City: unknown
Region: unknown
Country: Austria
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.103.91.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51849
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.103.91.74. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021101 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 03:46:02 CST 2025
;; MSG SIZE rcvd: 106
74.91.103.104.in-addr.arpa domain name pointer a104-103-91-74.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
74.91.103.104.in-addr.arpa name = a104-103-91-74.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 200.54.242.46 | attackbots | Jan 31 18:16:31 MK-Soft-VM4 sshd[26270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.54.242.46 Jan 31 18:16:33 MK-Soft-VM4 sshd[26270]: Failed password for invalid user server from 200.54.242.46 port 48475 ssh2 ... |
2020-02-01 02:51:38 |
| 89.46.76.55 | attackspambots | 2020-01-29 19:55:46,279 fail2ban.filter [1582]: INFO [plesk-postfix] Found 89.46.76.55 - 2020-01-29 19:55:46 2020-01-29 19:55:46,282 fail2ban.filter [1582]: INFO [plesk-postfix] Found 89.46.76.55 - 2020-01-29 19:55:46 2020-01-29 20:09:42,301 fail2ban.filter [1582]: INFO [plesk-postfix] Found 89.46.76.55 - 2020-01-29 20:09:42 2020-01-29 20:09:42,302 fail2ban.filter [1582]: INFO [plesk-postfix] Found 89.46.76.55 - 2020-01-29 20:09:42 2020-01-29 20:11:57,617 fail2ban.filter [1582]: INFO [plesk-postfix] Found 89.46.76.55 - 2020-01-29 20:11:57 2020-01-29 20:11:57,618 fail2ban.filter [1582]: INFO [plesk-postfix] Found 89.46.76.55 - 2020-01-29 20:11:57 2020-01-29 20:12:02,494 fail2ban.filter [1582]: INFO [plesk-postfix] Found 89.46.76.55 - 2020-01-29 20:12:02 2020-01-29 20:12:02,495 fail2ban.filter [1582]: INFO [plesk-postfix] Found 89.46.76.55 - 2020-01-29 20:12:02 2020-01-29 20:12:17,764 ........ ------------------------------- |
2020-02-01 03:01:45 |
| 177.91.80.15 | attack | Jan 31 20:51:16 pkdns2 sshd\[21023\]: Invalid user sahima from 177.91.80.15Jan 31 20:51:17 pkdns2 sshd\[21023\]: Failed password for invalid user sahima from 177.91.80.15 port 52488 ssh2Jan 31 20:53:50 pkdns2 sshd\[21095\]: Invalid user champakmala from 177.91.80.15Jan 31 20:53:52 pkdns2 sshd\[21095\]: Failed password for invalid user champakmala from 177.91.80.15 port 42818 ssh2Jan 31 20:56:25 pkdns2 sshd\[21230\]: Invalid user fujiki from 177.91.80.15Jan 31 20:56:28 pkdns2 sshd\[21230\]: Failed password for invalid user fujiki from 177.91.80.15 port 33138 ssh2 ... |
2020-02-01 03:12:35 |
| 222.186.30.187 | attackbots | Jan 31 17:03:29 sip sshd[17893]: Failed password for root from 222.186.30.187 port 15240 ssh2 Jan 31 17:49:28 sip sshd[29643]: Failed password for root from 222.186.30.187 port 14975 ssh2 |
2020-02-01 03:11:46 |
| 13.233.167.69 | attackbots | Unauthorized connection attempt detected from IP address 13.233.167.69 to port 2220 [J] |
2020-02-01 03:02:43 |
| 51.89.35.191 | attack | Unauthorized connection attempt detected from IP address 51.89.35.191 to port 2220 [J] |
2020-02-01 02:47:49 |
| 222.186.30.35 | attackspam | Jan 31 19:00:05 zeus sshd[28717]: Failed password for root from 222.186.30.35 port 50084 ssh2 Jan 31 19:00:09 zeus sshd[28717]: Failed password for root from 222.186.30.35 port 50084 ssh2 Jan 31 19:00:12 zeus sshd[28717]: Failed password for root from 222.186.30.35 port 50084 ssh2 Jan 31 19:02:58 zeus sshd[28735]: Failed password for root from 222.186.30.35 port 59322 ssh2 |
2020-02-01 03:06:45 |
| 49.37.134.89 | attack | Unauthorized connection attempt from IP address 49.37.134.89 on Port 445(SMB) |
2020-02-01 03:23:07 |
| 198.100.146.94 | attackspambots | Time: Fri Jan 31 14:09:05 2020 -0300 IP: 198.100.146.94 (CA/Canada/ns504210.ip-198-100-146.net) Failures: 5 (mod_security) Interval: 3600 seconds Blocked: Permanent Block |
2020-02-01 03:04:01 |
| 121.75.97.74 | attack | Jan 31 18:36:19 hcbbdb sshd\[1389\]: Invalid user shashi from 121.75.97.74 Jan 31 18:36:19 hcbbdb sshd\[1389\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121-75-97-74.dyn.vf.net.nz Jan 31 18:36:22 hcbbdb sshd\[1389\]: Failed password for invalid user shashi from 121.75.97.74 port 53808 ssh2 Jan 31 18:40:33 hcbbdb sshd\[1880\]: Invalid user hui from 121.75.97.74 Jan 31 18:40:33 hcbbdb sshd\[1880\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121-75-97-74.dyn.vf.net.nz |
2020-02-01 02:55:20 |
| 180.183.244.33 | attackbots | Unauthorized connection attempt from IP address 180.183.244.33 on Port 445(SMB) |
2020-02-01 02:41:17 |
| 27.254.81.248 | attackspambots | Time: Fri Jan 31 12:19:10 2020 -0500 IP: 27.254.81.248 (TH/Thailand/cloud-linux01.thaidata.net) Failures: 5 (mod_security) Interval: 3600 seconds Blocked: Permanent Block |
2020-02-01 03:07:36 |
| 222.103.131.237 | attackspam | Unauthorized connection attempt detected from IP address 222.103.131.237 to port 4567 [J] |
2020-02-01 03:08:57 |
| 120.52.120.18 | attack | Unauthorized connection attempt detected from IP address 120.52.120.18 to port 2220 [J] |
2020-02-01 03:01:12 |
| 51.178.51.37 | attack | Jan 31 19:59:48 legacy sshd[30597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.51.37 Jan 31 19:59:50 legacy sshd[30597]: Failed password for invalid user xguest from 51.178.51.37 port 39842 ssh2 Jan 31 20:09:17 legacy sshd[30966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.51.37 ... |
2020-02-01 03:21:55 |