City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.106.254.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5678
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.106.254.80. IN A
;; AUTHORITY SECTION:
. 281 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400
;; Query time: 47 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 01:30:05 CST 2022
;; MSG SIZE rcvd: 107
80.254.106.104.in-addr.arpa domain name pointer a104-106-254-80.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
80.254.106.104.in-addr.arpa name = a104-106-254-80.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
185.147.215.14 | attackbotsspam | Registration from '.*' failed for ' |
2020-09-19 19:48:37 |
187.190.236.88 | attackspambots | (sshd) Failed SSH login from 187.190.236.88 (MX/Mexico/fixed-187-190-236-88.totalplay.net): 5 in the last 3600 secs |
2020-09-19 20:22:40 |
34.93.211.49 | attackbots | Invalid user cpanelrrdtool from 34.93.211.49 port 52516 |
2020-09-19 20:21:04 |
91.134.167.236 | attackbots | Invalid user lounette from 91.134.167.236 port 35464 |
2020-09-19 20:20:52 |
116.12.251.132 | attack | 2020-09-19T15:42:05.362482paragon sshd[189219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.12.251.132 2020-09-19T15:42:05.358459paragon sshd[189219]: Invalid user csgo from 116.12.251.132 port 42921 2020-09-19T15:42:07.081022paragon sshd[189219]: Failed password for invalid user csgo from 116.12.251.132 port 42921 ssh2 2020-09-19T15:46:36.165679paragon sshd[189281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.12.251.132 user=root 2020-09-19T15:46:38.425722paragon sshd[189281]: Failed password for root from 116.12.251.132 port 60492 ssh2 ... |
2020-09-19 20:18:27 |
20.194.36.46 | attackbotsspam | Sep 19 18:44:42 webhost01 sshd[18254]: Failed password for root from 20.194.36.46 port 39390 ssh2 ... |
2020-09-19 19:47:42 |
212.70.149.52 | attackspambots | Sep 19 14:08:52 galaxy event: galaxy/lswi: smtp: kultura@uni-potsdam.de [212.70.149.52] authentication failure using internet password Sep 19 14:09:18 galaxy event: galaxy/lswi: smtp: phantom@uni-potsdam.de [212.70.149.52] authentication failure using internet password Sep 19 14:09:44 galaxy event: galaxy/lswi: smtp: testblog@uni-potsdam.de [212.70.149.52] authentication failure using internet password Sep 19 14:10:10 galaxy event: galaxy/lswi: smtp: 114@uni-potsdam.de [212.70.149.52] authentication failure using internet password Sep 19 14:10:35 galaxy event: galaxy/lswi: smtp: bergen-gw7@uni-potsdam.de [212.70.149.52] authentication failure using internet password ... |
2020-09-19 20:13:54 |
31.163.152.203 | attackspambots | Listed on zen-spamhaus also barracudaCentral and abuseat.org / proto=6 . srcport=26229 . dstport=23 . (2884) |
2020-09-19 20:10:40 |
163.172.49.56 | attack | prod8 ... |
2020-09-19 20:19:38 |
81.68.82.201 | attackspam | Sep 19 11:25:20 email sshd\[13182\]: Invalid user tomcat from 81.68.82.201 Sep 19 11:25:20 email sshd\[13182\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.82.201 Sep 19 11:25:23 email sshd\[13182\]: Failed password for invalid user tomcat from 81.68.82.201 port 35124 ssh2 Sep 19 11:29:56 email sshd\[14057\]: Invalid user ubuntu from 81.68.82.201 Sep 19 11:29:56 email sshd\[14057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.82.201 ... |
2020-09-19 19:43:00 |
210.91.184.225 | attackspam | Sep 18 17:01:25 ssh2 sshd[28722]: Invalid user user from 210.91.184.225 port 54285 Sep 18 17:01:25 ssh2 sshd[28722]: Failed password for invalid user user from 210.91.184.225 port 54285 ssh2 Sep 18 17:01:26 ssh2 sshd[28722]: Connection closed by invalid user user 210.91.184.225 port 54285 [preauth] ... |
2020-09-19 20:22:19 |
60.243.248.13 | attackspam | Listed on dnsbl-sorbs plus abuseat.org and zen-spamhaus / proto=6 . srcport=21700 . dstport=23 . (2883) |
2020-09-19 20:20:03 |
185.233.116.120 | attackbotsspam | Attempt to hack Wordpress Login, XMLRPC or other login |
2020-09-19 19:54:26 |
184.105.139.70 | attackspambots | firewall-block, port(s): 123/udp |
2020-09-19 19:42:26 |
183.165.60.186 | attackbots | Banned for a week because repeated abuses, for example SSH, but not only |
2020-09-19 19:44:12 |