City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.119.61.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37197
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.119.61.213. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400
;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 01:32:12 CST 2025
;; MSG SIZE rcvd: 107
213.61.119.104.in-addr.arpa domain name pointer a104-119-61-213.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
213.61.119.104.in-addr.arpa name = a104-119-61-213.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
198.108.66.30 | attackbotsspam | firewall-block, port(s): 8888/tcp |
2019-12-09 06:32:45 |
206.189.225.85 | attackspambots | Dec 8 22:41:29 fr01 sshd[3338]: Invalid user diem from 206.189.225.85 Dec 8 22:41:29 fr01 sshd[3338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.225.85 Dec 8 22:41:29 fr01 sshd[3338]: Invalid user diem from 206.189.225.85 Dec 8 22:41:31 fr01 sshd[3338]: Failed password for invalid user diem from 206.189.225.85 port 55660 ssh2 Dec 8 22:49:45 fr01 sshd[4794]: Invalid user dovecot from 206.189.225.85 ... |
2019-12-09 06:44:11 |
106.54.123.106 | attackspam | $f2bV_matches |
2019-12-09 06:35:14 |
177.73.248.35 | attackbots | $f2bV_matches |
2019-12-09 06:39:01 |
197.242.6.241 | attackbots | firewall-block, port(s): 5555/tcp |
2019-12-09 06:36:27 |
118.25.25.207 | attack | Dec 8 12:03:55 wbs sshd\[7051\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.25.207 user=root Dec 8 12:03:57 wbs sshd\[7051\]: Failed password for root from 118.25.25.207 port 43272 ssh2 Dec 8 12:10:27 wbs sshd\[7909\]: Invalid user sasaki from 118.25.25.207 Dec 8 12:10:27 wbs sshd\[7909\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.25.207 Dec 8 12:10:29 wbs sshd\[7909\]: Failed password for invalid user sasaki from 118.25.25.207 port 47446 ssh2 |
2019-12-09 06:21:12 |
180.76.176.174 | attackbots | detected by Fail2Ban |
2019-12-09 06:18:17 |
116.196.93.89 | attack | Dec 8 23:26:43 server sshd\[29649\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.93.89 user=mysql Dec 8 23:26:45 server sshd\[29649\]: Failed password for mysql from 116.196.93.89 port 43846 ssh2 Dec 9 00:00:06 server sshd\[6669\]: Invalid user lumbroso from 116.196.93.89 Dec 9 00:00:06 server sshd\[6669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.93.89 Dec 9 00:00:08 server sshd\[6669\]: Failed password for invalid user lumbroso from 116.196.93.89 port 50908 ssh2 ... |
2019-12-09 06:35:02 |
218.92.0.179 | attackbotsspam | SSH auth scanning - multiple failed logins |
2019-12-09 06:41:34 |
125.22.98.171 | attackbots | Unauthorized SSH login attempts |
2019-12-09 06:34:46 |
138.197.120.219 | attackbots | Dec 8 17:59:52 hcbbdb sshd\[31878\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.120.219 user=root Dec 8 17:59:54 hcbbdb sshd\[31878\]: Failed password for root from 138.197.120.219 port 44084 ssh2 Dec 8 18:05:21 hcbbdb sshd\[32579\]: Invalid user sleep from 138.197.120.219 Dec 8 18:05:21 hcbbdb sshd\[32579\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.120.219 Dec 8 18:05:23 hcbbdb sshd\[32579\]: Failed password for invalid user sleep from 138.197.120.219 port 53118 ssh2 |
2019-12-09 06:52:28 |
128.199.170.33 | attack | Dec 8 07:13:13 home sshd[1047]: Invalid user beauty from 128.199.170.33 port 48082 Dec 8 07:13:13 home sshd[1047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.170.33 Dec 8 07:13:13 home sshd[1047]: Invalid user beauty from 128.199.170.33 port 48082 Dec 8 07:13:15 home sshd[1047]: Failed password for invalid user beauty from 128.199.170.33 port 48082 ssh2 Dec 8 07:23:49 home sshd[1168]: Invalid user gressmann from 128.199.170.33 port 35588 Dec 8 07:23:49 home sshd[1168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.170.33 Dec 8 07:23:49 home sshd[1168]: Invalid user gressmann from 128.199.170.33 port 35588 Dec 8 07:23:51 home sshd[1168]: Failed password for invalid user gressmann from 128.199.170.33 port 35588 ssh2 Dec 8 07:30:35 home sshd[1259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.170.33 user=root Dec 8 07:30:38 home sshd[1259]: Failed pa |
2019-12-09 06:37:13 |
193.70.33.75 | attackbotsspam | Dec 8 15:50:20 icinga sshd[10736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.33.75 Dec 8 15:50:22 icinga sshd[10736]: Failed password for invalid user cecilia from 193.70.33.75 port 40800 ssh2 ... |
2019-12-09 06:17:53 |
181.41.216.140 | attackbotsspam | Dec 8 23:48:27 grey postfix/smtpd\[28132\]: NOQUEUE: reject: RCPT from unknown\[181.41.216.140\]: 554 5.7.1 Service unavailable\; Client host \[181.41.216.140\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[181.41.216.140\]\; from=\ |
2019-12-09 06:48:34 |
139.162.104.208 | attack | 21/tcp 21/tcp 21/tcp... [2019-10-22/12-07]50pkt,1pt.(tcp) |
2019-12-09 06:16:20 |