Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: France

Internet Service Provider: OVH SAS

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
Aug 28 17:31:37 legacy sshd[6983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.242.122
Aug 28 17:31:39 legacy sshd[6983]: Failed password for invalid user starcraft from 37.59.242.122 port 50378 ssh2
Aug 28 17:35:33 legacy sshd[7101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.242.122
...
2019-08-29 03:22:43
attackbots
Aug 27 05:48:01 localhost sshd\[31429\]: Invalid user temp from 37.59.242.122 port 46280
Aug 27 05:48:01 localhost sshd\[31429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.242.122
Aug 27 05:48:03 localhost sshd\[31429\]: Failed password for invalid user temp from 37.59.242.122 port 46280 ssh2
...
2019-08-27 16:07:59
attackbotsspam
Aug 25 14:11:05 www sshd\[135798\]: Invalid user academic from 37.59.242.122
Aug 25 14:11:05 www sshd\[135798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.242.122
Aug 25 14:11:07 www sshd\[135798\]: Failed password for invalid user academic from 37.59.242.122 port 38664 ssh2
...
2019-08-25 19:17:17
attack
Aug 23 01:39:26 * sshd[4803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.242.122
Aug 23 01:39:29 * sshd[4803]: Failed password for invalid user abc123 from 37.59.242.122 port 44850 ssh2
2019-08-23 07:55:19
attackspambots
Aug 21 08:01:26 www2 sshd\[58847\]: Invalid user nodeclient from 37.59.242.122Aug 21 08:01:29 www2 sshd\[58847\]: Failed password for invalid user nodeclient from 37.59.242.122 port 38116 ssh2Aug 21 08:05:46 www2 sshd\[59331\]: Invalid user icinga from 37.59.242.122
...
2019-08-21 13:17:39
Comments on same subnet:
IP Type Details Datetime
37.59.242.121 attack
CloudCIX Reconnaissance Scan Detected, PTR: 37.59.242.121.infinity-hosting.com.
2019-08-03 07:23:16
37.59.242.121 attackspambots
Scanning random ports - tries to find possible vulnerable services
2019-07-09 04:26:03
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 37.59.242.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46560
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;37.59.242.122.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082002 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Aug 21 13:17:30 CST 2019
;; MSG SIZE  rcvd: 117
Host info
122.242.59.37.in-addr.arpa domain name pointer 37.59.242.122.infinity-hosting.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
122.242.59.37.in-addr.arpa	name = 37.59.242.122.infinity-hosting.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
202.138.251.3 attackbots
email spam
2019-12-19 18:18:32
89.36.212.141 attack
email spam
2019-12-19 18:36:20
122.102.29.44 attackspam
email spam
2019-12-19 18:03:18
91.218.163.74 attackbots
email spam
2019-12-19 18:07:16
149.56.45.87 attack
Dec 19 11:17:35 root sshd[5337]: Failed password for backup from 149.56.45.87 port 53178 ssh2
Dec 19 11:22:26 root sshd[5406]: Failed password for root from 149.56.45.87 port 59260 ssh2
...
2019-12-19 18:29:48
178.47.141.196 attackspambots
email spam
2019-12-19 18:25:57
78.85.22.141 attack
email spam
2019-12-19 18:10:20
82.117.244.85 attackspam
email spam
2019-12-19 18:09:44
103.10.58.21 attack
email spam
2019-12-19 18:33:54
103.16.132.195 attackspam
email spam
2019-12-19 18:33:40
41.215.37.230 attackbots
email spam
2019-12-19 18:14:42
109.224.57.14 attackspam
email spam
2019-12-19 18:32:16
36.37.180.59 attack
proto=tcp  .  spt=57057  .  dpt=25  .     (Listed on    dnsbl-sorbs plus abuseat-org and barracuda)     (474)
2019-12-19 18:15:11
1.53.137.92 attackspam
email spam
2019-12-19 18:16:18
92.87.123.68 attackbotsspam
email spam
2019-12-19 18:06:23

Recently Reported IPs

143.132.99.102 157.85.72.221 202.145.45.250 201.15.102.237
146.12.153.124 220.36.122.187 55.4.207.212 234.129.192.34
227.177.52.135 239.135.22.99 251.49.210.35 18.251.154.89
11.26.235.105 41.216.199.176 116.111.234.143 182.61.17.93
122.161.192.206 103.31.54.72 219.92.208.137 143.109.28.102