City: Dallas
Region: Texas
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.14.116.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55760
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.14.116.129. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022703 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 08:05:01 CST 2025
;; MSG SIZE rcvd: 107
129.116.14.104.in-addr.arpa domain name pointer 104-14-116-129.lightspeed.rcsntx.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
129.116.14.104.in-addr.arpa name = 104-14-116-129.lightspeed.rcsntx.sbcglobal.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 179.111.51.194 | attack | php WP PHPmyadamin ABUSE blocked for 12h |
2020-08-18 17:22:58 |
| 115.58.203.99 | attackbots | Unauthorised access (Aug 18) SRC=115.58.203.99 LEN=40 TTL=46 ID=50345 TCP DPT=8080 WINDOW=54996 SYN Unauthorised access (Aug 18) SRC=115.58.203.99 LEN=40 TTL=46 ID=30140 TCP DPT=8080 WINDOW=54996 SYN |
2020-08-18 17:15:36 |
| 104.248.62.182 | attackbotsspam | Aug 18 11:13:08 ip106 sshd[15939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.62.182 Aug 18 11:13:09 ip106 sshd[15939]: Failed password for invalid user bugzilla from 104.248.62.182 port 48636 ssh2 ... |
2020-08-18 17:17:14 |
| 49.88.112.114 | attackspambots | Aug 18 08:49:40 django-0 sshd[3091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114 user=root Aug 18 08:49:42 django-0 sshd[3091]: Failed password for root from 49.88.112.114 port 26699 ssh2 ... |
2020-08-18 17:03:01 |
| 45.95.168.172 | attackbots | Aug 18 10:53:22 marvibiene sshd[30813]: Failed password for root from 45.95.168.172 port 45710 ssh2 Aug 18 10:53:29 marvibiene sshd[30816]: Failed password for root from 45.95.168.172 port 56028 ssh2 |
2020-08-18 17:01:03 |
| 121.120.86.185 | attack | Unauthorised access (Aug 18) SRC=121.120.86.185 LEN=52 TOS=0x10 PREC=0x40 TTL=106 ID=9845 DF TCP DPT=445 WINDOW=8192 SYN |
2020-08-18 17:00:16 |
| 42.55.44.46 | attackbots | Unauthorised access (Aug 18) SRC=42.55.44.46 LEN=40 TTL=46 ID=39243 TCP DPT=8080 WINDOW=13452 SYN |
2020-08-18 16:48:33 |
| 127.0.0.1 | spambotsattackproxynormal | Informasi rinci |
2020-08-18 17:25:49 |
| 180.251.84.125 | attackspam | Automatic report - Port Scan Attack |
2020-08-18 17:15:57 |
| 31.146.103.17 | attackbots | Attempts against non-existent wp-login |
2020-08-18 17:23:29 |
| 118.24.11.226 | attack | 2020-08-18T00:27:01.238214linuxbox-skyline sshd[154435]: Invalid user konica from 118.24.11.226 port 53788 ... |
2020-08-18 17:09:18 |
| 75.162.181.111 | attackbotsspam | Scanner : /.well-known/security.txt |
2020-08-18 17:11:25 |
| 51.77.200.139 | attackbotsspam | 2020-08-18T03:32:15.7568391495-001 sshd[15034]: Invalid user djones from 51.77.200.139 port 57002 2020-08-18T03:32:17.0616651495-001 sshd[15034]: Failed password for invalid user djones from 51.77.200.139 port 57002 ssh2 2020-08-18T03:36:00.7135181495-001 sshd[15205]: Invalid user cs from 51.77.200.139 port 37194 2020-08-18T03:36:00.7208831495-001 sshd[15205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.ip-51-77-200.eu 2020-08-18T03:36:00.7135181495-001 sshd[15205]: Invalid user cs from 51.77.200.139 port 37194 2020-08-18T03:36:03.8221881495-001 sshd[15205]: Failed password for invalid user cs from 51.77.200.139 port 37194 ssh2 ... |
2020-08-18 17:06:23 |
| 124.89.2.42 | attackspam | Failed password for invalid user iphone from 124.89.2.42 port 2088 ssh2 |
2020-08-18 17:14:48 |
| 178.63.26.114 | attackbotsspam | 20 attempts against mh-misbehave-ban on pluto |
2020-08-18 16:49:06 |