City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.107.1.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27976
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.107.1.5. IN A
;; AUTHORITY SECTION:
. 341 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400
;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 19:18:56 CST 2022
;; MSG SIZE rcvd: 104
5.1.107.104.in-addr.arpa domain name pointer a104-107-1-5.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
5.1.107.104.in-addr.arpa name = a104-107-1-5.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
107.172.0.210 | attack | Apr 28 17:44:07 master sshd[21164]: Failed password for root from 107.172.0.210 port 44792 ssh2 Apr 28 17:54:05 master sshd[21192]: Failed password for invalid user ian from 107.172.0.210 port 35646 ssh2 Apr 28 17:59:46 master sshd[21198]: Failed password for root from 107.172.0.210 port 47662 ssh2 Apr 28 18:04:46 master sshd[21230]: Failed password for root from 107.172.0.210 port 59686 ssh2 Apr 28 18:09:58 master sshd[21258]: Failed password for invalid user admin from 107.172.0.210 port 43460 ssh2 Apr 28 18:14:57 master sshd[21289]: Failed password for invalid user anitha from 107.172.0.210 port 55470 ssh2 Apr 28 18:19:55 master sshd[21333]: Failed password for invalid user game from 107.172.0.210 port 39246 ssh2 Apr 28 18:25:05 master sshd[21346]: Failed password for invalid user pm from 107.172.0.210 port 51258 ssh2 Apr 28 18:30:17 master sshd[21371]: Failed password for invalid user ts3server from 107.172.0.210 port 35028 ssh2 |
2020-04-29 01:06:13 |
2405:204:979f:390c:6c6e:c031:7370:5429 | attack | LGS,WP GET /wp-login.php |
2020-04-29 01:11:39 |
185.177.104.130 | attack | 1588075830 - 04/28/2020 14:10:30 Host: 185.177.104.130/185.177.104.130 Port: 445 TCP Blocked |
2020-04-29 01:09:02 |
92.222.72.234 | attackbots | Apr 28 12:32:33 vps46666688 sshd[28272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.72.234 Apr 28 12:32:35 vps46666688 sshd[28272]: Failed password for invalid user tt from 92.222.72.234 port 58845 ssh2 ... |
2020-04-29 00:22:34 |
51.255.173.222 | attack | $f2bV_matches |
2020-04-29 01:08:30 |
106.53.20.166 | attackspambots | Apr 28 14:21:13 |
2020-04-29 00:45:19 |
106.12.82.136 | attackbotsspam | Apr 28 14:01:17 rotator sshd\[30184\]: Invalid user caspar from 106.12.82.136Apr 28 14:01:19 rotator sshd\[30184\]: Failed password for invalid user caspar from 106.12.82.136 port 46500 ssh2Apr 28 14:04:31 rotator sshd\[30233\]: Failed password for root from 106.12.82.136 port 57796 ssh2Apr 28 14:07:46 rotator sshd\[31043\]: Failed password for root from 106.12.82.136 port 40866 ssh2Apr 28 14:10:46 rotator sshd\[31855\]: Invalid user alexa from 106.12.82.136Apr 28 14:10:48 rotator sshd\[31855\]: Failed password for invalid user alexa from 106.12.82.136 port 52184 ssh2 ... |
2020-04-29 00:53:33 |
104.168.28.195 | attack | Apr 28 14:20:52 melroy-server sshd[4177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.28.195 Apr 28 14:20:54 melroy-server sshd[4177]: Failed password for invalid user bubbles from 104.168.28.195 port 34850 ssh2 ... |
2020-04-29 01:07:38 |
192.144.155.110 | attackspambots | $f2bV_matches |
2020-04-29 01:04:42 |
47.254.86.66 | attackspam | 2020-04-28T07:53:28.6322361495-001 sshd[5244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.254.86.66 user=root 2020-04-28T07:53:30.4605071495-001 sshd[5244]: Failed password for root from 47.254.86.66 port 60710 ssh2 2020-04-28T07:54:27.0541911495-001 sshd[5311]: Invalid user luke from 47.254.86.66 port 47432 2020-04-28T07:54:27.0578141495-001 sshd[5311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.254.86.66 2020-04-28T07:54:27.0541911495-001 sshd[5311]: Invalid user luke from 47.254.86.66 port 47432 2020-04-28T07:54:29.3215381495-001 sshd[5311]: Failed password for invalid user luke from 47.254.86.66 port 47432 ssh2 ... |
2020-04-29 00:42:21 |
117.1.168.37 | attackspam | Honeypot attack, port: 445, PTR: localhost. |
2020-04-29 00:43:16 |
190.60.210.130 | attack | Honeypot attack, port: 445, PTR: 130.210.60.190.host.ifxnetworks.com. |
2020-04-29 00:48:50 |
77.21.131.130 | attackbots | SSH invalid-user multiple login attempts |
2020-04-29 00:55:07 |
35.239.200.254 | attackbotsspam | Apr 28 14:47:43 raspberrypi sshd\[25562\]: Invalid user parking from 35.239.200.254Apr 28 14:47:45 raspberrypi sshd\[25562\]: Failed password for invalid user parking from 35.239.200.254 port 46860 ssh2Apr 28 14:56:01 raspberrypi sshd\[32285\]: Failed password for root from 35.239.200.254 port 59888 ssh2 ... |
2020-04-29 00:23:52 |
143.59.15.43 | attackspam | Apr 28 14:08:38 legacy sshd[29111]: Failed password for root from 143.59.15.43 port 36372 ssh2 Apr 28 14:11:21 legacy sshd[29266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.59.15.43 Apr 28 14:11:23 legacy sshd[29266]: Failed password for invalid user hx from 143.59.15.43 port 58464 ssh2 ... |
2020-04-29 00:26:20 |