City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.103.71.208
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28157
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.103.71.208. IN A
;; AUTHORITY SECTION:
. 0 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023011400 1800 900 604800 86400
;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 14 14:46:34 CST 2023
;; MSG SIZE rcvd: 107
208.71.103.104.in-addr.arpa domain name pointer a104-103-71-208.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
208.71.103.104.in-addr.arpa name = a104-103-71-208.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
216.49.160.151 | attack | Port Scan: TCP/445 |
2019-09-20 21:11:27 |
196.52.43.85 | attackbotsspam | Port Scan: TCP/5903 |
2019-09-20 21:15:23 |
203.125.3.90 | attack | Port Scan: TCP/445 |
2019-09-20 21:13:35 |
186.209.31.25 | attackspambots | Port Scan: UDP/137 |
2019-09-20 20:41:21 |
177.206.41.211 | attackbots | 23/tcp 23/tcp [2019-09-19/20]2pkt |
2019-09-20 21:19:42 |
67.229.129.194 | attack | Port Scan: TCP/445 |
2019-09-20 21:00:25 |
201.229.93.157 | attackspambots | Port Scan: TCP/23 |
2019-09-20 20:38:29 |
119.99.240.248 | attackspambots | Port Scan: TCP/23 |
2019-09-20 21:24:26 |
171.14.228.29 | attackbots | Port Scan: TCP/22 |
2019-09-20 21:21:02 |
182.114.34.231 | attackbots | Port Scan: TCP/5555 |
2019-09-20 20:43:17 |
201.217.249.212 | attackspambots | Port Scan: TCP/8080 |
2019-09-20 21:14:40 |
96.20.234.161 | attackbotsspam | Port Scan: UDP/137 |
2019-09-20 20:54:37 |
18.184.23.230 | attackspam | Port Scan: TCP/445 |
2019-09-20 21:08:48 |
156.206.87.56 | attackbotsspam | Port Scan: TCP/23 |
2019-09-20 20:46:37 |
115.171.20.3 | attack | Port Scan: TCP/22 |
2019-09-20 20:50:17 |