City: Houston
Region: Texas
Country: United States
Internet Service Provider: Verizon
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 97.150.66.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31355
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;97.150.66.129. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025071702 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jul 18 08:59:50 CST 2025
;; MSG SIZE rcvd: 106
b'129.66.150.97.in-addr.arpa domain name pointer 129.sub-97-150-66.myvzw.com.
'
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
129.66.150.97.in-addr.arpa name = 129.sub-97-150-66.myvzw.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 193.29.15.169 | attack | Port scanning [7 denied] |
2020-09-09 14:30:07 |
| 49.235.159.133 | attack | SSH Brute Force |
2020-09-09 14:34:00 |
| 157.245.126.36 | attackspam | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-09-09T05:07:17Z and 2020-09-09T05:14:23Z |
2020-09-09 14:59:08 |
| 122.51.2.33 | attackbotsspam | Sep 9 08:40:54 root sshd[16794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.2.33 ... |
2020-09-09 14:57:31 |
| 122.143.116.198 | attackspambots | RDP brute force attack detected by fail2ban |
2020-09-09 14:49:41 |
| 179.113.169.216 | attackbotsspam | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-09-09T06:14:10Z and 2020-09-09T06:27:20Z |
2020-09-09 14:34:13 |
| 103.119.30.193 | attackspambots | Sep 9 07:13:20 root sshd[25292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.119.30.193 ... |
2020-09-09 14:23:33 |
| 104.224.173.181 | attackbotsspam | Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root |
2020-09-09 14:57:55 |
| 185.50.37.152 | attackbotsspam | Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): |
2020-09-09 14:53:40 |
| 140.143.30.191 | attackspam | 2020-09-08T23:53:08.357291vps1033 sshd[7421]: Failed password for root from 140.143.30.191 port 58866 ssh2 2020-09-08T23:57:56.209930vps1033 sshd[18040]: Invalid user cisco from 140.143.30.191 port 57802 2020-09-08T23:57:56.215130vps1033 sshd[18040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.30.191 2020-09-08T23:57:56.209930vps1033 sshd[18040]: Invalid user cisco from 140.143.30.191 port 57802 2020-09-08T23:57:57.396132vps1033 sshd[18040]: Failed password for invalid user cisco from 140.143.30.191 port 57802 ssh2 ... |
2020-09-09 14:55:04 |
| 222.186.180.17 | attackbotsspam | DATE:2020-09-09 08:27:20,IP:222.186.180.17,MATCHES:10,PORT:ssh |
2020-09-09 14:33:04 |
| 212.58.121.105 | attackspam | 1599584062 - 09/08/2020 18:54:22 Host: 212.58.121.105/212.58.121.105 Port: 445 TCP Blocked |
2020-09-09 14:46:19 |
| 211.80.102.187 | attack | Sep 8 20:44:47 journals sshd\[19809\]: Invalid user rjntyjr from 211.80.102.187 Sep 8 20:44:47 journals sshd\[19809\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.80.102.187 Sep 8 20:44:49 journals sshd\[19809\]: Failed password for invalid user rjntyjr from 211.80.102.187 port 13011 ssh2 Sep 8 20:47:19 journals sshd\[20053\]: Invalid user 2rbS from 211.80.102.187 Sep 8 20:47:19 journals sshd\[20053\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.80.102.187 ... |
2020-09-09 14:31:18 |
| 91.149.139.198 | attackspambots | Sep 9 03:44:21 ns382633 sshd\[11416\]: Invalid user pi from 91.149.139.198 port 51622 Sep 9 03:44:21 ns382633 sshd\[11417\]: Invalid user pi from 91.149.139.198 port 51626 Sep 9 03:44:21 ns382633 sshd\[11416\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.149.139.198 Sep 9 03:44:21 ns382633 sshd\[11417\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.149.139.198 Sep 9 03:44:23 ns382633 sshd\[11416\]: Failed password for invalid user pi from 91.149.139.198 port 51622 ssh2 Sep 9 03:44:23 ns382633 sshd\[11417\]: Failed password for invalid user pi from 91.149.139.198 port 51626 ssh2 |
2020-09-09 14:24:09 |
| 138.197.36.189 | attack | Port scan denied |
2020-09-09 14:21:20 |