City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.126.119.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47472
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.126.119.91. IN A
;; AUTHORITY SECTION:
. 386 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021602 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 11:56:31 CST 2022
;; MSG SIZE rcvd: 107
91.119.126.104.in-addr.arpa domain name pointer a104-126-119-91.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
91.119.126.104.in-addr.arpa name = a104-126-119-91.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
74.129.23.72 | attack | Invalid user pi from 74.129.23.72 port 52794 |
2019-10-11 22:16:44 |
43.242.125.185 | attackspambots | 2019-10-11T13:55:40.736801abusebot-5.cloudsearch.cf sshd\[11399\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.242.125.185 user=root |
2019-10-11 22:19:48 |
36.66.156.125 | attackspam | Invalid user zimbra from 36.66.156.125 port 60126 |
2019-10-11 22:40:35 |
94.23.50.194 | attackspam | Invalid user oracle from 94.23.50.194 port 59803 |
2019-10-11 22:14:12 |
81.22.45.116 | attackspam | 2019-10-11T16:12:29.030110+02:00 lumpi kernel: [625563.710217] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.116 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=23519 PROTO=TCP SPT=49945 DPT=1518 WINDOW=1024 RES=0x00 SYN URGP=0 ... |
2019-10-11 22:15:39 |
59.148.43.97 | attackbotsspam | Oct 11 14:57:03 MK-Soft-Root1 sshd[22967]: Failed password for root from 59.148.43.97 port 43086 ssh2 Oct 11 14:57:06 MK-Soft-Root1 sshd[22967]: Failed password for root from 59.148.43.97 port 43086 ssh2 ... |
2019-10-11 22:52:06 |
82.149.162.78 | attackbotsspam | Invalid user anne from 82.149.162.78 port 33524 |
2019-10-11 22:51:46 |
117.102.76.46 | attackbots | [Fri Oct 11 02:16:02 2019 GMT] "BFA" |
2019-10-11 22:50:21 |
156.202.209.210 | attackbots | Invalid user admin from 156.202.209.210 port 47832 |
2019-10-11 22:03:20 |
37.45.136.219 | attack | Invalid user admin from 37.45.136.219 port 52551 |
2019-10-11 22:39:44 |
197.56.223.97 | attackbots | Invalid user admin from 197.56.223.97 port 60875 |
2019-10-11 22:24:31 |
51.254.47.198 | attackbots | Invalid user admin from 51.254.47.198 port 39916 |
2019-10-11 22:18:14 |
106.12.125.27 | attack | Invalid user fm from 106.12.125.27 port 38844 |
2019-10-11 22:11:46 |
37.114.144.72 | attackbots | Invalid user admin from 37.114.144.72 port 44972 |
2019-10-11 22:39:28 |
121.178.60.41 | attack | Invalid user pi from 121.178.60.41 port 36100 |
2019-10-11 22:06:55 |