City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.70.51.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56849
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.70.51.42. IN A
;; AUTHORITY SECTION:
. 386 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022031701 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 18 07:42:35 CST 2022
;; MSG SIZE rcvd: 105
42.51.70.104.in-addr.arpa domain name pointer a104-70-51-42.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
42.51.70.104.in-addr.arpa name = a104-70-51-42.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
91.134.227.180 | attack | $f2bV_matches |
2019-09-21 17:17:17 |
206.189.221.160 | attack | Sep 21 10:40:13 mail sshd\[23381\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.221.160 Sep 21 10:40:15 mail sshd\[23381\]: Failed password for invalid user oracle from 206.189.221.160 port 53002 ssh2 Sep 21 10:44:16 mail sshd\[23756\]: Invalid user pranit from 206.189.221.160 port 37216 Sep 21 10:44:16 mail sshd\[23756\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.221.160 Sep 21 10:44:18 mail sshd\[23756\]: Failed password for invalid user pranit from 206.189.221.160 port 37216 ssh2 |
2019-09-21 16:52:12 |
104.154.50.149 | attackbotsspam | Sep 20 19:09:29 friendsofhawaii sshd\[20689\]: Invalid user testing from 104.154.50.149 Sep 20 19:09:29 friendsofhawaii sshd\[20689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.50.154.104.bc.googleusercontent.com Sep 20 19:09:31 friendsofhawaii sshd\[20689\]: Failed password for invalid user testing from 104.154.50.149 port 48984 ssh2 Sep 20 19:13:52 friendsofhawaii sshd\[21064\]: Invalid user noemi from 104.154.50.149 Sep 20 19:13:52 friendsofhawaii sshd\[21064\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.50.154.104.bc.googleusercontent.com |
2019-09-21 17:19:56 |
165.227.96.190 | attackbots | Sep 21 07:32:33 mail sshd\[559\]: Failed password for invalid user sau from 165.227.96.190 port 50772 ssh2 Sep 21 07:36:17 mail sshd\[967\]: Invalid user password123 from 165.227.96.190 port 35162 Sep 21 07:36:17 mail sshd\[967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.96.190 Sep 21 07:36:19 mail sshd\[967\]: Failed password for invalid user password123 from 165.227.96.190 port 35162 ssh2 Sep 21 07:40:02 mail sshd\[1505\]: Invalid user 123 from 165.227.96.190 port 47944 |
2019-09-21 16:52:50 |
222.186.42.241 | attackspambots | Sep 21 16:20:59 lcl-usvr-02 sshd[23943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.241 user=root Sep 21 16:21:00 lcl-usvr-02 sshd[23943]: Failed password for root from 222.186.42.241 port 39762 ssh2 ... |
2019-09-21 17:21:55 |
51.83.41.76 | attack | Invalid user www2 from 51.83.41.76 port 52390 |
2019-09-21 16:40:06 |
118.127.10.152 | attack | Sep 21 08:56:11 mail sshd\[10422\]: Invalid user nuan from 118.127.10.152 port 44731 Sep 21 08:56:11 mail sshd\[10422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.127.10.152 Sep 21 08:56:13 mail sshd\[10422\]: Failed password for invalid user nuan from 118.127.10.152 port 44731 ssh2 Sep 21 09:01:45 mail sshd\[11527\]: Invalid user notes from 118.127.10.152 port 37782 Sep 21 09:01:45 mail sshd\[11527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.127.10.152 |
2019-09-21 16:54:11 |
222.186.31.136 | attack | 2019-09-21T16:02:50.054071enmeeting.mahidol.ac.th sshd\[1871\]: User root from 222.186.31.136 not allowed because not listed in AllowUsers 2019-09-21T16:02:50.440635enmeeting.mahidol.ac.th sshd\[1871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.136 user=root 2019-09-21T16:02:51.759287enmeeting.mahidol.ac.th sshd\[1871\]: Failed password for invalid user root from 222.186.31.136 port 53493 ssh2 ... |
2019-09-21 17:06:07 |
36.75.143.7 | attackspambots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-21 02:48:35,686 INFO [shellcode_manager] (36.75.143.7) no match, writing hexdump (35704429de1a799830ba341ec6e055d0 :132) - SMB (Unknown) Vulnerability |
2019-09-21 17:16:33 |
170.233.45.249 | attackspambots | port scan and connect, tcp 80 (http) |
2019-09-21 17:22:43 |
117.7.200.15 | attackbotsspam | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-21 02:52:17,674 INFO [amun_request_handler] PortScan Detected on Port: 445 (117.7.200.15) |
2019-09-21 17:21:32 |
148.66.142.18 | attack | Trying: /wordpress/wp-login.php |
2019-09-21 16:57:54 |
61.37.82.220 | attackbots | Sep 21 08:41:54 hcbbdb sshd\[1347\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.37.82.220 user=root Sep 21 08:41:56 hcbbdb sshd\[1347\]: Failed password for root from 61.37.82.220 port 48842 ssh2 Sep 21 08:46:21 hcbbdb sshd\[1867\]: Invalid user chaylock from 61.37.82.220 Sep 21 08:46:21 hcbbdb sshd\[1867\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.37.82.220 Sep 21 08:46:23 hcbbdb sshd\[1867\]: Failed password for invalid user chaylock from 61.37.82.220 port 33612 ssh2 |
2019-09-21 16:55:35 |
156.210.96.130 | attack | Sep 21 05:51:06 dev sshd\[6088\]: Invalid user admin from 156.210.96.130 port 56445 Sep 21 05:51:06 dev sshd\[6088\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.210.96.130 Sep 21 05:51:07 dev sshd\[6088\]: Failed password for invalid user admin from 156.210.96.130 port 56445 ssh2 |
2019-09-21 16:40:54 |
124.204.36.138 | attack | Sep 21 05:50:56 vmd17057 sshd\[18720\]: Invalid user jira from 124.204.36.138 port 32875 Sep 21 05:50:56 vmd17057 sshd\[18720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.204.36.138 Sep 21 05:50:59 vmd17057 sshd\[18720\]: Failed password for invalid user jira from 124.204.36.138 port 32875 ssh2 ... |
2019-09-21 16:51:38 |