City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.92.200.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24341
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.92.200.40.			IN	A
;; AUTHORITY SECTION:
.			145	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 14:50:47 CST 2022
;; MSG SIZE  rcvd: 106
        40.200.92.104.in-addr.arpa domain name pointer a104-92-200-40.deploy.static.akamaitechnologies.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
40.200.92.104.in-addr.arpa	name = a104-92-200-40.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 64.225.11.24 | attack | ...  | 
                    2020-09-29 12:14:38 | 
| 222.232.29.235 | attackbots | IP blocked  | 
                    2020-09-29 07:11:43 | 
| 123.8.15.63 | attackbots | port scan and connect, tcp 23 (telnet)  | 
                    2020-09-29 12:02:47 | 
| 64.227.106.112 | attackspambots | trying to access non-authorized port  | 
                    2020-09-29 07:27:01 | 
| 65.181.123.252 | attack | phishing  | 
                    2020-09-29 12:19:12 | 
| 180.76.149.15 | attackbots | reported through recidive - multiple failed attempts(SSH)  | 
                    2020-09-29 07:16:41 | 
| 168.0.174.218 | attack | Automatic report - Banned IP Access  | 
                    2020-09-29 07:24:12 | 
| 115.254.63.50 | attackbotsspam | $f2bV_matches  | 
                    2020-09-29 07:25:04 | 
| 58.187.46.37 | attack | Automatic report - Port Scan Attack  | 
                    2020-09-29 12:16:48 | 
| 172.69.63.159 | attack | srv02 DDoS Malware Target(80:http) ..  | 
                    2020-09-29 07:22:02 | 
| 61.177.172.142 | attackbots | 2020-09-28T04:02:35.995080correo.[domain] sshd[13937]: Failed password for root from 61.177.172.142 port 48029 ssh2 2020-09-28T04:02:38.684073correo.[domain] sshd[13937]: Failed password for root from 61.177.172.142 port 48029 ssh2 2020-09-28T04:02:42.783307correo.[domain] sshd[13937]: Failed password for root from 61.177.172.142 port 48029 ssh2 ...  | 
                    2020-09-29 07:27:45 | 
| 194.87.138.7 | attackspam | Unauthorised access (Sep 28) SRC=194.87.138.7 LEN=40 TOS=0x10 PREC=0x40 TTL=56 ID=55380 TCP DPT=8080 WINDOW=53638 SYN Unauthorised access (Sep 28) SRC=194.87.138.7 LEN=40 TOS=0x10 PREC=0x40 TTL=56 ID=42117 TCP DPT=8080 WINDOW=53638 SYN Unauthorised access (Sep 27) SRC=194.87.138.7 LEN=40 TOS=0x10 PREC=0x40 TTL=56 ID=47007 TCP DPT=8080 WINDOW=53638 SYN  | 
                    2020-09-29 07:16:16 | 
| 68.183.234.193 | attack | Cowrie Honeypot: 2 unauthorised SSH/Telnet login attempts between 2020-09-28T15:45:00Z and 2020-09-28T15:47:13Z  | 
                    2020-09-29 07:26:37 | 
| 1.196.253.13 | attack | 20 attempts against mh-ssh on air  | 
                    2020-09-29 12:00:49 | 
| 42.179.201.9 | attackspam | Icarus honeypot on github  | 
                    2020-09-29 07:27:16 |