59.96.141 attack
2020-05-15T12:21:49.606708shield sshd\[26563\]: Invalid user alejo from 178.59.96.141 port 48608
2020-05-15T12:21:49.615810shield sshd\[26563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178-96-141.static.cyta.gr
2020-05-15T12:21:51.963259shield sshd\[26563\]: Failed password for invalid user alejo from 178.59.96.141 port 48608 ssh2
2020-05-15T12:26:01.438704shield sshd\[27653\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178-96-141.static.cyta.gr  user=root
2020-05-15T12:26:03.379837shield sshd\[27653\]: Failed password for root from 178.59.96.141 port 56012 ssh2
2020-05-15 22:55:33
112.85.42.232 attack
2020-05-15T14:13:22.576698abusebot-2.cloudsearch.cf sshd[3217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.232  user=root
2020-05-15T14:13:24.745345abusebot-2.cloudsearch.cf sshd[3217]: Failed password for root from 112.85.42.232 port 30926 ssh2
2020-05-15T14:13:26.674742abusebot-2.cloudsearch.cf sshd[3217]: Failed password for root from 112.85.42.232 port 30926 ssh2
2020-05-15T14:13:22.576698abusebot-2.cloudsearch.cf sshd[3217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.232  user=root
2020-05-15T14:13:24.745345abusebot-2.cloudsearch.cf sshd[3217]: Failed password for root from 112.85.42.232 port 30926 ssh2
2020-05-15T14:13:26.674742abusebot-2.cloudsearch.cf sshd[3217]: Failed password for root from 112.85.42.232 port 30926 ssh2
2020-05-15T14:13:22.576698abusebot-2.cloudsearch.cf sshd[3217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhos
...
2020-05-15 22:23:30
202.137.155.218 attackspambots
"Account brute force using dictionary attack against Exchange Online"
2020-05-15 22:14:48
171.252.170.212 attackbots
20 attempts against mh-ssh on echoip
2020-05-15 22:38:19
181.143.172.106 attack
2020-05-15T07:29:36.357549linuxbox-skyline sshd[23040]: Invalid user cod2server from 181.143.172.106 port 17586
...
2020-05-15 22:26:11
68.199.200.59 attackspambots
Automatic report - Port Scan Attack
2020-05-15 22:26:27
14.161.32.37 attack
trying to access non-authorized port
2020-05-15 22:49:52
168.232.167.58 attackspam
May 15 14:34:29 s1 sshd\[24989\]: Invalid user ubuntu from 168.232.167.58 port 55564
May 15 14:34:29 s1 sshd\[24989\]: Failed password for invalid user ubuntu from 168.232.167.58 port 55564 ssh2
May 15 14:36:11 s1 sshd\[27723\]: Invalid user tester from 168.232.167.58 port 49876
May 15 14:36:11 s1 sshd\[27723\]: Failed password for invalid user tester from 168.232.167.58 port 49876 ssh2
May 15 14:37:47 s1 sshd\[29641\]: Invalid user admins from 168.232.167.58 port 44184
May 15 14:37:47 s1 sshd\[29641\]: Failed password for invalid user admins from 168.232.167.58 port 44184 ssh2
...
2020-05-15 22:55:54
195.154.114.140 attack
/xmlrpc.php
2020-05-15 22:43:47
102.45.149.12 attackbots
SSH bruteforce more then 50 syn to 22 port per 10 seconds.
2020-05-15 22:22:31
222.186.175.183 attackbots
2020-05-15T14:26:59.340664shield sshd\[2117\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183  user=root
2020-05-15T14:27:00.670739shield sshd\[2117\]: Failed password for root from 222.186.175.183 port 57202 ssh2
2020-05-15T14:27:04.529917shield sshd\[2117\]: Failed password for root from 222.186.175.183 port 57202 ssh2
2020-05-15T14:27:07.607201shield sshd\[2117\]: Failed password for root from 222.186.175.183 port 57202 ssh2
2020-05-15T14:27:11.096890shield sshd\[2117\]: Failed password for root from 222.186.175.183 port 57202 ssh2
2020-05-15 22:30:01
51.89.147.74 attackspam
CMS (WordPress or Joomla) login attempt.
2020-05-15 22:31:31
35.200.241.227 attackbotsspam
May 15 15:52:28 eventyay sshd[27238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.200.241.227
May 15 15:52:30 eventyay sshd[27238]: Failed password for invalid user deployer from 35.200.241.227 port 57702 ssh2
May 15 15:57:41 eventyay sshd[27340]: Failed password for root from 35.200.241.227 port 38976 ssh2
...
2020-05-15 22:18:55
212.129.57.201 attackspam
sshd
2020-05-15 22:18:22

Recently Reported IPs

54.240.27.45 103.83.93.132 1.61.150.20 54.240.27.191
185.192.70.209 167.114.43.93 157.49.148.88 89.136.91.43
54.240.27.193 149.28.145.192 38.84.76.23 212.154.58.143
182.52.108.104 54.240.27.33 54.240.27.31 190.40.120.128
46.161.57.123 160.16.80.134 181.189.211.176 104.243.41.140