City: unknown
Region: unknown
Country: United States
Internet Service Provider: Verizon
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 98.106.42.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9276
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;98.106.42.29. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025062701 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 06:44:01 CST 2025
;; MSG SIZE rcvd: 105
29.42.106.98.in-addr.arpa domain name pointer 29.sub-98-106-42.myvzw.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
29.42.106.98.in-addr.arpa name = 29.sub-98-106-42.myvzw.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
51.255.39.143 | attack | Oct 16 03:40:24 friendsofhawaii sshd\[17612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.ip-51-255-39.eu user=root Oct 16 03:40:26 friendsofhawaii sshd\[17612\]: Failed password for root from 51.255.39.143 port 58508 ssh2 Oct 16 03:43:44 friendsofhawaii sshd\[17880\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.ip-51-255-39.eu user=root Oct 16 03:43:46 friendsofhawaii sshd\[17880\]: Failed password for root from 51.255.39.143 port 40362 ssh2 Oct 16 03:47:14 friendsofhawaii sshd\[18167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.ip-51-255-39.eu user=root |
2019-10-16 22:05:17 |
34.70.186.153 | attack | Oct 16 15:23:05 server sshd\[1352\]: Failed password for invalid user ts2 from 34.70.186.153 port 47500 ssh2 Oct 16 16:23:59 server sshd\[19857\]: Invalid user CHasPfTzewQ from 34.70.186.153 Oct 16 16:23:59 server sshd\[19857\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.186.70.34.bc.googleusercontent.com Oct 16 16:24:01 server sshd\[19857\]: Failed password for invalid user CHasPfTzewQ from 34.70.186.153 port 34580 ssh2 Oct 16 16:31:11 server sshd\[22324\]: Invalid user jena from 34.70.186.153 ... |
2019-10-16 22:22:05 |
90.180.229.41 | attack | 19/10/16@07:21:37: FAIL: IoT-Telnet address from=90.180.229.41 ... |
2019-10-16 22:14:32 |
95.178.159.213 | attack | Telnetd brute force attack detected by fail2ban |
2019-10-16 22:44:10 |
62.99.132.166 | attackspambots | 2019-10-16T12:48:19.509409homeassistant sshd[23897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.99.132.166 user=root 2019-10-16T12:48:21.176463homeassistant sshd[23897]: Failed password for root from 62.99.132.166 port 55746 ssh2 ... |
2019-10-16 22:42:20 |
182.73.47.154 | attackspam | Automatic report - SSH Brute-Force Attack |
2019-10-16 22:27:53 |
46.199.233.130 | attack | B: /wp-login.php attack |
2019-10-16 22:29:43 |
62.219.124.88 | attackspam | [portscan] tcp/23 [TELNET] *(RWIN=29891)(10161238) |
2019-10-16 22:37:51 |
121.142.111.222 | attackbots | $f2bV_matches |
2019-10-16 22:15:49 |
80.211.159.118 | attackspambots | Oct 16 16:00:39 [host] sshd[30815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.159.118 user=root Oct 16 16:00:40 [host] sshd[30815]: Failed password for root from 80.211.159.118 port 57236 ssh2 Oct 16 16:05:14 [host] sshd[30871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.159.118 user=root |
2019-10-16 22:49:03 |
128.199.128.215 | attackbotsspam | Oct 16 14:36:31 Ubuntu-1404-trusty-64-minimal sshd\[3526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.128.215 user=root Oct 16 14:36:33 Ubuntu-1404-trusty-64-minimal sshd\[3526\]: Failed password for root from 128.199.128.215 port 40344 ssh2 Oct 16 14:55:09 Ubuntu-1404-trusty-64-minimal sshd\[28572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.128.215 user=root Oct 16 14:55:11 Ubuntu-1404-trusty-64-minimal sshd\[28572\]: Failed password for root from 128.199.128.215 port 37978 ssh2 Oct 16 15:00:09 Ubuntu-1404-trusty-64-minimal sshd\[2853\]: Invalid user outln from 128.199.128.215 |
2019-10-16 22:10:46 |
118.71.253.20 | attackbots | Oct 16 05:20:59 mail postfix/postscreen[125324]: PREGREET 33 after 0.52 from [118.71.253.20]:42602: EHLO ip-address-pool-xxx.fpt.vn ... |
2019-10-16 22:41:50 |
103.28.161.26 | attack | 10/16/2019-14:18:27.663287 103.28.161.26 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2019-10-16 22:36:54 |
139.155.93.180 | attackbotsspam | Oct 16 14:27:12 ArkNodeAT sshd\[26930\]: Invalid user teste from 139.155.93.180 Oct 16 14:27:12 ArkNodeAT sshd\[26930\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.93.180 Oct 16 14:27:14 ArkNodeAT sshd\[26930\]: Failed password for invalid user teste from 139.155.93.180 port 40538 ssh2 |
2019-10-16 22:09:26 |
104.236.63.99 | attackbotsspam | Oct 16 15:44:11 MK-Soft-Root2 sshd[7901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.63.99 Oct 16 15:44:13 MK-Soft-Root2 sshd[7901]: Failed password for invalid user aknine from 104.236.63.99 port 34602 ssh2 ... |
2019-10-16 22:35:29 |