City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.99.82.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45610
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;129.99.82.112. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025121703 1800 900 604800 86400
;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 18 10:34:05 CST 2025
;; MSG SIZE rcvd: 106
Host 112.82.99.129.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 112.82.99.129.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 51.81.47.59 | attackspambots | [2020-05-30 x@x [2020-05-30 x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=51.81.47.59 |
2020-05-31 13:36:03 |
| 178.62.224.96 | attackbotsspam | $f2bV_matches |
2020-05-31 13:56:35 |
| 49.88.112.112 | attackspambots | May 31 03:55:16 *** sshd[13539]: User root from 49.88.112.112 not allowed because not listed in AllowUsers |
2020-05-31 13:38:39 |
| 92.220.10.100 | attackspambots | 20 attempts against mh-misbehave-ban on pole |
2020-05-31 13:31:12 |
| 180.250.69.213 | attack | Invalid user gitosis from 180.250.69.213 port 58828 |
2020-05-31 13:56:15 |
| 175.139.1.34 | attackbots | SSH bruteforce |
2020-05-31 14:12:53 |
| 222.186.30.167 | attack | May 31 05:50:17 ip-172-31-61-156 sshd[679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.167 user=root May 31 05:50:19 ip-172-31-61-156 sshd[679]: Failed password for root from 222.186.30.167 port 50251 ssh2 ... |
2020-05-31 13:51:19 |
| 91.231.113.113 | attackbotsspam | 2020-05-31T05:23:50.565191shield sshd\[27924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.231.113.113 user=root 2020-05-31T05:23:52.437260shield sshd\[27924\]: Failed password for root from 91.231.113.113 port 5184 ssh2 2020-05-31T05:27:31.401677shield sshd\[28368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.231.113.113 user=root 2020-05-31T05:27:33.278888shield sshd\[28368\]: Failed password for root from 91.231.113.113 port 55260 ssh2 2020-05-31T05:31:13.620054shield sshd\[28628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.231.113.113 user=sync |
2020-05-31 13:43:17 |
| 64.227.67.106 | attackspambots | 2020-05-31T05:44:29.597659shield sshd\[29981\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.67.106 user=root 2020-05-31T05:44:31.232259shield sshd\[29981\]: Failed password for root from 64.227.67.106 port 45426 ssh2 2020-05-31T05:47:51.372349shield sshd\[30673\]: Invalid user oracle from 64.227.67.106 port 49098 2020-05-31T05:47:51.376018shield sshd\[30673\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.67.106 2020-05-31T05:47:53.403709shield sshd\[30673\]: Failed password for invalid user oracle from 64.227.67.106 port 49098 ssh2 |
2020-05-31 13:56:57 |
| 90.189.117.121 | attack | ssh brute force |
2020-05-31 14:03:39 |
| 213.238.182.156 | attackspambots | Port probing on unauthorized port 445 |
2020-05-31 13:52:14 |
| 222.190.145.130 | attack | May 31 08:38:45 journals sshd\[94112\]: Invalid user nastasia from 222.190.145.130 May 31 08:38:45 journals sshd\[94112\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.190.145.130 May 31 08:38:47 journals sshd\[94112\]: Failed password for invalid user nastasia from 222.190.145.130 port 58491 ssh2 May 31 08:43:27 journals sshd\[94663\]: Invalid user moby from 222.190.145.130 May 31 08:43:27 journals sshd\[94663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.190.145.130 ... |
2020-05-31 14:01:07 |
| 37.59.125.163 | attackspam | 2020-05-31T03:46:57.925260Z eae10820e21c New connection: 37.59.125.163:34788 (172.17.0.3:2222) [session: eae10820e21c] 2020-05-31T03:54:38.591077Z 48abd4327b3f New connection: 37.59.125.163:60626 (172.17.0.3:2222) [session: 48abd4327b3f] |
2020-05-31 14:04:46 |
| 112.85.42.174 | attackspambots | May 31 07:18:30 abendstille sshd\[14250\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174 user=root May 31 07:18:30 abendstille sshd\[14252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174 user=root May 31 07:18:33 abendstille sshd\[14250\]: Failed password for root from 112.85.42.174 port 64709 ssh2 May 31 07:18:33 abendstille sshd\[14252\]: Failed password for root from 112.85.42.174 port 24188 ssh2 May 31 07:18:36 abendstille sshd\[14252\]: Failed password for root from 112.85.42.174 port 24188 ssh2 May 31 07:18:36 abendstille sshd\[14250\]: Failed password for root from 112.85.42.174 port 64709 ssh2 ... |
2020-05-31 13:38:11 |
| 49.232.34.247 | attackspambots | Wordpress malicious attack:[sshd] |
2020-05-31 13:53:49 |