City: Atlanta
Region: Georgia
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.105.245.10
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24883
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.105.245.10. IN A
;; AUTHORITY SECTION:
. 138 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022031500 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 16 01:09:25 CST 2022
;; MSG SIZE rcvd: 107
10.245.105.104.in-addr.arpa domain name pointer a104-105-245-10.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
10.245.105.104.in-addr.arpa name = a104-105-245-10.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
93.124.80.20 | attackbotsspam | Unauthorised access (Apr 19) SRC=93.124.80.20 LEN=40 TTL=244 ID=62350 DF TCP DPT=8080 WINDOW=14600 SYN |
2020-04-20 01:39:35 |
111.101.1.210 | attackspambots | Unauthorized connection attempt from IP address 111.101.1.210 on Port 445(SMB) |
2020-04-20 01:11:38 |
167.71.248.174 | attack | DigitalOcean BotNet attack - 10s of requests to non- pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined, XSS attacks UA removed |
2020-04-20 01:24:47 |
222.186.52.86 | attackbotsspam | Apr 19 13:05:23 ny01 sshd[22932]: Failed password for root from 222.186.52.86 port 19319 ssh2 Apr 19 13:06:26 ny01 sshd[23049]: Failed password for root from 222.186.52.86 port 53758 ssh2 |
2020-04-20 01:23:59 |
49.234.18.158 | attack | Apr 19 19:33:25 hosting sshd[28434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.18.158 user=root Apr 19 19:33:26 hosting sshd[28434]: Failed password for root from 49.234.18.158 port 38436 ssh2 Apr 19 19:38:34 hosting sshd[28983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.18.158 user=root Apr 19 19:38:37 hosting sshd[28983]: Failed password for root from 49.234.18.158 port 46136 ssh2 Apr 19 19:43:39 hosting sshd[29751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.18.158 user=admin Apr 19 19:43:41 hosting sshd[29751]: Failed password for admin from 49.234.18.158 port 53828 ssh2 ... |
2020-04-20 01:19:52 |
69.162.98.123 | attackspam | 1587297639 - 04/19/2020 14:00:39 Host: 69.162.98.123/69.162.98.123 Port: 445 TCP Blocked |
2020-04-20 01:28:55 |
94.245.94.104 | attackspam | Apr 19 14:24:45 vps sshd[769622]: Failed password for invalid user mc from 94.245.94.104 port 44752 ssh2 Apr 19 14:29:36 vps sshd[793612]: Invalid user test from 94.245.94.104 port 37170 Apr 19 14:29:36 vps sshd[793612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.245.94.104 Apr 19 14:29:38 vps sshd[793612]: Failed password for invalid user test from 94.245.94.104 port 37170 ssh2 Apr 19 14:34:24 vps sshd[816734]: Invalid user cn from 94.245.94.104 port 57814 ... |
2020-04-20 01:36:02 |
111.229.125.124 | attackbotsspam | SSH Brute-Forcing (server1) |
2020-04-20 01:39:04 |
35.239.245.157 | attackbotsspam | Unauthorized connection attempt detected from IP address 35.239.245.157 to port 22 |
2020-04-20 01:41:37 |
118.96.19.103 | attackspam | Unauthorized connection attempt from IP address 118.96.19.103 on Port 445(SMB) |
2020-04-20 01:20:53 |
217.125.151.139 | attackspam | Unauthorized connection attempt from IP address 217.125.151.139 on Port 445(SMB) |
2020-04-20 01:33:26 |
188.170.236.10 | attackspambots | Unauthorized connection attempt from IP address 188.170.236.10 on Port 445(SMB) |
2020-04-20 01:32:34 |
218.0.57.245 | attackbots | Unauthorized SSH login attempts |
2020-04-20 01:05:06 |
106.52.19.71 | attackspambots | Apr 19 05:00:56 mockhub sshd[23166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.19.71 Apr 19 05:00:58 mockhub sshd[23166]: Failed password for invalid user ubuntu from 106.52.19.71 port 35924 ssh2 ... |
2020-04-20 01:09:45 |
106.13.233.4 | attackspam | Apr 16 00:55:28 lock-38 sshd[1056827]: Invalid user oracle from 106.13.233.4 port 39576 Apr 16 00:55:28 lock-38 sshd[1056827]: Invalid user oracle from 106.13.233.4 port 39576 Apr 16 00:55:28 lock-38 sshd[1056827]: Failed password for invalid user oracle from 106.13.233.4 port 39576 ssh2 Apr 16 00:59:13 lock-38 sshd[1056915]: Failed password for root from 106.13.233.4 port 33146 ssh2 Apr 16 01:02:38 lock-38 sshd[1057030]: Failed password for root from 106.13.233.4 port 54946 ssh2 ... |
2020-04-20 01:35:40 |