City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 208.40.14.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58631
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;208.40.14.104.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 00:06:28 CST 2025
;; MSG SIZE  rcvd: 106104.14.40.208.in-addr.arpa domain name pointer 208-40-14-104.ipv4.firstcomm.com.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
104.14.40.208.in-addr.arpa	name = 208-40-14-104.ipv4.firstcomm.com.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 182.151.37.230 | attackbotsspam | 2019-10-19T14:59:15.061342suse-nuc sshd[27954]: Invalid user test from 182.151.37.230 port 34156 ... | 2020-02-25 13:40:08 | 
| 122.199.152.114 | attackspambots | ssh brute force | 2020-02-25 13:46:49 | 
| 176.133.222.105 | attack | MYH,DEF GET /admin/ | 2020-02-25 14:19:46 | 
| 51.15.174.7 | attackbots | 2020-02-21T17:46:54.314675suse-nuc sshd[7593]: Invalid user dev from 51.15.174.7 port 33008 ... | 2020-02-25 14:08:11 | 
| 27.79.205.201 | attackbots | firewall-block, port(s): 23/tcp | 2020-02-25 13:41:56 | 
| 62.234.186.27 | attackspambots | 2020-02-05T05:49:23.533881suse-nuc sshd[2454]: Invalid user roupen from 62.234.186.27 port 43948 ... | 2020-02-25 14:03:26 | 
| 109.228.251.250 | attack | suspicious action Mon, 24 Feb 2020 20:19:55 -0300 | 2020-02-25 13:50:44 | 
| 177.130.184.56 | attackspambots | Unauthorized connection attempt detected from IP address 177.130.184.56 to port 4567 [J] | 2020-02-25 13:43:09 | 
| 104.254.92.53 | attack | (From lacey.carrigan@gmail.com) UNLIMITED fresh and high PR .edu, do-follow and other extensions ready to backlink to your site perfect for ranking your site in any niche! Completely exclusive links and never spammed to death http://www.getmorelinks.xyz | 2020-02-25 13:57:51 | 
| 185.156.73.38 | attackspam | Feb 24 23:18:23 TCP Attack: SRC=185.156.73.38 DST=[Masked] LEN=40 TOS=0x08 PREC=0x20 TTL=246 PROTO=TCP SPT=49638 DPT=8895 WINDOW=1024 RES=0x00 SYN URGP=0 | 2020-02-25 14:15:52 | 
| 189.7.17.61 | attack | Feb 25 06:02:21 vpn01 sshd[22728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.7.17.61 Feb 25 06:02:23 vpn01 sshd[22728]: Failed password for invalid user it from 189.7.17.61 port 37434 ssh2 ... | 2020-02-25 14:06:12 | 
| 37.49.226.111 | attackbots | ET DROP Dshield Block Listed Source group 1 - port: 5038 proto: TCP cat: Misc Attack | 2020-02-25 13:44:25 | 
| 186.154.44.229 | attackbots | Honeypot attack, port: 81, PTR: dynamic-186-154-44-229.dynamic.etb.net.co. | 2020-02-25 14:01:05 | 
| 60.165.53.193 | attackbotsspam | Unauthorised access (Feb 25) SRC=60.165.53.193 LEN=40 TTL=240 ID=11655 TCP DPT=1433 WINDOW=1024 SYN | 2020-02-25 13:38:10 | 
| 37.187.54.45 | attackbots | Feb 25 10:04:30 gw1 sshd[24867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.54.45 Feb 25 10:04:32 gw1 sshd[24867]: Failed password for invalid user log from 37.187.54.45 port 47642 ssh2 ... | 2020-02-25 14:17:01 |