City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: Akamai Technologies, Inc.
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.101.121.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9608
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.101.121.142. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019072700 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jul 28 03:11:40 CST 2019
;; MSG SIZE rcvd: 119
142.121.101.104.in-addr.arpa domain name pointer a104-101-121-142.deploy.static.akamaitechnologies.com.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
142.121.101.104.in-addr.arpa name = a104-101-121-142.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
88.218.16.14 | attackbots | TCP Port Scanning |
2020-07-23 05:17:28 |
182.61.185.92 | attackspambots | Invalid user alumno from 182.61.185.92 port 33956 |
2020-07-23 05:25:21 |
54.153.82.24 | attackbotsspam | Brute forcing email accounts |
2020-07-23 05:04:16 |
188.64.180.249 | attackspam | Attempted connection to port 445. |
2020-07-23 05:05:12 |
183.66.103.237 | attackbots | Attempted connection to port 34737. |
2020-07-23 05:06:50 |
190.230.233.184 | attackspam | Attempted connection to port 445. |
2020-07-23 05:03:19 |
144.217.45.47 | attack | 2020-07-04T08:46:07.288Z CLOSE host=144.217.45.47 port=35418 fd=4 time=20.018 bytes=21 ... |
2020-07-23 05:37:52 |
220.136.68.117 | attackbots | Unauthorized connection attempt from IP address 220.136.68.117 on Port 445(SMB) |
2020-07-23 05:20:14 |
118.70.185.13 | attack | 445/tcp 445/tcp [2020-07-22]2pkt |
2020-07-23 05:08:47 |
40.92.9.10 | attackbots | Porn spammer AKA no life idiot |
2020-07-23 05:36:07 |
82.34.133.107 | attackbots | 82.34.133.107 brigid@buccivision.com |
2020-07-23 05:18:34 |
188.219.251.4 | attack | bruteforce detected |
2020-07-23 05:31:51 |
89.236.112.100 | attackspam | Jul 22 17:33:32 prox sshd[2905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.236.112.100 Jul 22 17:33:35 prox sshd[2905]: Failed password for invalid user admin from 89.236.112.100 port 41134 ssh2 |
2020-07-23 05:13:13 |
186.90.181.230 | attack | Attempted connection to port 445. |
2020-07-23 05:06:33 |
109.191.16.31 | attackspam | Attempted connection to port 445. |
2020-07-23 05:09:01 |