City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.70.187.254
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50170
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.70.187.254. IN A
;; AUTHORITY SECTION:
. 376 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:19:04 CST 2023
;; MSG SIZE rcvd: 107
254.187.70.104.in-addr.arpa domain name pointer a104-70-187-254.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
254.187.70.104.in-addr.arpa name = a104-70-187-254.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
216.126.238.79 | attackbotsspam | Zippyloan from@getoffer.casa Pay your debts. Borrow up to $35,000 Need cash? Borrow up to $35,000 with a personal loan as Soon as Tomorrow http://getoffer.casa/t?v |
2020-01-02 07:46:34 |
132.145.166.31 | attack | $f2bV_matches |
2020-01-02 07:35:31 |
182.61.176.53 | attackspam | 2020-01-01T23:15:59.718748abusebot-7.cloudsearch.cf sshd[27705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.176.53 user=root 2020-01-01T23:16:01.681281abusebot-7.cloudsearch.cf sshd[27705]: Failed password for root from 182.61.176.53 port 52394 ssh2 2020-01-01T23:19:15.137684abusebot-7.cloudsearch.cf sshd[27870]: Invalid user infancy from 182.61.176.53 port 55412 2020-01-01T23:19:15.142442abusebot-7.cloudsearch.cf sshd[27870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.176.53 2020-01-01T23:19:15.137684abusebot-7.cloudsearch.cf sshd[27870]: Invalid user infancy from 182.61.176.53 port 55412 2020-01-01T23:19:17.009941abusebot-7.cloudsearch.cf sshd[27870]: Failed password for invalid user infancy from 182.61.176.53 port 55412 ssh2 2020-01-01T23:22:41.214847abusebot-7.cloudsearch.cf sshd[28042]: Invalid user scamurra from 182.61.176.53 port 58438 ... |
2020-01-02 07:57:09 |
106.13.53.173 | attack | SSH authentication failure x 6 reported by Fail2Ban ... |
2020-01-02 07:49:52 |
200.37.97.194 | attack | Jan 1 22:37:51 raspberrypi sshd\[9826\]: Invalid user mufinella from 200.37.97.194Jan 1 22:37:53 raspberrypi sshd\[9826\]: Failed password for invalid user mufinella from 200.37.97.194 port 51862 ssh2Jan 1 22:53:54 raspberrypi sshd\[10349\]: Invalid user callise from 200.37.97.194 ... |
2020-01-02 07:29:45 |
106.13.195.84 | attack | $f2bV_matches |
2020-01-02 07:48:10 |
222.186.175.167 | attackbots | Jan 2 00:38:43 MK-Soft-Root1 sshd[2482]: Failed password for root from 222.186.175.167 port 36788 ssh2 Jan 2 00:38:47 MK-Soft-Root1 sshd[2482]: Failed password for root from 222.186.175.167 port 36788 ssh2 ... |
2020-01-02 07:42:30 |
139.199.248.153 | attackspambots | Jan 1 22:53:40 marvibiene sshd[9952]: Invalid user aristide from 139.199.248.153 port 45042 Jan 1 22:53:40 marvibiene sshd[9952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.248.153 Jan 1 22:53:40 marvibiene sshd[9952]: Invalid user aristide from 139.199.248.153 port 45042 Jan 1 22:53:42 marvibiene sshd[9952]: Failed password for invalid user aristide from 139.199.248.153 port 45042 ssh2 ... |
2020-01-02 07:38:22 |
220.85.104.202 | attackbotsspam | Jan 1 23:50:30 haigwepa sshd[30550]: Failed password for root from 220.85.104.202 port 6027 ssh2 ... |
2020-01-02 07:59:15 |
47.246.24.131 | attack | Portscan or hack attempt detected by psad/fwsnort |
2020-01-02 07:50:14 |
194.28.71.45 | attackspam | Automatic report - Banned IP Access |
2020-01-02 07:58:55 |
222.186.31.144 | attackbots | Jan 2 00:47:46 MK-Soft-VM4 sshd[31181]: Failed password for root from 222.186.31.144 port 50044 ssh2 Jan 2 00:47:47 MK-Soft-VM4 sshd[31181]: Failed password for root from 222.186.31.144 port 50044 ssh2 ... |
2020-01-02 07:47:54 |
112.206.225.82 | attack | Invalid user nasharae from 112.206.225.82 port 34961 |
2020-01-02 07:37:05 |
45.136.110.26 | attack | firewall-block, port(s): 6389/tcp |
2020-01-02 07:24:20 |
125.90.175.66 | attackbotsspam | 01.01.2020 23:02:08 Connection to port 1666 blocked by firewall |
2020-01-02 07:36:42 |