City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.72.12.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16904
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.72.12.140. IN A
;; AUTHORITY SECTION:
. 440 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:20:15 CST 2023
;; MSG SIZE rcvd: 106
140.12.72.104.in-addr.arpa domain name pointer a104-72-12-140.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
140.12.72.104.in-addr.arpa name = a104-72-12-140.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
190.186.170.83 | attackbotsspam | 2020-08-20T23:28:35.374392vps773228.ovh.net sshd[17463]: Invalid user zimbra from 190.186.170.83 port 55670 2020-08-20T23:28:35.395315vps773228.ovh.net sshd[17463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.186.170.83 2020-08-20T23:28:35.374392vps773228.ovh.net sshd[17463]: Invalid user zimbra from 190.186.170.83 port 55670 2020-08-20T23:28:37.299670vps773228.ovh.net sshd[17463]: Failed password for invalid user zimbra from 190.186.170.83 port 55670 ssh2 2020-08-20T23:29:29.323412vps773228.ovh.net sshd[17479]: Invalid user ubuntu from 190.186.170.83 port 40028 ... |
2020-08-21 06:28:50 |
181.203.102.178 | attackspam | (ftpd) Failed FTP login from 181.203.102.178 (CL/Chile/181-203-102-178.bam.movistar.cl): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Aug 21 00:56:49 ir1 pure-ftpd: (?@181.203.102.178) [WARNING] Authentication failed for user [nazeranyekta] |
2020-08-21 06:41:53 |
103.26.136.173 | attackspambots | SSH Invalid Login |
2020-08-21 06:49:25 |
61.177.172.177 | attack | Aug 21 00:54:56 theomazars sshd[19026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.177 user=root Aug 21 00:54:59 theomazars sshd[19026]: Failed password for root from 61.177.172.177 port 50247 ssh2 |
2020-08-21 06:57:44 |
185.213.155.169 | attackspambots | Aug 20 23:58:52 vpn01 sshd[8573]: Failed password for root from 185.213.155.169 port 14507 ssh2 Aug 20 23:58:54 vpn01 sshd[8573]: Failed password for root from 185.213.155.169 port 14507 ssh2 ... |
2020-08-21 06:46:12 |
47.96.101.247 | attackspambots | (sshd) Failed SSH login from 47.96.101.247 (CN/China/-): 5 in the last 3600 secs |
2020-08-21 06:35:01 |
187.176.44.237 | attackbotsspam | Automatic report - Port Scan Attack |
2020-08-21 06:23:57 |
80.130.39.175 | attackbotsspam | Automatic report - Port Scan Attack |
2020-08-21 06:44:18 |
222.186.175.182 | attackbotsspam | Aug 21 00:44:45 theomazars sshd[18884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182 user=root Aug 21 00:44:48 theomazars sshd[18884]: Failed password for root from 222.186.175.182 port 12380 ssh2 |
2020-08-21 06:45:55 |
167.71.38.104 | attack | Aug 20 17:56:23 firewall sshd[32482]: Failed password for invalid user postgres from 167.71.38.104 port 47940 ssh2 Aug 20 18:02:12 firewall sshd[32636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.38.104 user=root Aug 20 18:02:14 firewall sshd[32636]: Failed password for root from 167.71.38.104 port 56778 ssh2 ... |
2020-08-21 06:24:26 |
68.183.82.166 | attackspam | 2020-08-20T17:34:40.1936541495-001 sshd[599]: Invalid user jupyter from 68.183.82.166 port 41796 2020-08-20T17:34:41.8772951495-001 sshd[599]: Failed password for invalid user jupyter from 68.183.82.166 port 41796 ssh2 2020-08-20T17:39:59.1112261495-001 sshd[978]: Invalid user daniel from 68.183.82.166 port 49172 2020-08-20T17:39:59.1150421495-001 sshd[978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.82.166 2020-08-20T17:39:59.1112261495-001 sshd[978]: Invalid user daniel from 68.183.82.166 port 49172 2020-08-20T17:40:01.2562451495-001 sshd[978]: Failed password for invalid user daniel from 68.183.82.166 port 49172 ssh2 ... |
2020-08-21 06:34:17 |
14.225.17.9 | attackspambots | SSH brute-force attempt |
2020-08-21 06:36:16 |
93.174.95.106 | attack |
|
2020-08-21 06:48:10 |
134.122.134.228 | attackspambots | Invalid user admin from 134.122.134.228 port 44610 |
2020-08-21 06:26:29 |
223.247.194.119 | attackbots | leo_www |
2020-08-21 06:30:26 |