City: Austin
Region: Texas
Country: United States
Internet Service Provider: AT&T
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.129.134.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21405
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;99.129.134.2. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025032700 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 27 19:17:50 CST 2025
;; MSG SIZE rcvd: 105
2.134.129.99.in-addr.arpa domain name pointer 99-129-134-2.lightspeed.austtx.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
2.134.129.99.in-addr.arpa name = 99-129-134-2.lightspeed.austtx.sbcglobal.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
59.1.116.20 | attack | Jul 13 11:26:47 XXX sshd[62774]: Invalid user honey from 59.1.116.20 port 36122 |
2019-07-13 18:44:36 |
181.52.249.26 | attack | Invalid user admin from 181.52.249.26 port 36921 |
2019-07-13 19:12:03 |
189.112.134.237 | attackspam | Invalid user admin from 189.112.134.237 port 48205 |
2019-07-13 19:04:15 |
173.162.229.10 | attackspam | Invalid user user1 from 173.162.229.10 port 52442 |
2019-07-13 18:16:19 |
46.245.148.195 | attackspam | Invalid user taku from 46.245.148.195 port 49666 |
2019-07-13 18:49:21 |
51.77.231.213 | attackspambots | Invalid user yp from 51.77.231.213 port 42938 |
2019-07-13 18:45:17 |
165.227.124.229 | attackspambots | Tried sshing with brute force. |
2019-07-13 18:17:34 |
54.37.157.82 | attackspambots | Invalid user test1234 from 54.37.157.82 port 51752 |
2019-07-13 18:44:58 |
5.196.72.58 | attackspam | Jul 13 12:01:41 srv03 sshd\[19431\]: Invalid user testuser from 5.196.72.58 port 41286 Jul 13 12:01:41 srv03 sshd\[19431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.72.58 Jul 13 12:01:43 srv03 sshd\[19431\]: Failed password for invalid user testuser from 5.196.72.58 port 41286 ssh2 |
2019-07-13 18:54:00 |
51.68.187.192 | attackbots | Invalid user admin from 51.68.187.192 port 46898 |
2019-07-13 18:45:45 |
50.100.31.49 | attackspambots | Invalid user weldon from 50.100.31.49 port 56256 |
2019-07-13 18:48:04 |
123.207.99.21 | attack | Jul 13 09:25:58 MK-Soft-VM3 sshd\[14247\]: Invalid user sinusbot from 123.207.99.21 port 40080 Jul 13 09:25:58 MK-Soft-VM3 sshd\[14247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.99.21 Jul 13 09:26:00 MK-Soft-VM3 sshd\[14247\]: Failed password for invalid user sinusbot from 123.207.99.21 port 40080 ssh2 ... |
2019-07-13 18:25:01 |
197.97.228.205 | attackspam | Jul 13 12:33:27 rpi sshd[21394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.97.228.205 Jul 13 12:33:29 rpi sshd[21394]: Failed password for invalid user maseko from 197.97.228.205 port 51958 ssh2 |
2019-07-13 19:00:54 |
106.12.91.102 | attackspam | Invalid user noc from 106.12.91.102 port 56046 |
2019-07-13 18:34:35 |
59.19.147.198 | attackspambots | Jul 13 12:43:17 pornomens sshd\[11933\]: Invalid user oracle from 59.19.147.198 port 41584 Jul 13 12:43:17 pornomens sshd\[11933\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.19.147.198 Jul 13 12:43:19 pornomens sshd\[11933\]: Failed password for invalid user oracle from 59.19.147.198 port 41584 ssh2 ... |
2019-07-13 18:44:04 |