City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.104.81.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39685
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.104.81.117. IN A
;; AUTHORITY SECTION:
. 264 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022401 1800 900 604800 86400
;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 12:01:51 CST 2022
;; MSG SIZE rcvd: 107
117.81.104.104.in-addr.arpa domain name pointer a104-104-81-117.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
117.81.104.104.in-addr.arpa name = a104-104-81-117.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 123.130.226.231 | attackspam | ports scanning |
2019-06-23 09:40:57 |
| 177.23.90.10 | attackbotsspam | Jun 23 02:18:18 mail sshd\[9467\]: Invalid user flocon from 177.23.90.10 port 43102 Jun 23 02:18:18 mail sshd\[9467\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.23.90.10 Jun 23 02:18:20 mail sshd\[9467\]: Failed password for invalid user flocon from 177.23.90.10 port 43102 ssh2 Jun 23 02:20:10 mail sshd\[9753\]: Invalid user zan from 177.23.90.10 port 41550 Jun 23 02:20:10 mail sshd\[9753\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.23.90.10 |
2019-06-23 09:32:36 |
| 197.46.148.219 | attackspambots | port scan and connect, tcp 23 (telnet) |
2019-06-23 09:56:03 |
| 95.55.70.73 | attack | firewall-block, port(s): 23/tcp |
2019-06-23 10:03:51 |
| 191.53.197.156 | attackbotsspam | Distributed brute force attack |
2019-06-23 09:35:08 |
| 189.51.104.209 | attack | SMTP-sasl brute force ... |
2019-06-23 09:51:37 |
| 31.193.239.132 | attack | Jun 23 02:16:04 server sshd[57283]: Failed password for list from 31.193.239.132 port 52628 ssh2 Jun 23 02:18:22 server sshd[57804]: Failed password for invalid user openstack from 31.193.239.132 port 42676 ssh2 Jun 23 02:20:15 server sshd[58293]: Failed password for invalid user suelette from 31.193.239.132 port 56514 ssh2 |
2019-06-23 09:58:47 |
| 200.69.204.143 | attackbotsspam | Jun 23 02:54:24 debian sshd\[24711\]: Invalid user nd from 200.69.204.143 port 7873 Jun 23 02:54:24 debian sshd\[24711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.69.204.143 ... |
2019-06-23 09:59:13 |
| 111.230.236.24 | attack | ports scanning |
2019-06-23 10:12:53 |
| 92.118.160.9 | attackspam | ports scanning |
2019-06-23 09:42:24 |
| 190.137.8.208 | attackspambots | SASL Brute Force |
2019-06-23 10:05:44 |
| 74.82.47.62 | attackspam | firewall-block, port(s): 8443/tcp |
2019-06-23 10:08:44 |
| 191.53.254.123 | attack | Distributed brute force attack |
2019-06-23 09:35:57 |
| 91.196.149.73 | attack | ports scanning |
2019-06-23 09:53:14 |
| 143.0.140.248 | attackbots | 23.06.2019 02:21:08 - Login Fail on hMailserver Detected by ELinOX-hMail-A2F |
2019-06-23 09:33:04 |