Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: Oracle Public Cloud

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackspambots
Nov  1 09:53:04 yesfletchmain sshd\[12363\]: User root from 129.213.98.219 not allowed because not listed in AllowUsers
Nov  1 09:53:04 yesfletchmain sshd\[12363\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.98.219  user=root
Nov  1 09:53:07 yesfletchmain sshd\[12363\]: Failed password for invalid user root from 129.213.98.219 port 38348 ssh2
Nov  1 09:57:20 yesfletchmain sshd\[12451\]: User root from 129.213.98.219 not allowed because not listed in AllowUsers
Nov  1 09:57:20 yesfletchmain sshd\[12451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.98.219  user=root
...
2019-12-24 00:31:40
attack
Lines containing failures of 129.213.98.219
Nov  1 15:21:18 shared11 sshd[25259]: Invalid user ts3user from 129.213.98.219 port 35872
Nov  1 15:21:18 shared11 sshd[25259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.98.219
Nov  1 15:21:20 shared11 sshd[25259]: Failed password for invalid user ts3user from 129.213.98.219 port 35872 ssh2
Nov  1 15:21:20 shared11 sshd[25259]: Received disconnect from 129.213.98.219 port 35872:11: Bye Bye [preauth]
Nov  1 15:21:20 shared11 sshd[25259]: Disconnected from invalid user ts3user 129.213.98.219 port 35872 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=129.213.98.219
2019-11-03 20:09:56
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.213.98.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37007
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;129.213.98.219.			IN	A

;; AUTHORITY SECTION:
.			367	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110300 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 03 20:09:53 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 219.98.213.129.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 219.98.213.129.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.206.172.210 attack
Sent mail to target address hacked/leaked from abandonia in 2016
2019-12-30 14:09:15
110.136.172.110 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-30 14:21:49
160.153.147.151 attack
Automatic report - XMLRPC Attack
2019-12-30 14:13:15
67.207.80.79 attackspambots
Dec 30 05:54:53 grey postfix/smtpd\[15789\]: NOQUEUE: reject: RCPT from unknown\[67.207.80.79\]: 554 5.7.1 Service unavailable\; Client host \[67.207.80.79\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[67.207.80.79\]\; from=\ to=\ proto=ESMTP helo=\
...
2019-12-30 14:28:59
68.183.30.231 attack
Dec 30 05:54:54 grey postfix/smtpd\[15857\]: NOQUEUE: reject: RCPT from unknown\[68.183.30.231\]: 554 5.7.1 Service unavailable\; Client host \[68.183.30.231\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[68.183.30.231\]\; from=\ to=\ proto=ESMTP helo=\
...
2019-12-30 14:28:08
112.85.42.87 attackbots
2019-12-30T05:58:03.906420shield sshd\[14182\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.87  user=root
2019-12-30T05:58:06.028480shield sshd\[14182\]: Failed password for root from 112.85.42.87 port 54894 ssh2
2019-12-30T05:58:09.131474shield sshd\[14182\]: Failed password for root from 112.85.42.87 port 54894 ssh2
2019-12-30T05:58:12.652846shield sshd\[14182\]: Failed password for root from 112.85.42.87 port 54894 ssh2
2019-12-30T06:00:35.095777shield sshd\[14779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.87  user=root
2019-12-30 14:18:20
36.90.40.114 attackspambots
Automatic report - SSH Brute-Force Attack
2019-12-30 14:28:29
198.20.99.130 attackbots
Automatic report - Banned IP Access
2019-12-30 14:00:23
129.213.117.53 attackspam
Dec 30 05:55:09 MK-Soft-Root2 sshd[5966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.117.53 
Dec 30 05:55:11 MK-Soft-Root2 sshd[5966]: Failed password for invalid user liza from 129.213.117.53 port 57241 ssh2
...
2019-12-30 13:58:55
222.186.180.41 attackspam
Dec 30 07:10:51 dedicated sshd[17508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41  user=root
Dec 30 07:10:53 dedicated sshd[17508]: Failed password for root from 222.186.180.41 port 18390 ssh2
2019-12-30 14:14:30
64.225.3.2 attackbots
Dec 30 05:54:55 grey postfix/smtpd\[15789\]: NOQUEUE: reject: RCPT from unknown\[64.225.3.2\]: 554 5.7.1 Service unavailable\; Client host \[64.225.3.2\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[64.225.3.2\]\; from=\ to=\ proto=ESMTP helo=\
...
2019-12-30 14:27:38
222.186.175.182 attackspam
2019-12-30T06:49:00.095110hub.schaetter.us sshd\[20925\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
2019-12-30T06:49:01.890837hub.schaetter.us sshd\[20925\]: Failed password for root from 222.186.175.182 port 64336 ssh2
2019-12-30T06:49:05.314556hub.schaetter.us sshd\[20925\]: Failed password for root from 222.186.175.182 port 64336 ssh2
2019-12-30T06:49:08.483590hub.schaetter.us sshd\[20925\]: Failed password for root from 222.186.175.182 port 64336 ssh2
2019-12-30T06:49:12.064208hub.schaetter.us sshd\[20925\]: Failed password for root from 222.186.175.182 port 64336 ssh2
...
2019-12-30 14:49:42
139.59.247.114 attackspam
$f2bV_matches
2019-12-30 14:20:16
125.94.36.117 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-30 14:15:14
14.183.103.94 attackspam
Automatic report - Port Scan Attack
2019-12-30 13:55:50

Recently Reported IPs

3.91.164.185 102.164.252.153 113.231.219.217 83.116.57.249
51.158.74.228 108.157.144.135 152.102.185.198 189.215.214.66
175.139.107.113 17.137.218.229 171.206.156.49 91.133.16.170
84.130.102.134 202.146.193.185 152.251.225.149 109.225.145.213
49.117.70.131 116.191.87.28 173.253.93.231 1.26.229.97