City: unknown
Region: unknown
Country: Austria
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.93.5.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32205
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.93.5.40. IN A
;; AUTHORITY SECTION:
. 410 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:36:24 CST 2023
;; MSG SIZE rcvd: 104
40.5.93.104.in-addr.arpa domain name pointer a104-93-5-40.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
40.5.93.104.in-addr.arpa name = a104-93-5-40.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 202.79.24.226 | attackspambots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-18 09:37:38,600 INFO [amun_request_handler] PortScan Detected on Port: 445 (202.79.24.226) |
2019-07-18 21:00:50 |
| 96.22.134.180 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-07-18 20:15:57 |
| 117.2.19.190 | attack | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-18 09:37:41,938 INFO [amun_request_handler] PortScan Detected on Port: 445 (117.2.19.190) |
2019-07-18 20:57:49 |
| 95.97.106.3 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-07-18 20:17:05 |
| 120.78.170.123 | attackspam | Jul 18 12:57:33 pornomens sshd\[17510\]: Invalid user ftp from 120.78.170.123 port 52370 Jul 18 12:57:33 pornomens sshd\[17510\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.78.170.123 Jul 18 12:57:35 pornomens sshd\[17510\]: Failed password for invalid user ftp from 120.78.170.123 port 52370 ssh2 ... |
2019-07-18 20:23:20 |
| 148.69.95.42 | attackspambots | SASL Brute Force |
2019-07-18 20:22:36 |
| 103.1.40.189 | attackspam | 2019-07-18T14:07:06.940586centos sshd\[26821\]: Invalid user joe from 103.1.40.189 port 58479 2019-07-18T14:07:06.945640centos sshd\[26821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.1.40.189 2019-07-18T14:07:09.406414centos sshd\[26821\]: Failed password for invalid user joe from 103.1.40.189 port 58479 ssh2 |
2019-07-18 20:37:50 |
| 136.243.22.123 | attack | Many RDP login attempts detected by IDS script |
2019-07-18 20:33:27 |
| 128.199.118.27 | attackspam | Automatic report - Banned IP Access |
2019-07-18 20:26:36 |
| 45.227.253.213 | attack | Jul 18 12:04:42 mailserver postfix/anvil[80146]: statistics: max connection count 1 for (smtps:45.227.253.213) at Jul 18 11:55:21 Jul 18 13:09:28 mailserver postfix/smtps/smtpd[81390]: warning: hostname hosting-by.directwebhost.org does not resolve to address 45.227.253.213: hostname nor servname provided, or not known Jul 18 13:09:28 mailserver postfix/smtps/smtpd[81390]: connect from unknown[45.227.253.213] Jul 18 13:09:36 mailserver dovecot: auth-worker(81355): sql([hidden],45.227.253.213): unknown user Jul 18 13:09:38 mailserver postfix/smtps/smtpd[81390]: warning: unknown[45.227.253.213]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 18 13:09:38 mailserver postfix/smtps/smtpd[81390]: lost connection after AUTH from unknown[45.227.253.213] Jul 18 13:09:38 mailserver postfix/smtps/smtpd[81390]: disconnect from unknown[45.227.253.213] Jul 18 13:09:39 mailserver postfix/smtps/smtpd[81390]: warning: hostname hosting-by.directwebhost.org does not resolve to address 45.227.253.213: hostname nor servname pr |
2019-07-18 21:01:56 |
| 201.73.254.91 | attackspam | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-18 10:55:48,052 INFO [amun_request_handler] PortScan Detected on Port: 445 (201.73.254.91) |
2019-07-18 20:41:21 |
| 14.143.98.84 | attackspambots | Jul 15 06:44:31 cumulus sshd[22245]: Invalid user newuser from 14.143.98.84 port 37690 Jul 15 06:44:31 cumulus sshd[22245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.143.98.84 Jul 15 06:44:33 cumulus sshd[22245]: Failed password for invalid user newuser from 14.143.98.84 port 37690 ssh2 Jul 15 06:44:33 cumulus sshd[22245]: Received disconnect from 14.143.98.84 port 37690:11: Bye Bye [preauth] Jul 15 06:44:33 cumulus sshd[22245]: Disconnected from 14.143.98.84 port 37690 [preauth] Jul 15 06:57:08 cumulus sshd[23128]: Invalid user teste from 14.143.98.84 port 58724 Jul 15 06:57:08 cumulus sshd[23128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.143.98.84 Jul 15 06:57:10 cumulus sshd[23128]: Failed password for invalid user teste from 14.143.98.84 port 58724 ssh2 Jul 15 06:57:10 cumulus sshd[23128]: Received disconnect from 14.143.98.84 port 58724:11: Bye Bye [preauth] Jul 15 06........ ------------------------------- |
2019-07-18 20:12:19 |
| 92.119.160.125 | attack | 18.07.2019 12:27:34 Connection to port 3922 blocked by firewall |
2019-07-18 20:34:00 |
| 46.161.14.130 | attack | Bad bot requested remote resources |
2019-07-18 20:39:26 |
| 149.56.99.180 | attack | Jul 18 12:01:32 MK-Soft-VM3 sshd\[31277\]: Invalid user prueba from 149.56.99.180 port 55472 Jul 18 12:01:32 MK-Soft-VM3 sshd\[31277\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.99.180 Jul 18 12:01:34 MK-Soft-VM3 sshd\[31277\]: Failed password for invalid user prueba from 149.56.99.180 port 55472 ssh2 ... |
2019-07-18 20:26:12 |