City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.84.230.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17284
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.84.230.142. IN A
;; AUTHORITY SECTION:
. 595 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400
;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:32:42 CST 2023
;; MSG SIZE rcvd: 107
142.230.84.104.in-addr.arpa domain name pointer a104-84-230-142.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
142.230.84.104.in-addr.arpa name = a104-84-230-142.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
50.244.25.90 | attackbotsspam | " " |
2020-08-04 07:28:57 |
117.34.99.31 | attack | Aug 3 23:02:04 *** sshd[8695]: User root from 117.34.99.31 not allowed because not listed in AllowUsers |
2020-08-04 07:08:31 |
88.130.152.115 | attack | Brute forcing email accounts |
2020-08-04 07:32:07 |
160.34.8.163 | attackbots | srv.marc-hoffrichter.de:443 160.34.8.163 - - [03/Aug/2020:22:34:03 +0200] "GET / HTTP/1.1" 403 4836 "-" "Go-http-client/1.1" |
2020-08-04 07:35:19 |
177.9.246.31 | attackbotsspam | Telnet Server BruteForce Attack |
2020-08-04 07:15:30 |
210.105.82.53 | attackspam | 2020-08-03T22:33:07.430787+02:00 |
2020-08-04 07:30:00 |
172.93.160.106 | attackspam | 172.93.160.106 10010@wo.cn |
2020-08-04 07:10:48 |
91.143.87.59 | attackspam | hacking attempt |
2020-08-04 07:19:15 |
58.102.31.36 | attackspam | Aug 3 20:24:46 localhost sshd[6756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.102.31.36 user=root Aug 3 20:24:48 localhost sshd[6756]: Failed password for root from 58.102.31.36 port 47014 ssh2 Aug 3 20:29:27 localhost sshd[7329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.102.31.36 user=root Aug 3 20:29:29 localhost sshd[7329]: Failed password for root from 58.102.31.36 port 53486 ssh2 Aug 3 20:34:04 localhost sshd[7842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.102.31.36 user=root Aug 3 20:34:06 localhost sshd[7842]: Failed password for root from 58.102.31.36 port 59988 ssh2 ... |
2020-08-04 07:31:09 |
92.63.197.71 | attack |
|
2020-08-04 06:58:51 |
122.51.216.164 | attackspambots | Aug 3 22:14:19 XXX sshd[55238]: Invalid user xa from 122.51.216.164 port 44662 |
2020-08-04 07:14:57 |
86.125.52.204 | attack | TCP Port Scanning |
2020-08-04 07:22:01 |
185.97.116.109 | attackspambots | frenzy |
2020-08-04 07:00:01 |
82.137.13.142 | attack | TCP Port Scanning |
2020-08-04 07:29:46 |
89.136.24.66 | attack | TCP Port Scanning |
2020-08-04 07:17:46 |