City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.123.116.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14051
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.123.116.34. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 22:48:27 CST 2025
;; MSG SIZE rcvd: 107
34.116.123.104.in-addr.arpa domain name pointer a104-123-116-34.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
34.116.123.104.in-addr.arpa name = a104-123-116-34.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 112.253.11.105 | attackspam | $f2bV_matches |
2019-09-28 03:24:02 |
| 212.64.58.154 | attackspambots | Sep 27 17:15:07 nextcloud sshd\[560\]: Invalid user web78p1 from 212.64.58.154 Sep 27 17:15:07 nextcloud sshd\[560\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.58.154 Sep 27 17:15:09 nextcloud sshd\[560\]: Failed password for invalid user web78p1 from 212.64.58.154 port 47822 ssh2 ... |
2019-09-28 03:35:16 |
| 218.92.0.193 | attack | Sep 27 17:23:32 bouncer sshd\[24105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.193 user=root Sep 27 17:23:34 bouncer sshd\[24105\]: Failed password for root from 218.92.0.193 port 38891 ssh2 Sep 27 17:23:38 bouncer sshd\[24105\]: Failed password for root from 218.92.0.193 port 38891 ssh2 ... |
2019-09-28 03:35:02 |
| 183.129.150.2 | attackspambots | Invalid user gk from 183.129.150.2 port 41693 |
2019-09-28 03:37:59 |
| 142.93.57.62 | attackbots | Sep 27 18:27:36 mail sshd\[23127\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.57.62 Sep 27 18:27:38 mail sshd\[23127\]: Failed password for invalid user jy from 142.93.57.62 port 41856 ssh2 Sep 27 18:31:48 mail sshd\[23514\]: Invalid user cyrus from 142.93.57.62 port 54326 Sep 27 18:31:48 mail sshd\[23514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.57.62 Sep 27 18:31:51 mail sshd\[23514\]: Failed password for invalid user cyrus from 142.93.57.62 port 54326 ssh2 |
2019-09-28 03:12:38 |
| 223.225.131.237 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:06:16. |
2019-09-28 03:52:02 |
| 49.206.126.220 | attackspambots | ENG,WP GET /wp-login.php |
2019-09-28 03:23:11 |
| 140.143.59.171 | attack | Sep 28 00:49:35 areeb-Workstation sshd[14530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.59.171 Sep 28 00:49:37 areeb-Workstation sshd[14530]: Failed password for invalid user aq from 140.143.59.171 port 9757 ssh2 ... |
2019-09-28 03:29:11 |
| 79.11.181.225 | attackspam | $f2bV_matches |
2019-09-28 03:28:14 |
| 221.166.180.120 | attack | " " |
2019-09-28 03:08:51 |
| 92.118.160.25 | attackbots | Scanning random ports - tries to find possible vulnerable services |
2019-09-28 03:18:02 |
| 222.190.127.58 | attackspambots | 2019-09-27T21:28:17.219839tmaserv sshd\[18514\]: Failed password for invalid user user from 222.190.127.58 port 44656 ssh2 2019-09-27T21:43:50.497453tmaserv sshd\[19375\]: Invalid user user from 222.190.127.58 port 44564 2019-09-27T21:43:50.508724tmaserv sshd\[19375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.190.127.58 2019-09-27T21:43:51.789863tmaserv sshd\[19375\]: Failed password for invalid user user from 222.190.127.58 port 44564 ssh2 2019-09-27T21:59:23.420056tmaserv sshd\[20242\]: Invalid user user from 222.190.127.58 port 44470 2019-09-27T21:59:23.427913tmaserv sshd\[20242\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.190.127.58 ... |
2019-09-28 03:21:19 |
| 45.86.74.123 | attack | Sep 27 04:41:18 lamijardin sshd[19555]: Invalid user gmodserver from 45.86.74.123 Sep 27 04:41:18 lamijardin sshd[19555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.86.74.123 Sep 27 04:41:20 lamijardin sshd[19555]: Failed password for invalid user gmodserver from 45.86.74.123 port 44978 ssh2 Sep 27 04:41:20 lamijardin sshd[19555]: Received disconnect from 45.86.74.123 port 44978:11: Bye Bye [preauth] Sep 27 04:41:20 lamijardin sshd[19555]: Disconnected from 45.86.74.123 port 44978 [preauth] Sep 27 04:56:08 lamijardin sshd[19609]: Invalid user admin from 45.86.74.123 Sep 27 04:56:08 lamijardin sshd[19609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.86.74.123 Sep 27 04:56:10 lamijardin sshd[19609]: Failed password for invalid user admin from 45.86.74.123 port 39148 ssh2 Sep 27 04:56:10 lamijardin sshd[19609]: Received disconnect from 45.86.74.123 port 39148:11: Bye Bye [preauth........ ------------------------------- |
2019-09-28 03:45:02 |
| 186.153.138.2 | attackbots | Sep 27 20:20:17 MK-Soft-VM3 sshd[26002]: Failed password for root from 186.153.138.2 port 53132 ssh2 ... |
2019-09-28 03:09:13 |
| 58.162.140.172 | attack | Sep 27 15:23:57 vps691689 sshd[12819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.162.140.172 Sep 27 15:24:00 vps691689 sshd[12819]: Failed password for invalid user just from 58.162.140.172 port 54290 ssh2 ... |
2019-09-28 03:24:22 |