City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.117.47.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59669
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.117.47.148. IN A
;; AUTHORITY SECTION:
. 237 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022032101 1800 900 604800 86400
;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 22 06:03:47 CST 2022
;; MSG SIZE rcvd: 107
148.47.117.104.in-addr.arpa domain name pointer a104-117-47-148.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
148.47.117.104.in-addr.arpa name = a104-117-47-148.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
1.49.35.1 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-07-06 08:37:09 |
118.241.122.226 | attack | Automatic report - Web App Attack |
2019-07-06 09:12:06 |
177.8.249.19 | attackbotsspam | Jul 5 20:52:52 srv-4 sshd\[10616\]: Invalid user admin from 177.8.249.19 Jul 5 20:52:52 srv-4 sshd\[10616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.8.249.19 Jul 5 20:52:54 srv-4 sshd\[10616\]: Failed password for invalid user admin from 177.8.249.19 port 59892 ssh2 ... |
2019-07-06 09:17:21 |
45.224.105.65 | attackspam | IMAP brute force ... |
2019-07-06 08:38:38 |
175.25.51.57 | attackspambots | $f2bV_matches |
2019-07-06 08:30:37 |
108.2.205.10 | attackbots | (imapd) Failed IMAP login from 108.2.205.10 (US/United States/static-108-2-205-10.phlapa.east.verizon.net): 1 in the last 3600 secs |
2019-07-06 09:11:45 |
77.247.110.212 | attackspam | CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found |
2019-07-06 08:48:47 |
51.158.125.6 | botsattack | BOT - ssh scanner and brute force |
2019-07-06 08:30:51 |
67.191.194.94 | attack | SSH Bruteforce |
2019-07-06 08:45:55 |
121.48.163.200 | attackspambots | Jul 6 02:40:12 jane sshd\[15090\]: Invalid user lucie from 121.48.163.200 port 42894 Jul 6 02:40:12 jane sshd\[15090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.48.163.200 Jul 6 02:40:15 jane sshd\[15090\]: Failed password for invalid user lucie from 121.48.163.200 port 42894 ssh2 ... |
2019-07-06 08:53:30 |
176.192.76.118 | attackspambots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-05 16:01:52,826 INFO [shellcode_manager] (176.192.76.118) no match, writing hexdump (2df19697c5117e5770ec7f6456e20f6b :2178962) - MS17010 (EternalBlue) |
2019-07-06 09:05:48 |
45.227.255.223 | attackbotsspam | Jul 6 00:37:17 h2177944 kernel: \[690593.493607\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.227.255.223 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=53947 PROTO=TCP SPT=44887 DPT=1546 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 6 00:42:15 h2177944 kernel: \[690892.088294\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.227.255.223 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=39939 PROTO=TCP SPT=44887 DPT=1514 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 6 00:51:47 h2177944 kernel: \[691463.962849\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.227.255.223 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=57679 PROTO=TCP SPT=44887 DPT=1536 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 6 00:57:38 h2177944 kernel: \[691815.115475\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.227.255.223 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=53841 PROTO=TCP SPT=44887 DPT=1502 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 6 01:25:05 h2177944 kernel: \[693461.849598\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.227.255.223 DST=85.214.117.9 |
2019-07-06 09:04:44 |
14.63.167.192 | attackspam | Jul 5 19:53:27 bouncer sshd\[17002\]: Invalid user travis from 14.63.167.192 port 56652 Jul 5 19:53:27 bouncer sshd\[17002\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.167.192 Jul 5 19:53:29 bouncer sshd\[17002\]: Failed password for invalid user travis from 14.63.167.192 port 56652 ssh2 ... |
2019-07-06 09:05:04 |
45.55.254.13 | attackspam | v+ssh-bruteforce |
2019-07-06 08:34:42 |
77.40.33.252 | attack | 2019-07-06 03:57:56 fixed_login authenticator failed for \(localhost.localdomain\) \[77.40.33.252\]: 535 Incorrect authentication data \(set_id=service@thepuddles.net.nz\) 2019-07-06 04:59:25 fixed_login authenticator failed for \(localhost.localdomain\) \[77.40.33.252\]: 535 Incorrect authentication data \(set_id=sales@thepuddles.net.nz\) 2019-07-06 05:53:52 fixed_login authenticator failed for \(localhost.localdomain\) \[77.40.33.252\]: 535 Incorrect authentication data \(set_id=reply@thepuddles.net.nz\) ... |
2019-07-06 08:55:29 |