City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.97.206.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52938
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.97.206.69. IN A
;; AUTHORITY SECTION:
. 343 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400
;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:38:09 CST 2023
;; MSG SIZE rcvd: 106
69.206.97.104.in-addr.arpa domain name pointer a104-97-206-69.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
69.206.97.104.in-addr.arpa name = a104-97-206-69.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 109.202.101.37 | attack | 109.202.101.37 - - [18/Oct/2019:15:50:46 -0400] "GET /?page=products&action=view&manufacturerID=61&productID=%2fetc%2fpasswd&linkID=16812 HTTP/1.1" 302 - "https://exitdevice.com/?page=products&action=view&manufacturerID=61&productID=%2fetc%2fpasswd&linkID=16812" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0" ... |
2019-10-19 06:02:44 |
| 89.120.110.78 | attackbotsspam | Unauthorised access (Oct 18) SRC=89.120.110.78 LEN=44 TTL=53 ID=18059 TCP DPT=23 WINDOW=24486 SYN |
2019-10-19 06:01:08 |
| 138.68.92.121 | attackspam | Oct 19 00:34:34 server sshd\[31620\]: Invalid user ld from 138.68.92.121 port 49302 Oct 19 00:34:34 server sshd\[31620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.92.121 Oct 19 00:34:37 server sshd\[31620\]: Failed password for invalid user ld from 138.68.92.121 port 49302 ssh2 Oct 19 00:41:49 server sshd\[18551\]: User root from 138.68.92.121 not allowed because listed in DenyUsers Oct 19 00:41:49 server sshd\[18551\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.92.121 user=root |
2019-10-19 05:45:59 |
| 181.40.81.198 | attackspambots | Oct 18 11:23:04 kapalua sshd\[32372\]: Invalid user tsunami from 181.40.81.198 Oct 18 11:23:04 kapalua sshd\[32372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.40.81.198 Oct 18 11:23:06 kapalua sshd\[32372\]: Failed password for invalid user tsunami from 181.40.81.198 port 53595 ssh2 Oct 18 11:27:55 kapalua sshd\[327\]: Invalid user bigsexy from 181.40.81.198 Oct 18 11:27:56 kapalua sshd\[327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.40.81.198 |
2019-10-19 05:45:28 |
| 103.129.222.207 | attackspam | 2019-10-18T21:33:00.089216abusebot-8.cloudsearch.cf sshd\[6948\]: Invalid user power from 103.129.222.207 port 59598 |
2019-10-19 05:41:13 |
| 113.160.166.23 | attack | 113.160.166.23 - - [18/Oct/2019:15:51:24 -0400] "GET /?page=products&action=view&manufacturerID=61&productID=/etc/passwd%00&linkID=16812 HTTP/1.1" 302 - "https://exitdevice.com/?page=products&action=view&manufacturerID=61&productID=/etc/passwd%00&linkID=16812" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0" ... |
2019-10-19 05:40:54 |
| 54.39.191.188 | attackspam | Oct 18 22:45:12 server sshd\[11386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.191.188 user=root Oct 18 22:45:14 server sshd\[11386\]: Failed password for root from 54.39.191.188 port 33304 ssh2 Oct 18 22:50:42 server sshd\[12814\]: Invalid user play from 54.39.191.188 Oct 18 22:50:42 server sshd\[12814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.191.188 Oct 18 22:50:44 server sshd\[12814\]: Failed password for invalid user play from 54.39.191.188 port 56546 ssh2 ... |
2019-10-19 06:06:19 |
| 118.170.197.221 | attack | Fail2Ban Ban Triggered |
2019-10-19 05:46:20 |
| 92.207.180.50 | attackbots | Oct 18 21:49:04 game-panel sshd[23973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.207.180.50 Oct 18 21:49:06 game-panel sshd[23973]: Failed password for invalid user test from 92.207.180.50 port 45243 ssh2 Oct 18 21:52:31 game-panel sshd[24073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.207.180.50 |
2019-10-19 06:04:55 |
| 95.213.199.202 | attackspam | Oct 18 11:19:30 sachi sshd\[6090\]: Invalid user nimda from 95.213.199.202 Oct 18 11:19:30 sachi sshd\[6090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.213.199.202 Oct 18 11:19:33 sachi sshd\[6090\]: Failed password for invalid user nimda from 95.213.199.202 port 53262 ssh2 Oct 18 11:23:40 sachi sshd\[6416\]: Invalid user exchadmin from 95.213.199.202 Oct 18 11:23:40 sachi sshd\[6416\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.213.199.202 |
2019-10-19 05:26:46 |
| 91.132.103.64 | attackbots | 2019-10-18T20:53:16.324175abusebot-8.cloudsearch.cf sshd\[6800\]: Invalid user odroid from 91.132.103.64 port 46684 |
2019-10-19 05:57:34 |
| 24.2.205.235 | attackspam | Oct 18 23:04:59 jane sshd[8679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.2.205.235 Oct 18 23:05:01 jane sshd[8679]: Failed password for invalid user ubnt from 24.2.205.235 port 46659 ssh2 ... |
2019-10-19 05:48:44 |
| 188.254.0.112 | attackbotsspam | Oct 18 23:10:20 localhost sshd\[6897\]: Invalid user contasys from 188.254.0.112 port 45382 Oct 18 23:10:20 localhost sshd\[6897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.112 Oct 18 23:10:22 localhost sshd\[6897\]: Failed password for invalid user contasys from 188.254.0.112 port 45382 ssh2 |
2019-10-19 05:30:26 |
| 51.68.123.198 | attackbots | Oct 18 23:37:29 SilenceServices sshd[19150]: Failed password for root from 51.68.123.198 port 39208 ssh2 Oct 18 23:41:05 SilenceServices sshd[20185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.123.198 Oct 18 23:41:07 SilenceServices sshd[20185]: Failed password for invalid user mailman from 51.68.123.198 port 50370 ssh2 |
2019-10-19 05:48:03 |
| 167.99.202.143 | attackspambots | Oct 19 01:05:05 sauna sshd[53463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.202.143 Oct 19 01:05:08 sauna sshd[53463]: Failed password for invalid user edu1 from 167.99.202.143 port 40540 ssh2 ... |
2019-10-19 06:06:55 |