City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: Akamai Technologies, Inc.
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.72.97.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2556
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.72.97.30. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019062400 1800 900 604800 86400
;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jun 24 23:22:24 CST 2019
;; MSG SIZE rcvd: 116
30.97.72.104.in-addr.arpa domain name pointer a104-72-97-30.deploy.static.akamaitechnologies.com.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
30.97.72.104.in-addr.arpa name = a104-72-97-30.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 41.37.167.197 | attackspambots | Honeypot attack, port: 23, PTR: host-41.37.167.197.tedata.net. |
2019-08-09 18:13:33 |
| 41.236.182.29 | attackspam | : |
2019-08-09 18:25:29 |
| 122.104.45.251 | attackspam | 23/tcp [2019-08-09]1pkt |
2019-08-09 17:55:12 |
| 191.176.64.128 | attackbotsspam | Aug 9 09:00:43 lnxweb61 sshd[20830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.176.64.128 |
2019-08-09 18:42:19 |
| 128.71.120.55 | attackspam | Honeypot attack, port: 23, PTR: 128-71-120-55.broadband.corbina.ru. |
2019-08-09 18:32:25 |
| 185.100.85.101 | attack | Brute Force Joomla Admin Login |
2019-08-09 17:57:10 |
| 118.185.40.66 | attack | Honeypot hit. |
2019-08-09 18:39:41 |
| 182.50.151.54 | attackspam | xmlrpc attack |
2019-08-09 18:04:43 |
| 213.154.3.2 | attackspambots | Unauthorized connection attempt from IP address 213.154.3.2 on Port 445(SMB) |
2019-08-09 18:32:02 |
| 36.27.214.155 | attackbots | " " |
2019-08-09 18:10:53 |
| 49.207.33.2 | attackbotsspam | Aug 9 11:36:39 dedicated sshd[15981]: Invalid user proffice from 49.207.33.2 port 45022 |
2019-08-09 17:53:32 |
| 116.96.226.59 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2019-08-09 18:22:17 |
| 185.66.230.248 | attackbotsspam | Port scan and direct access per IP instead of hostname |
2019-08-09 18:42:53 |
| 103.65.182.29 | attack | Aug 9 12:42:37 yabzik sshd[9443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.65.182.29 Aug 9 12:42:40 yabzik sshd[9443]: Failed password for invalid user jules from 103.65.182.29 port 35817 ssh2 Aug 9 12:48:15 yabzik sshd[11084]: Failed password for root from 103.65.182.29 port 58328 ssh2 |
2019-08-09 17:54:38 |
| 202.62.45.53 | attackbotsspam | Port scan and direct access per IP instead of hostname |
2019-08-09 18:26:36 |