City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 23.49.184.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63643
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;23.49.184.245.			IN	A
;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 17:40:22 CST 2025
;; MSG SIZE  rcvd: 106
        245.184.49.23.in-addr.arpa domain name pointer a23-49-184-245.deploy.static.akamaitechnologies.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
245.184.49.23.in-addr.arpa	name = a23-49-184-245.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 105.29.64.195 | attack | 2020-01-24 06:35:30 H=(toyotavarna.com) [105.29.64.195]:45804 I=[192.147.25.65]:25 F=  | 
                    2020-01-25 00:20:46 | 
| 45.143.223.93 | attackspam | Unauthorized connection attempt detected from IP address 45.143.223.93 to port 25  | 
                    2020-01-25 00:08:22 | 
| 80.128.255.134 | attack | Unauthorized connection attempt detected from IP address 80.128.255.134 to port 80  | 
                    2020-01-25 00:34:15 | 
| 65.31.127.80 | attackspambots | Jan 24 18:12:46 pkdns2 sshd\[64667\]: Invalid user jenny from 65.31.127.80Jan 24 18:12:48 pkdns2 sshd\[64667\]: Failed password for invalid user jenny from 65.31.127.80 port 38902 ssh2Jan 24 18:15:02 pkdns2 sshd\[64778\]: Invalid user developer from 65.31.127.80Jan 24 18:15:04 pkdns2 sshd\[64778\]: Failed password for invalid user developer from 65.31.127.80 port 60738 ssh2Jan 24 18:17:23 pkdns2 sshd\[64954\]: Invalid user shop from 65.31.127.80Jan 24 18:17:26 pkdns2 sshd\[64954\]: Failed password for invalid user shop from 65.31.127.80 port 54342 ssh2 ...  | 
                    2020-01-25 00:30:40 | 
| 89.248.160.193 | attackbots | Jan 24 17:16:24 debian-2gb-nbg1-2 kernel: \[2141860.431277\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=89.248.160.193 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=30961 PROTO=TCP SPT=44487 DPT=11125 WINDOW=1024 RES=0x00 SYN URGP=0  | 
                    2020-01-25 00:16:29 | 
| 196.37.111.217 | attackbots | Unauthorized connection attempt detected from IP address 196.37.111.217 to port 2220 [J]  | 
                    2020-01-25 00:10:35 | 
| 34.228.214.164 | attackspam | Jan 24 18:12:03 www sshd\[54309\]: Invalid user arlette from 34.228.214.164 Jan 24 18:12:03 www sshd\[54309\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.228.214.164 Jan 24 18:12:05 www sshd\[54309\]: Failed password for invalid user arlette from 34.228.214.164 port 57756 ssh2 ...  | 
                    2020-01-25 00:19:00 | 
| 37.48.122.47 | spam | I receive at least one email per day, sometimes multiple emails from this IP, see example: 𝐂𝐨𝐧𝐠𝐫𝐚𝐭𝐮𝐥𝐚𝐭𝐢𝐨𝐧𝐬! 𝐓𝐫𝐲 𝐭𝐡𝐞 𝐁𝐞𝐬𝐭 𝐌𝐚𝐥𝐞 𝐄𝐧𝐡𝐚𝐧𝐜𝐞𝐦𝐞𝐧𝐭 𝐒𝐨𝐥𝐮𝐭𝐢𝐨𝐧 * ED_Solution  | 
                    2020-01-25 00:32:47 | 
| 89.135.127.193 | attackbots | Unauthorized connection attempt detected from IP address 89.135.127.193 to port 2220 [J]  | 
                    2020-01-25 00:16:57 | 
| 206.189.81.62 | attackbots | Invalid user ubuntu from 206.189.81.62 port 47698  | 
                    2020-01-25 00:14:45 | 
| 36.92.100.109 | attackspambots | Jan 24 04:36:02 mockhub sshd[32367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.100.109 Jan 24 04:36:04 mockhub sshd[32367]: Failed password for invalid user hell from 36.92.100.109 port 34846 ssh2 ...  | 
                    2020-01-25 00:18:35 | 
| 81.174.139.145 | attackbotsspam | Jan 24 15:40:39 MK-Soft-Root1 sshd[8711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.174.139.145 Jan 24 15:40:41 MK-Soft-Root1 sshd[8711]: Failed password for invalid user user3 from 81.174.139.145 port 56276 ssh2 ...  | 
                    2020-01-25 00:32:25 | 
| 218.28.141.91 | attackbotsspam | Unauthorized access or intrusion attempt detected from Thor banned IP  | 
                    2020-01-25 00:13:57 | 
| 112.85.42.174 | attackbots | Jan 24 12:49:37 firewall sshd[16870]: Failed password for root from 112.85.42.174 port 32180 ssh2 Jan 24 12:49:49 firewall sshd[16870]: error: maximum authentication attempts exceeded for root from 112.85.42.174 port 32180 ssh2 [preauth] Jan 24 12:49:49 firewall sshd[16870]: Disconnecting: Too many authentication failures [preauth] ...  | 
                    2020-01-25 00:05:19 | 
| 1.54.135.51 | attackbots | Unauthorized connection attempt detected from IP address 1.54.135.51 to port 23 [J]  | 
                    2020-01-25 00:09:41 |