City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.89.245.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64327
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.89.245.71. IN A
;; AUTHORITY SECTION:
. 494 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:34:23 CST 2023
;; MSG SIZE rcvd: 106
71.245.89.104.in-addr.arpa domain name pointer a104-89-245-71.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
71.245.89.104.in-addr.arpa name = a104-89-245-71.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
221.207.32.250 | attack | 22/tcp 22/tcp 22/tcp... [2020-01-24/03-25]60pkt,1pt.(tcp) |
2020-03-25 20:05:13 |
218.24.45.75 | attackspam | Port 8080 (HTTP proxy) access denied |
2020-03-25 20:06:17 |
5.188.210.203 | attack | Port 3128 scan denied |
2020-03-25 20:51:49 |
219.146.62.247 | attackspam | firewall-block, port(s): 445/tcp |
2020-03-25 20:05:46 |
185.176.27.90 | attack | 03/25/2020-07:19:26.196231 185.176.27.90 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-03-25 20:17:19 |
193.37.255.114 | attackspam | Unauthorized connection attempt detected from IP address 193.37.255.114 to port 5555 |
2020-03-25 20:12:47 |
185.143.221.85 | attackbots | IP: 185.143.221.85 Ports affected HTTP protocol over TLS/SSL (443) Abuse Confidence rating 100% Found in DNSBL('s) ASN Details AS49505 OOO Network of data-centers Selectel Netherlands (NL) CIDR 185.143.221.0/24 Log Date: 25/03/2020 11:27:24 AM UTC |
2020-03-25 20:23:14 |
83.97.20.49 | attackbotsspam | scans 18 times in preceeding hours on the ports (in chronological order) 5353 6664 28017 8545 8139 10333 22105 1099 4949 1911 6665 61616 45554 4848 5560 1991 6667 8378 resulting in total of 18 scans from 83.97.20.0/24 block. |
2020-03-25 20:39:03 |
45.134.179.240 | attack | firewall-block, port(s): 3390/tcp |
2020-03-25 20:50:01 |
89.248.174.3 | attackspambots | Port 102 scan denied |
2020-03-25 20:35:28 |
202.134.61.41 | attackspambots | Unauthorized connection attempt from IP address 202.134.61.41 on Port 3389(RDP) |
2020-03-25 20:07:39 |
185.175.93.104 | attack | Fail2Ban Ban Triggered |
2020-03-25 20:21:11 |
49.51.12.25 | attackspambots | Unauthorized connection attempt detected from IP address 49.51.12.25 to port 5001 |
2020-03-25 20:01:02 |
45.143.221.50 | attackspambots | none |
2020-03-25 20:01:24 |
178.34.190.34 | attackspambots | 2020-03-24 UTC: (31x) - |
2020-03-25 20:53:20 |