City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.75.150.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15573
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.75.150.239. IN A
;; AUTHORITY SECTION:
. 526 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400
;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:21:16 CST 2023
;; MSG SIZE rcvd: 107
239.150.75.104.in-addr.arpa domain name pointer a104-75-150-239.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
239.150.75.104.in-addr.arpa name = a104-75-150-239.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 103.21.218.242 | attackbots | Invalid user kyle from 103.21.218.242 port 44220 |
2019-08-23 21:15:04 |
| 1.209.171.64 | attack | Aug 23 09:22:18 debian sshd\[5892\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.209.171.64 user=root Aug 23 09:22:20 debian sshd\[5892\]: Failed password for root from 1.209.171.64 port 41244 ssh2 Aug 23 09:28:08 debian sshd\[5937\]: Invalid user tester from 1.209.171.64 port 59098 Aug 23 09:28:08 debian sshd\[5937\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.209.171.64 ... |
2019-08-23 21:48:39 |
| 34.80.133.2 | attack | Invalid user san from 34.80.133.2 port 48596 |
2019-08-23 21:40:36 |
| 121.157.82.218 | attackspambots | Invalid user linux from 121.157.82.218 port 53254 |
2019-08-23 21:01:02 |
| 171.34.113.122 | attack | Invalid user admin from 171.34.113.122 port 50554 |
2019-08-23 20:45:43 |
| 37.114.142.15 | attackbotsspam | Invalid user admin from 37.114.142.15 port 34857 |
2019-08-23 21:37:56 |
| 197.251.187.190 | attackbots | Invalid user admin from 197.251.187.190 port 54680 |
2019-08-23 21:55:44 |
| 51.38.162.232 | attack | $f2bV_matches |
2019-08-23 21:28:07 |
| 159.226.5.101 | attackbotsspam | Invalid user gemma from 159.226.5.101 port 50044 |
2019-08-23 20:49:55 |
| 113.178.92.18 | attackspambots | Invalid user admin from 113.178.92.18 port 40927 |
2019-08-23 21:07:51 |
| 167.71.242.26 | attack | Invalid user oracle from 167.71.242.26 port 57266 |
2019-08-23 20:46:10 |
| 31.208.65.235 | attack | Aug 23 03:22:18 aiointranet sshd\[12128\]: Invalid user postgres from 31.208.65.235 Aug 23 03:22:18 aiointranet sshd\[12128\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31-208-65-235.cust.bredband2.com Aug 23 03:22:20 aiointranet sshd\[12128\]: Failed password for invalid user postgres from 31.208.65.235 port 34262 ssh2 Aug 23 03:26:29 aiointranet sshd\[12529\]: Invalid user pim from 31.208.65.235 Aug 23 03:26:29 aiointranet sshd\[12529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31-208-65-235.cust.bredband2.com |
2019-08-23 21:41:03 |
| 197.49.37.162 | attack | Invalid user admin from 197.49.37.162 port 57850 |
2019-08-23 21:58:20 |
| 41.84.228.65 | attackbotsspam | Aug 23 14:34:17 XXX sshd[26076]: Invalid user ts3sleep from 41.84.228.65 port 43792 |
2019-08-23 21:32:47 |
| 159.89.204.28 | attackbotsspam | Invalid user sham from 159.89.204.28 port 39574 |
2019-08-23 20:50:21 |