City: North Bergen
Region: New Jersey
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
IP | Type | Details | Datetime |
---|---|---|---|
134.209.218.189 | attackbotsspam | ssh intrusion attempt |
2019-10-25 19:44:40 |
134.209.218.148 | attack | scan z |
2019-08-09 16:06:57 |
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
NetRange: 134.209.0.0 - 134.209.255.255
CIDR: 134.209.0.0/16
NetName: DIGITALOCEAN-134-209-0-0
NetHandle: NET-134-209-0-0-1
Parent: NET134 (NET-134-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: DigitalOcean, LLC (DO-13)
RegDate: 2018-10-18
Updated: 2020-04-03
Comment: Routing and Peering Policy can be found at https://www.as14061.net
Comment:
Comment: Please submit abuse reports at https://www.digitalocean.com/company/contact/#abuse
Ref: https://rdap.arin.net/registry/ip/134.209.0.0
OrgName: DigitalOcean, LLC
OrgId: DO-13
Address: 105 Edgeview Drive, Suite 425
City: Broomfield
StateProv: CO
PostalCode: 80021
Country: US
RegDate: 2012-05-14
Updated: 2025-04-11
Ref: https://rdap.arin.net/registry/entity/DO-13
OrgNOCHandle: NOC32014-ARIN
OrgNOCName: Network Operations Center
OrgNOCPhone: +1-646-827-4366
OrgNOCEmail: noc@digitalocean.com
OrgNOCRef: https://rdap.arin.net/registry/entity/NOC32014-ARIN
OrgAbuseHandle: DIGIT19-ARIN
OrgAbuseName: DigitalOcean Abuse
OrgAbusePhone: +1-646-827-4366
OrgAbuseEmail: abuse@digitalocean.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/DIGIT19-ARIN
OrgTechHandle: NOC32014-ARIN
OrgTechName: Network Operations Center
OrgTechPhone: +1-646-827-4366
OrgTechEmail: noc@digitalocean.com
OrgTechRef: https://rdap.arin.net/registry/entity/NOC32014-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.209.218.225
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54852
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.209.218.225. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025100100 1800 900 604800 86400
;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 01 21:30:41 CST 2025
;; MSG SIZE rcvd: 108
Host 225.218.209.134.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 225.218.209.134.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
41.232.183.112 | attackspambots | Port probing on unauthorized port 23 |
2020-03-23 14:35:39 |
221.228.109.146 | attackspambots | Mar 23 07:29:15 lukav-desktop sshd\[32241\]: Invalid user yanath from 221.228.109.146 Mar 23 07:29:15 lukav-desktop sshd\[32241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.228.109.146 Mar 23 07:29:17 lukav-desktop sshd\[32241\]: Failed password for invalid user yanath from 221.228.109.146 port 59568 ssh2 Mar 23 07:39:14 lukav-desktop sshd\[15009\]: Invalid user ambulator from 221.228.109.146 Mar 23 07:39:14 lukav-desktop sshd\[15009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.228.109.146 |
2020-03-23 14:29:24 |
49.232.141.44 | attackbotsspam | Attempted connection to port 22. |
2020-03-23 14:28:15 |
14.29.250.133 | attackbots | Mar 23 05:37:17 IngegnereFirenze sshd[26786]: Failed password for invalid user so from 14.29.250.133 port 56907 ssh2 ... |
2020-03-23 14:21:19 |
115.236.35.107 | attackspam | (sshd) Failed SSH login from 115.236.35.107 (CN/China/-): 5 in the last 3600 secs |
2020-03-23 13:59:42 |
37.54.254.107 | attackbotsspam | 23/tcp 23/tcp 23/tcp [2020-01-24/03-23]3pkt |
2020-03-23 14:30:42 |
67.87.34.28 | attackspam | Honeypot attack, port: 4567, PTR: ool-4357221c.dyn.optonline.net. |
2020-03-23 14:27:19 |
96.80.251.85 | attackbotsspam | Attempted connection to port 23. |
2020-03-23 14:26:29 |
129.211.146.50 | attack | Invalid user chandler from 129.211.146.50 port 33998 |
2020-03-23 14:19:41 |
183.82.163.41 | attackspambots | Attempted connection to port 26. |
2020-03-23 14:36:01 |
138.68.93.14 | attackbots | Mar 23 05:29:37 XXXXXX sshd[18100]: Invalid user shu from 138.68.93.14 port 49770 |
2020-03-23 14:11:11 |
180.76.176.126 | attackbots | Mar 23 02:16:01 plusreed sshd[27603]: Invalid user kv from 180.76.176.126 ... |
2020-03-23 14:34:17 |
103.86.134.194 | attackspambots | $f2bV_matches |
2020-03-23 14:18:22 |
82.200.168.94 | attack | 445/tcp 445/tcp 445/tcp [2020-02-04/03-23]3pkt |
2020-03-23 14:06:54 |
128.199.103.239 | attackspambots | Mar 23 08:30:40 server sshd\[12547\]: Invalid user drive from 128.199.103.239 Mar 23 08:30:40 server sshd\[12547\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.103.239 Mar 23 08:30:42 server sshd\[12547\]: Failed password for invalid user drive from 128.199.103.239 port 49834 ssh2 Mar 23 08:37:23 server sshd\[14006\]: Invalid user iria from 128.199.103.239 Mar 23 08:37:23 server sshd\[14006\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.103.239 ... |
2020-03-23 14:04:58 |