City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.78.49.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18182
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.78.49.118. IN A
;; AUTHORITY SECTION:
. 230 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:30:40 CST 2023
;; MSG SIZE rcvd: 106
118.49.78.104.in-addr.arpa domain name pointer a104-78-49-118.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
118.49.78.104.in-addr.arpa name = a104-78-49-118.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
64.139.73.170 | attackbots | Apr 6 12:11:58 host5 sshd[26638]: Invalid user pi from 64.139.73.170 port 54018 ... |
2020-04-06 19:03:03 |
192.99.56.117 | attackspam | Apr 6 11:04:50 legacy sshd[12217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.56.117 Apr 6 11:04:51 legacy sshd[12217]: Failed password for invalid user test7 from 192.99.56.117 port 59276 ssh2 Apr 6 11:07:07 legacy sshd[12254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.56.117 ... |
2020-04-06 18:50:31 |
212.64.71.132 | attack | Apr 6 06:48:12 vps647732 sshd[18269]: Failed password for root from 212.64.71.132 port 39576 ssh2 ... |
2020-04-06 19:03:26 |
191.237.251.21 | attack | Apr 6 05:42:02 vpn01 sshd[28649]: Failed password for root from 191.237.251.21 port 54176 ssh2 ... |
2020-04-06 18:50:47 |
206.189.172.90 | attackspam | fail2ban/Apr 6 12:03:45 h1962932 sshd[7076]: Invalid user sales from 206.189.172.90 port 50054 Apr 6 12:03:45 h1962932 sshd[7076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.172.90 Apr 6 12:03:45 h1962932 sshd[7076]: Invalid user sales from 206.189.172.90 port 50054 Apr 6 12:03:47 h1962932 sshd[7076]: Failed password for invalid user sales from 206.189.172.90 port 50054 ssh2 Apr 6 12:05:34 h1962932 sshd[7146]: Invalid user ubuntu from 206.189.172.90 port 41896 |
2020-04-06 18:30:02 |
196.219.235.84 | attackbots | [portscan] tcp/23 [TELNET] *(RWIN=19346)(04061133) |
2020-04-06 18:31:06 |
167.172.234.64 | attackspam | Apr 6 09:27:48 gw1 sshd[11029]: Failed password for root from 167.172.234.64 port 42582 ssh2 ... |
2020-04-06 19:12:32 |
180.247.59.138 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 06-04-2020 04:50:14. |
2020-04-06 18:32:13 |
209.97.160.105 | attackspambots | Apr 6 12:40:22 vps647732 sshd[24766]: Failed password for root from 209.97.160.105 port 31098 ssh2 ... |
2020-04-06 18:49:49 |
14.161.16.198 | attackbots | Attempt to attack host OS, exploiting network vulnerabilities, on 06-04-2020 04:50:13. |
2020-04-06 18:33:55 |
49.51.50.208 | attackbotsspam | firewall-block, port(s): 5001/tcp |
2020-04-06 18:44:51 |
49.235.81.116 | attack | Apr 6 05:46:51 hell sshd[16626]: Failed password for root from 49.235.81.116 port 47704 ssh2 ... |
2020-04-06 18:52:17 |
176.113.115.43 | attackspambots | Apr 6 06:15:24 debian-2gb-nbg1-2 kernel: \[8405551.694106\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=176.113.115.43 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=44853 PROTO=TCP SPT=46563 DPT=3390 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-04-06 18:30:17 |
49.235.119.32 | attackbots | firewall-block, port(s): 2004/tcp |
2020-04-06 18:43:32 |
187.35.91.198 | attackspam | Apr 6 11:40:29 vps sshd[30728]: Failed password for root from 187.35.91.198 port 7873 ssh2 Apr 6 11:44:57 vps sshd[30890]: Failed password for root from 187.35.91.198 port 18497 ssh2 ... |
2020-04-06 18:58:18 |