City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.66.108.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38740
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.66.108.69. IN A
;; AUTHORITY SECTION:
. 358 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030700 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 07 19:13:31 CST 2022
;; MSG SIZE rcvd: 106
69.108.66.104.in-addr.arpa domain name pointer a104-66-108-69.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
69.108.66.104.in-addr.arpa name = a104-66-108-69.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
160.153.234.236 | attack | Sep 4 15:59:23 mail sshd\[17487\]: Failed password for invalid user eu from 160.153.234.236 port 50980 ssh2 Sep 4 16:15:41 mail sshd\[17918\]: Invalid user beothy from 160.153.234.236 port 34966 Sep 4 16:15:41 mail sshd\[17918\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.153.234.236 ... |
2019-09-05 05:24:44 |
149.202.97.154 | attack | Sending SPAM email |
2019-09-05 04:50:37 |
68.183.179.142 | attackspambots | Sep 3 03:28:46 itv-usvr-01 sshd[31947]: Invalid user test1 from 68.183.179.142 Sep 3 03:28:46 itv-usvr-01 sshd[31947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.179.142 Sep 3 03:28:46 itv-usvr-01 sshd[31947]: Invalid user test1 from 68.183.179.142 Sep 3 03:28:49 itv-usvr-01 sshd[31947]: Failed password for invalid user test1 from 68.183.179.142 port 48490 ssh2 Sep 3 03:33:08 itv-usvr-01 sshd[32123]: Invalid user hr from 68.183.179.142 |
2019-09-05 05:14:20 |
165.227.93.58 | attack | Sep 4 21:50:42 rotator sshd\[21513\]: Invalid user sammy from 165.227.93.58Sep 4 21:50:44 rotator sshd\[21513\]: Failed password for invalid user sammy from 165.227.93.58 port 54082 ssh2Sep 4 21:55:09 rotator sshd\[21710\]: Invalid user caleb from 165.227.93.58Sep 4 21:55:10 rotator sshd\[21710\]: Failed password for invalid user caleb from 165.227.93.58 port 41290 ssh2Sep 4 21:59:30 rotator sshd\[22354\]: Invalid user vbox from 165.227.93.58Sep 4 21:59:32 rotator sshd\[22354\]: Failed password for invalid user vbox from 165.227.93.58 port 56738 ssh2 ... |
2019-09-05 05:29:45 |
212.64.28.102 | attackbots | Automated reporting of port scanning |
2019-09-05 05:25:05 |
132.232.99.16 | attackspambots | Sep 4 22:07:20 eventyay sshd[15115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.99.16 Sep 4 22:07:22 eventyay sshd[15115]: Failed password for invalid user cacti from 132.232.99.16 port 53474 ssh2 Sep 4 22:12:02 eventyay sshd[15198]: Failed password for root from 132.232.99.16 port 41076 ssh2 ... |
2019-09-05 05:12:16 |
202.42.100.26 | attack | Unauthorized connection attempt from IP address 202.42.100.26 on Port 445(SMB) |
2019-09-05 05:19:42 |
111.230.247.243 | attackspambots | Sep 4 21:01:50 eventyay sshd[13559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.247.243 Sep 4 21:01:53 eventyay sshd[13559]: Failed password for invalid user isaac from 111.230.247.243 port 50795 ssh2 Sep 4 21:05:27 eventyay sshd[13647]: Failed password for root from 111.230.247.243 port 37995 ssh2 ... |
2019-09-05 04:48:11 |
118.24.143.233 | attackspambots | Sep 4 05:43:03 web9 sshd\[25077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.143.233 user=root Sep 4 05:43:05 web9 sshd\[25077\]: Failed password for root from 118.24.143.233 port 33716 ssh2 Sep 4 05:49:19 web9 sshd\[26544\]: Invalid user test from 118.24.143.233 Sep 4 05:49:19 web9 sshd\[26544\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.143.233 Sep 4 05:49:21 web9 sshd\[26544\]: Failed password for invalid user test from 118.24.143.233 port 55629 ssh2 |
2019-09-05 05:18:26 |
121.131.119.155 | attackbots | Fail2Ban - FTP Abuse Attempt |
2019-09-05 05:04:15 |
157.245.97.156 | attackbots | port scan and connect, tcp 23 (telnet) |
2019-09-05 05:09:44 |
218.98.26.173 | attackspambots | Sep 4 06:10:15 debian sshd[24462]: Unable to negotiate with 218.98.26.173 port 15396: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Sep 4 16:28:38 debian sshd[22424]: Unable to negotiate with 218.98.26.173 port 49794: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] ... |
2019-09-05 04:50:10 |
183.197.223.253 | attackbotsspam | Automated reporting of port scanning |
2019-09-05 05:28:11 |
51.77.214.180 | attackbotsspam | Sep 4 22:42:19 server sshd[43715]: Failed password for root from 51.77.214.180 port 48474 ssh2 Sep 4 22:42:46 server sshd[43825]: Failed password for root from 51.77.214.180 port 43656 ssh2 Sep 4 22:43:11 server sshd[43931]: Failed password for root from 51.77.214.180 port 38842 ssh2 |
2019-09-05 04:49:53 |
190.98.228.54 | attackbots | Sep 4 20:23:45 hcbbdb sshd\[8408\]: Invalid user git from 190.98.228.54 Sep 4 20:23:45 hcbbdb sshd\[8408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.98.228.54 Sep 4 20:23:47 hcbbdb sshd\[8408\]: Failed password for invalid user git from 190.98.228.54 port 46782 ssh2 Sep 4 20:29:25 hcbbdb sshd\[8976\]: Invalid user admin from 190.98.228.54 Sep 4 20:29:25 hcbbdb sshd\[8976\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.98.228.54 |
2019-09-05 04:44:25 |