City: Secaucus
Region: New Jersey
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.107.52.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24089
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.107.52.213. IN A
;; AUTHORITY SECTION:
. 424 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022032801 1800 900 604800 86400
;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 29 12:00:51 CST 2022
;; MSG SIZE rcvd: 107
213.52.107.104.in-addr.arpa domain name pointer a104-107-52-213.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
213.52.107.104.in-addr.arpa name = a104-107-52-213.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
5.133.66.33 | attackbots | Autoban 5.133.66.33 AUTH/CONNECT |
2019-12-13 04:49:50 |
138.197.89.186 | attackspam | $f2bV_matches |
2019-12-13 05:04:56 |
5.133.66.138 | attackspambots | Autoban 5.133.66.138 AUTH/CONNECT |
2019-12-13 05:12:46 |
5.133.66.20 | attackspambots | Autoban 5.133.66.20 AUTH/CONNECT |
2019-12-13 04:58:26 |
5.133.66.113 | attackspambots | Autoban 5.133.66.113 AUTH/CONNECT |
2019-12-13 05:23:13 |
178.128.81.60 | attackspam | $f2bV_matches |
2019-12-13 04:55:13 |
199.116.112.245 | attackspambots | Dec 12 21:56:10 vibhu-HP-Z238-Microtower-Workstation sshd\[31025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.116.112.245 user=root Dec 12 21:56:12 vibhu-HP-Z238-Microtower-Workstation sshd\[31025\]: Failed password for root from 199.116.112.245 port 34379 ssh2 Dec 12 22:02:44 vibhu-HP-Z238-Microtower-Workstation sshd\[31358\]: Invalid user regine from 199.116.112.245 Dec 12 22:02:44 vibhu-HP-Z238-Microtower-Workstation sshd\[31358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.116.112.245 Dec 12 22:02:46 vibhu-HP-Z238-Microtower-Workstation sshd\[31358\]: Failed password for invalid user regine from 199.116.112.245 port 35371 ssh2 ... |
2019-12-13 05:14:51 |
5.133.66.169 | attackspambots | Autoban 5.133.66.169 AUTH/CONNECT |
2019-12-13 05:07:58 |
5.133.66.253 | attack | Autoban 5.133.66.253 AUTH/CONNECT |
2019-12-13 04:53:13 |
74.141.132.233 | attack | Dec 12 19:53:52 wh01 sshd[13931]: Failed password for root from 74.141.132.233 port 51150 ssh2 Dec 12 19:53:52 wh01 sshd[13931]: Received disconnect from 74.141.132.233 port 51150:11: Bye Bye [preauth] Dec 12 19:53:52 wh01 sshd[13931]: Disconnected from 74.141.132.233 port 51150 [preauth] Dec 12 20:00:38 wh01 sshd[14513]: Invalid user harkness from 74.141.132.233 port 36940 Dec 12 20:00:38 wh01 sshd[14513]: Failed password for invalid user harkness from 74.141.132.233 port 36940 ssh2 Dec 12 20:00:38 wh01 sshd[14513]: Received disconnect from 74.141.132.233 port 36940:11: Bye Bye [preauth] Dec 12 20:00:38 wh01 sshd[14513]: Disconnected from 74.141.132.233 port 36940 [preauth] Dec 12 20:26:02 wh01 sshd[16539]: Invalid user guest from 74.141.132.233 port 42888 Dec 12 20:26:02 wh01 sshd[16539]: Failed password for invalid user guest from 74.141.132.233 port 42888 ssh2 Dec 12 20:26:02 wh01 sshd[16539]: Received disconnect from 74.141.132.233 port 42888:11: Bye Bye [preauth] Dec 12 20:26:02 |
2019-12-13 05:26:05 |
45.4.58.198 | attack | Dec 12 21:52:11 vpn01 sshd[2724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.4.58.198 Dec 12 21:52:13 vpn01 sshd[2724]: Failed password for invalid user test1 from 45.4.58.198 port 55072 ssh2 ... |
2019-12-13 05:01:57 |
5.133.66.104 | attackspambots | Autoban 5.133.66.104 AUTH/CONNECT |
2019-12-13 05:27:10 |
5.133.66.126 | attack | Autoban 5.133.66.126 AUTH/CONNECT |
2019-12-13 05:17:24 |
176.88.197.114 | attack | Unauthorized connection attempt detected from IP address 176.88.197.114 to port 445 |
2019-12-13 05:19:13 |
218.92.0.204 | attackspam | Dec 12 20:45:46 zeus sshd[16587]: Failed password for root from 218.92.0.204 port 19965 ssh2 Dec 12 20:45:48 zeus sshd[16587]: Failed password for root from 218.92.0.204 port 19965 ssh2 Dec 12 20:45:53 zeus sshd[16587]: Failed password for root from 218.92.0.204 port 19965 ssh2 Dec 12 20:49:19 zeus sshd[16687]: Failed password for root from 218.92.0.204 port 64220 ssh2 |
2019-12-13 05:00:43 |