City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.127.34.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16775
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.127.34.249. IN A
;; AUTHORITY SECTION:
. 549 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020070401 1800 900 604800 86400
;; Query time: 131 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jul 05 05:12:04 CST 2020
;; MSG SIZE rcvd: 118
249.34.127.104.in-addr.arpa domain name pointer a104-127-34-249.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
249.34.127.104.in-addr.arpa name = a104-127-34-249.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
80.252.144.158 | attackspam | 23/tcp 23/tcp [2019-06-13/08-11]2pkt |
2019-08-11 20:25:59 |
210.212.205.34 | attackbotsspam | Aug 11 14:02:11 SilenceServices sshd[19886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.212.205.34 Aug 11 14:02:13 SilenceServices sshd[19886]: Failed password for invalid user 80tras from 210.212.205.34 port 57368 ssh2 Aug 11 14:04:02 SilenceServices sshd[21254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.212.205.34 |
2019-08-11 20:15:52 |
51.77.141.158 | attackspambots | Aug 11 12:15:21 localhost sshd\[66502\]: Invalid user jamy from 51.77.141.158 port 60279 Aug 11 12:15:21 localhost sshd\[66502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.141.158 Aug 11 12:15:24 localhost sshd\[66502\]: Failed password for invalid user jamy from 51.77.141.158 port 60279 ssh2 Aug 11 12:19:36 localhost sshd\[66637\]: Invalid user tucker from 51.77.141.158 port 57048 Aug 11 12:19:36 localhost sshd\[66637\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.141.158 ... |
2019-08-11 20:37:46 |
182.69.62.223 | attack | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-11 06:35:06,218 INFO [amun_request_handler] PortScan Detected on Port: 445 (182.69.62.223) |
2019-08-11 20:25:35 |
112.85.42.178 | attackbots | SSH Brute-Force attacks |
2019-08-11 20:04:54 |
77.40.62.120 | attackspam | 2019-08-11T09:48:59.307426MailD postfix/smtpd[12283]: warning: unknown[77.40.62.120]: SASL LOGIN authentication failed: authentication failure 2019-08-11T09:49:15.891845MailD postfix/smtpd[12283]: warning: unknown[77.40.62.120]: SASL LOGIN authentication failed: authentication failure 2019-08-11T10:21:44.605192MailD postfix/smtpd[15158]: warning: unknown[77.40.62.120]: SASL LOGIN authentication failed: authentication failure |
2019-08-11 20:34:47 |
51.158.101.121 | attackbotsspam | 2019-08-11T12:17:37.828421abusebot-2.cloudsearch.cf sshd\[31637\]: Invalid user guinness123 from 51.158.101.121 port 46298 |
2019-08-11 20:39:01 |
85.185.95.130 | attackbots | 445/tcp 445/tcp [2019-08-04/11]2pkt |
2019-08-11 20:28:05 |
174.138.26.48 | attackspam | Aug 11 14:32:47 vps691689 sshd[16630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.26.48 Aug 11 14:32:49 vps691689 sshd[16630]: Failed password for invalid user clock from 174.138.26.48 port 57288 ssh2 ... |
2019-08-11 20:40:10 |
128.199.222.43 | attackspam | Aug 11 08:51:29 mail sshd\[23605\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.222.43 user=root Aug 11 08:51:31 mail sshd\[23605\]: Failed password for root from 128.199.222.43 port 35946 ssh2 ... |
2019-08-11 20:33:13 |
120.132.117.254 | attackbotsspam | Aug 11 06:00:55 plusreed sshd[3824]: Invalid user puma from 120.132.117.254 ... |
2019-08-11 20:47:15 |
201.105.20.219 | attackbots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-11 06:38:50,408 INFO [amun_request_handler] PortScan Detected on Port: 445 (201.105.20.219) |
2019-08-11 20:04:35 |
58.219.161.103 | attackspam | Automatic report - Port Scan Attack |
2019-08-11 20:27:29 |
80.151.229.8 | attackspambots | Aug 11 11:43:16 MK-Soft-VM4 sshd\[24544\]: Invalid user ftpuser from 80.151.229.8 port 31853 Aug 11 11:43:16 MK-Soft-VM4 sshd\[24544\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.151.229.8 Aug 11 11:43:17 MK-Soft-VM4 sshd\[24544\]: Failed password for invalid user ftpuser from 80.151.229.8 port 31853 ssh2 ... |
2019-08-11 20:21:48 |
185.176.27.54 | attackbots | Port scan on 9 port(s): 3476 3481 3582 3819 3888 4068 4130 4135 4181 |
2019-08-11 20:08:50 |