City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.99.87.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16779
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.99.87.8. IN A
;; AUTHORITY SECTION:
. 206 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400
;; Query time: 92 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:39:11 CST 2023
;; MSG SIZE rcvd: 104
8.87.99.104.in-addr.arpa domain name pointer a104-99-87-8.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
8.87.99.104.in-addr.arpa name = a104-99-87-8.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 45.144.235.61 | attackbots | Spam |
2020-02-22 00:16:24 |
| 122.51.44.154 | attack | Brute-force attempt banned |
2020-02-22 00:53:31 |
| 119.57.162.18 | attackbotsspam | Feb 21 17:06:36 dedicated sshd[28585]: Invalid user musicbot from 119.57.162.18 port 14337 |
2020-02-22 00:30:08 |
| 194.53.155.163 | attack | suspicious action Fri, 21 Feb 2020 10:16:41 -0300 |
2020-02-22 00:51:28 |
| 45.181.169.88 | attack | trying to access non-authorized port |
2020-02-22 00:24:44 |
| 5.11.222.205 | attackbots | Automatic report - Port Scan Attack |
2020-02-22 00:46:31 |
| 76.91.214.103 | attackbots | tcp 23 |
2020-02-22 00:37:52 |
| 122.51.71.156 | attackbotsspam | Feb 21 18:38:31 gw1 sshd[10177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.71.156 Feb 21 18:38:33 gw1 sshd[10177]: Failed password for invalid user nagios from 122.51.71.156 port 37228 ssh2 ... |
2020-02-22 00:56:15 |
| 125.214.59.229 | attack | Spam |
2020-02-22 00:18:31 |
| 117.0.35.161 | attackspam | Attempted WordPress login: "GET /wp-login.php" |
2020-02-22 00:31:30 |
| 203.150.119.199 | attackspam | Icarus honeypot on github |
2020-02-22 00:50:28 |
| 176.74.29.34 | attack | Spam |
2020-02-22 00:17:33 |
| 114.67.104.242 | attackbotsspam | $f2bV_matches |
2020-02-22 00:36:24 |
| 109.88.74.215 | attackspambots | Spam |
2020-02-22 00:20:37 |
| 45.40.247.108 | attackspam | SSH/22 MH Probe, BF, Hack - |
2020-02-22 00:35:30 |