City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.106.255.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32887
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.106.255.245. IN A
;; AUTHORITY SECTION:
. 41 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021601 1800 900 604800 86400
;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 04:28:04 CST 2022
;; MSG SIZE rcvd: 108
245.255.106.104.in-addr.arpa domain name pointer a104-106-255-245.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
245.255.106.104.in-addr.arpa name = a104-106-255-245.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
1.58.71.34 | attack | Brute force blocker - service: proftpd1 - aantal: 128 - Thu Jul 26 18:05:15 2018 |
2020-02-24 22:36:58 |
51.68.121.180 | attack | lfd: (smtpauth) Failed SMTP AUTH login from 51.68.121.180 (FR/France/180.ip-51-68-121.eu): 5 in the last 3600 secs - Sat Jul 28 15:46:28 2018 |
2020-02-24 22:24:40 |
112.185.212.72 | attack | Brute force blocker - service: proftpd1 - aantal: 70 - Thu Jul 26 01:05:15 2018 |
2020-02-24 22:45:09 |
159.65.62.216 | attack | Feb 24 14:29:02 [snip] sshd[1171]: Invalid user cpanel from 159.65.62.216 port 44132 Feb 24 14:29:02 [snip] sshd[1171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.62.216 Feb 24 14:29:04 [snip] sshd[1171]: Failed password for invalid user cpanel from 159.65.62.216 port 44132 ssh2[...] |
2020-02-24 22:40:27 |
118.81.142.143 | attack | Brute force blocker - service: proftpd1 - aantal: 85 - Wed Jul 25 07:45:16 2018 |
2020-02-24 22:46:35 |
74.208.23.229 | attack | Wordpress brute-force |
2020-02-24 22:30:07 |
94.102.56.215 | attackbots | 94.102.56.215 was recorded 29 times by 14 hosts attempting to connect to the following ports: 7842,7822,7805,7876. Incident counter (4h, 24h, all-time): 29, 163, 5245 |
2020-02-24 22:29:39 |
156.202.53.253 | attackspam | $f2bV_matches |
2020-02-24 22:21:13 |
112.230.187.206 | attackspambots | Brute force blocker - service: proftpd1, proftpd2 - aantal: 45 - Tue Jul 24 09:15:17 2018 |
2020-02-24 22:52:24 |
50.56.218.143 | attackbotsspam | Brute force blocker - service: exim2 - aantal: 25 - Thu Jul 26 03:30:18 2018 |
2020-02-24 22:47:09 |
106.32.4.182 | attack | Brute force blocker - service: proftpd1 - aantal: 39 - Thu Jul 26 02:45:16 2018 |
2020-02-24 22:40:59 |
222.186.42.7 | attackspambots | 24.02.2020 14:02:41 SSH access blocked by firewall |
2020-02-24 22:21:51 |
143.0.177.182 | spambotsattackproxynormal | owwwww |
2020-02-24 22:27:14 |
61.187.144.88 | attackbots | Brute force blocker - service: proftpd1 - aantal: 155 - Wed Jul 25 13:25:15 2018 |
2020-02-24 22:46:15 |
143.0.177.182 | spambotsattacknormal | owwwww |
2020-02-24 22:27:07 |