City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.87.49.84
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36492
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.87.49.84. IN A
;; AUTHORITY SECTION:
. 59 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022060103 1800 900 604800 86400
;; Query time: 75 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 02 06:21:12 CST 2022
;; MSG SIZE rcvd: 105
84.49.87.104.in-addr.arpa domain name pointer a104-87-49-84.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
84.49.87.104.in-addr.arpa name = a104-87-49-84.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 85.209.0.102 | attackbotsspam | Sep 30 22:58:53 *** sshd[22127]: Did not receive identification string from 85.209.0.102 |
2020-10-01 07:14:40 |
| 193.27.228.154 | attackbots | scans 16 times in preceeding hours on the ports (in chronological order) 4782 4721 3588 5177 4596 3784 4662 5156 5072 5493 4490 5079 4620 5262 5500 4785 resulting in total of 51 scans from 193.27.228.0/23 block. |
2020-10-01 07:02:29 |
| 120.42.132.232 | attackspambots | Brute forcing email accounts |
2020-10-01 07:05:30 |
| 101.251.219.100 | attack |
|
2020-10-01 07:08:57 |
| 92.63.197.61 | attackspambots | srv02 Mass scanning activity detected Target: 4643 .. |
2020-10-01 07:12:17 |
| 80.82.77.33 | attackbotsspam | scans once in preceeding hours on the ports (in chronological order) 3689 resulting in total of 275 scans from 80.82.64.0/20 block. |
2020-10-01 06:49:58 |
| 60.251.183.90 | attack | SSH login attempts. |
2020-10-01 06:52:49 |
| 45.143.221.132 | attackspam | ET SCAN Sipvicious Scan - port: 5060 proto: sip cat: Attempted Information Leakbytes: 458 |
2020-10-01 06:54:11 |
| 5.188.156.92 | attackspambots | firewall-block, port(s): 33389/tcp |
2020-10-01 06:58:28 |
| 45.129.33.81 | attackbots | scans 10 times in preceeding hours on the ports (in chronological order) 59003 5985 5994 5979 5982 59009 5991 59010 59007 5988 resulting in total of 113 scans from 45.129.33.0/24 block. |
2020-10-01 07:21:32 |
| 193.27.228.172 | attack | Port-scan: detected 211 distinct ports within a 24-hour window. |
2020-10-01 07:02:00 |
| 80.82.78.100 | attackspambots | scans 6 times in preceeding hours on the ports (in chronological order) 1030 1045 1055 1060 1067 1088 resulting in total of 275 scans from 80.82.64.0/20 block. |
2020-10-01 07:15:34 |
| 66.240.205.34 | attack |
|
2020-10-01 06:51:58 |
| 92.63.197.74 | attackbots | ET CINS Active Threat Intelligence Poor Reputation IP group 80 - port: 54000 proto: tcp cat: Misc Attackbytes: 60 |
2020-10-01 07:11:56 |
| 79.124.62.55 | attackbots | scans 2 times in preceeding hours on the ports (in chronological order) 7070 7070 resulting in total of 2 scans from 79.124.62.0/24 block. |
2020-10-01 06:50:27 |