City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.119.168.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23445
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.119.168.252. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 10:05:22 CST 2025
;; MSG SIZE rcvd: 108
252.168.119.104.in-addr.arpa domain name pointer a104-119-168-252.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
252.168.119.104.in-addr.arpa name = a104-119-168-252.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 118.25.96.30 | attackspam | Aug 24 04:15:46 icinga sshd[4135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.96.30 Aug 24 04:15:49 icinga sshd[4135]: Failed password for invalid user dev from 118.25.96.30 port 65173 ssh2 ... |
2019-08-24 11:12:18 |
| 39.181.144.84 | attack | Port Scan: TCP/139 |
2019-08-24 12:05:06 |
| 119.84.8.43 | attack | Aug 23 16:52:15 hiderm sshd\[19581\]: Invalid user secretaria from 119.84.8.43 Aug 23 16:52:15 hiderm sshd\[19581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.84.8.43 Aug 23 16:52:16 hiderm sshd\[19581\]: Failed password for invalid user secretaria from 119.84.8.43 port 40351 ssh2 Aug 23 16:54:17 hiderm sshd\[19761\]: Invalid user janet from 119.84.8.43 Aug 23 16:54:17 hiderm sshd\[19761\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.84.8.43 |
2019-08-24 11:15:10 |
| 109.227.196.32 | attackspambots | Port Scan: TCP/445 |
2019-08-24 11:50:55 |
| 36.236.14.252 | attackbotsspam | Port Scan: TCP/23 |
2019-08-24 12:06:52 |
| 187.211.171.229 | attackbotsspam | Port Scan: TCP/23 |
2019-08-24 11:42:15 |
| 75.90.131.198 | attackbotsspam | Port Scan: UDP/137 |
2019-08-24 11:55:54 |
| 94.177.214.200 | attackbotsspam | Aug 24 03:15:13 [munged] sshd[10080]: Invalid user user from 94.177.214.200 port 40142 Aug 24 03:15:13 [munged] sshd[10080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.214.200 |
2019-08-24 11:36:34 |
| 207.32.248.94 | attackbots | Port Scan: UDP/904 |
2019-08-24 12:10:17 |
| 122.121.121.98 | attack | Port Scan: TCP/23 |
2019-08-24 11:49:13 |
| 60.250.8.254 | attackspambots | Port Scan: TCP/445 |
2019-08-24 12:02:36 |
| 183.130.100.199 | attack | Port Scan: TCP/8081 |
2019-08-24 11:43:10 |
| 222.160.54.44 | attackbotsspam | Unauthorised access (Aug 24) SRC=222.160.54.44 LEN=40 TTL=49 ID=33254 TCP DPT=8080 WINDOW=15749 SYN |
2019-08-24 11:36:56 |
| 138.68.20.158 | attackspam | Aug 24 04:49:25 dev0-dcfr-rnet sshd[9883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.20.158 Aug 24 04:49:28 dev0-dcfr-rnet sshd[9883]: Failed password for invalid user user from 138.68.20.158 port 46392 ssh2 Aug 24 04:54:03 dev0-dcfr-rnet sshd[9902]: Failed password for root from 138.68.20.158 port 33464 ssh2 |
2019-08-24 11:24:33 |
| 73.84.181.73 | attackbots | Port Scan: UDP/53 |
2019-08-24 11:56:35 |