City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.106.242.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40817
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.106.242.234. IN A
;; AUTHORITY SECTION:
. 175 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022401 1800 900 604800 86400
;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 12:02:01 CST 2022
;; MSG SIZE rcvd: 108
234.242.106.104.in-addr.arpa domain name pointer a104-106-242-234.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
234.242.106.104.in-addr.arpa name = a104-106-242-234.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 89.31.57.5 | attack | xmlrpc attack |
2020-01-20 05:34:09 |
| 71.6.199.23 | attackspambots | Unauthorized connection attempt detected from IP address 71.6.199.23 to port 79 [J] |
2020-01-20 05:20:54 |
| 51.15.172.18 | attack | Jan 19 16:35:09 ny01 sshd[17982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.172.18 Jan 19 16:35:11 ny01 sshd[17982]: Failed password for invalid user prueba from 51.15.172.18 port 52952 ssh2 Jan 19 16:38:11 ny01 sshd[18356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.172.18 |
2020-01-20 05:43:09 |
| 36.68.22.126 | attack | Port 22 Scan, PTR: PTR record not found |
2020-01-20 05:07:38 |
| 89.233.146.105 | attackspam | 1579468139 - 01/19/2020 22:08:59 Host: 89.233.146.105/89.233.146.105 Port: 445 TCP Blocked |
2020-01-20 05:28:31 |
| 101.205.215.231 | attackspam | CMS brute force ... |
2020-01-20 05:11:35 |
| 222.186.175.169 | attackbots | Jan 19 22:13:20 markkoudstaal sshd[11996]: Failed password for root from 222.186.175.169 port 2198 ssh2 Jan 19 22:13:23 markkoudstaal sshd[11996]: Failed password for root from 222.186.175.169 port 2198 ssh2 Jan 19 22:13:26 markkoudstaal sshd[11996]: Failed password for root from 222.186.175.169 port 2198 ssh2 Jan 19 22:13:30 markkoudstaal sshd[11996]: Failed password for root from 222.186.175.169 port 2198 ssh2 |
2020-01-20 05:15:50 |
| 1.232.77.64 | attackspam | Jan 19 22:09:18 lnxweb61 sshd[1558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.232.77.64 Jan 19 22:09:18 lnxweb61 sshd[1554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.232.77.64 |
2020-01-20 05:16:37 |
| 49.88.112.113 | attackbotsspam | Jan 19 11:03:49 wbs sshd\[16104\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113 user=root Jan 19 11:03:51 wbs sshd\[16104\]: Failed password for root from 49.88.112.113 port 63922 ssh2 Jan 19 11:08:32 wbs sshd\[16495\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113 user=root Jan 19 11:08:34 wbs sshd\[16495\]: Failed password for root from 49.88.112.113 port 30624 ssh2 Jan 19 11:09:20 wbs sshd\[16687\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113 user=root |
2020-01-20 05:15:07 |
| 133.130.98.177 | attack | Jan 19 22:34:45 [snip] sshd[18141]: Invalid user sinusbot from 133.130.98.177 port 59424 Jan 19 22:34:45 [snip] sshd[18141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.98.177 Jan 19 22:34:47 [snip] sshd[18141]: Failed password for invalid user sinusbot from 133.130.98.177 port 59424 ssh2[...] |
2020-01-20 05:36:51 |
| 112.95.249.136 | attackbotsspam | Jan 19 22:06:59 localhost sshd\[26074\]: Invalid user bruna from 112.95.249.136 Jan 19 22:06:59 localhost sshd\[26074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.95.249.136 Jan 19 22:07:01 localhost sshd\[26074\]: Failed password for invalid user bruna from 112.95.249.136 port 2083 ssh2 Jan 19 22:09:03 localhost sshd\[26094\]: Invalid user sinusbot from 112.95.249.136 Jan 19 22:09:03 localhost sshd\[26094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.95.249.136 ... |
2020-01-20 05:25:38 |
| 188.173.80.134 | attack | Unauthorized connection attempt detected from IP address 188.173.80.134 to port 2220 [J] |
2020-01-20 05:44:55 |
| 195.181.166.142 | attackspam | spam via contact-form 19.01.2020 / 21:00 |
2020-01-20 05:08:50 |
| 123.188.46.118 | attack | " " |
2020-01-20 05:37:16 |
| 222.186.30.76 | attack | Jan 19 22:40:12 MK-Soft-VM6 sshd[3598]: Failed password for root from 222.186.30.76 port 31121 ssh2 Jan 19 22:40:15 MK-Soft-VM6 sshd[3598]: Failed password for root from 222.186.30.76 port 31121 ssh2 ... |
2020-01-20 05:40:46 |