City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.78.96.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37548
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.78.96.11. IN A
;; AUTHORITY SECTION:
. 339 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400
;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:30:40 CST 2023
;; MSG SIZE rcvd: 105
11.96.78.104.in-addr.arpa domain name pointer a104-78-96-11.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
11.96.78.104.in-addr.arpa name = a104-78-96-11.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 35.189.172.158 | attackbots | Feb 12 16:58:22 ns382633 sshd\[27629\]: Invalid user minecraft from 35.189.172.158 port 60202 Feb 12 16:58:22 ns382633 sshd\[27629\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.189.172.158 Feb 12 16:58:24 ns382633 sshd\[27629\]: Failed password for invalid user minecraft from 35.189.172.158 port 60202 ssh2 Feb 12 17:03:18 ns382633 sshd\[28499\]: Invalid user ahl from 35.189.172.158 port 59974 Feb 12 17:03:18 ns382633 sshd\[28499\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.189.172.158 |
2020-02-13 02:41:42 |
| 113.160.221.73 | attack | SSH/22 MH Probe, BF, Hack - |
2020-02-13 02:59:25 |
| 92.63.194.105 | attackbotsspam | Feb 12 20:02:30 vps691689 sshd[18925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.105 Feb 12 20:02:32 vps691689 sshd[18925]: Failed password for invalid user admin from 92.63.194.105 port 41997 ssh2 ... |
2020-02-13 03:04:19 |
| 14.186.144.52 | spam | postfix/smtpd client=unknown[14.186.144.52], sasl_method=PLAIN, sasl_username= |
2020-02-13 03:11:47 |
| 171.207.67.77 | attackspam | Feb 12 14:39:35 server378 sshd[18211]: Invalid user pmail from 171.207.67.77 Feb 12 14:39:35 server378 sshd[18211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.207.67.77 Feb 12 14:39:38 server378 sshd[18211]: Failed password for invalid user pmail from 171.207.67.77 port 50636 ssh2 Feb 12 14:39:38 server378 sshd[18211]: Received disconnect from 171.207.67.77: 11: Bye Bye [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=171.207.67.77 |
2020-02-13 02:40:38 |
| 148.70.94.56 | attackspambots | Invalid user zdenkatopicova from 148.70.94.56 port 46946 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.94.56 Failed password for invalid user zdenkatopicova from 148.70.94.56 port 46946 ssh2 Invalid user 123456 from 148.70.94.56 port 44824 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.94.56 |
2020-02-13 02:56:08 |
| 172.105.94.201 | attackspambots | SSH-bruteforce attempts |
2020-02-13 03:07:00 |
| 58.182.153.211 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-13 03:25:29 |
| 90.3.194.84 | attackbots | Feb 12 14:42:23 jane sshd[31122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.3.194.84 ... |
2020-02-13 02:39:00 |
| 110.93.247.108 | attackbotsspam | Unauthorized connection attempt from IP address 110.93.247.108 on Port 445(SMB) |
2020-02-13 02:42:15 |
| 92.63.194.106 | attack | Feb 12 19:58:34 OPSO sshd\[696\]: Invalid user user from 92.63.194.106 port 42855 Feb 12 19:58:34 OPSO sshd\[696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.106 Feb 12 19:58:36 OPSO sshd\[696\]: Failed password for invalid user user from 92.63.194.106 port 42855 ssh2 Feb 12 19:58:50 OPSO sshd\[782\]: Invalid user user from 92.63.194.106 port 33899 Feb 12 19:58:50 OPSO sshd\[782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.106 |
2020-02-13 03:01:49 |
| 220.134.9.210 | attack | Unauthorized connection attempt detected from IP address 220.134.9.210 to port 445 |
2020-02-13 03:04:32 |
| 113.54.156.52 | attack | SSH login attempts brute force. |
2020-02-13 02:35:55 |
| 14.29.215.5 | attack | 2020-02-12T08:42:17.432569linuxbox sshd[5388]: Invalid user rober from 14.29.215.5 port 48956 ... |
2020-02-13 03:13:14 |
| 193.188.22.193 | attackbots | firewall-block, port(s): 8122/tcp |
2020-02-13 02:39:52 |