City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 98.104.8.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23287
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;98.104.8.106.			IN	A
;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400
;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 21:35:56 CST 2025
;; MSG SIZE  rcvd: 105
        106.8.104.98.in-addr.arpa domain name pointer 106.sub-98-104-8.myvzw.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
106.8.104.98.in-addr.arpa	name = 106.sub-98-104-8.myvzw.com.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 122.51.209.252 | attackbotsspam | Invalid user suporte from 122.51.209.252 port 44864  | 
                    2020-08-21 06:14:46 | 
| 207.46.13.115 | attack | Automatic report - Banned IP Access  | 
                    2020-08-21 06:10:39 | 
| 113.182.164.52 | attack | Aug 20 21:27:04 host imapd-ssl: LOGIN FAILED, user=eaff[at][munged], ip=[::ffff:113.182.164.52] Aug 20 21:27:10 host imapd-ssl: LOGIN FAILED, user=eaff[at][munged], ip=[::ffff:113.182.164.52] Aug 20 21:27:16 host imapd-ssl: LOGIN FAILED, user=eaff[at][munged], ip=[::ffff:113.182.164.52] Aug 20 21:27:22 host imapd-ssl: LOGIN FAILED, user=eaff[at][munged], ip=[::ffff:113.182.164.52] Aug 20 21:27:27 host imapd-ssl: LOGIN FAILED, user=eaff[at][munged], ip=[::ffff:113.182.164.52] ...  | 
                    2020-08-21 06:17:47 | 
| 103.204.55.186 | attack | $f2bV_matches  | 
                    2020-08-21 06:38:44 | 
| 111.229.27.180 | attack | Aug 20 22:11:32 rush sshd[8465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.27.180 Aug 20 22:11:34 rush sshd[8465]: Failed password for invalid user fvm from 111.229.27.180 port 54502 ssh2 Aug 20 22:13:41 rush sshd[8532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.27.180 ...  | 
                    2020-08-21 06:33:57 | 
| 58.250.164.246 | attack | Invalid user move from 58.250.164.246 port 34210  | 
                    2020-08-21 06:20:14 | 
| 192.99.15.199 | attack | 20 attempts against mh-misbehave-ban on cedar  | 
                    2020-08-21 06:16:59 | 
| 180.76.105.81 | attackspambots | Aug 20 20:52:36 vps-51d81928 sshd[779208]: Failed password for invalid user dp from 180.76.105.81 port 58380 ssh2 Aug 20 20:54:15 vps-51d81928 sshd[779250]: Invalid user www from 180.76.105.81 port 54408 Aug 20 20:54:15 vps-51d81928 sshd[779250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.105.81 Aug 20 20:54:15 vps-51d81928 sshd[779250]: Invalid user www from 180.76.105.81 port 54408 Aug 20 20:54:17 vps-51d81928 sshd[779250]: Failed password for invalid user www from 180.76.105.81 port 54408 ssh2 ...  | 
                    2020-08-21 06:37:53 | 
| 222.186.175.183 | attack | Aug 20 19:32:49 vps46666688 sshd[13818]: Failed password for root from 222.186.175.183 port 52384 ssh2 Aug 20 19:33:02 vps46666688 sshd[13818]: error: maximum authentication attempts exceeded for root from 222.186.175.183 port 52384 ssh2 [preauth] ...  | 
                    2020-08-21 06:33:26 | 
| 223.247.194.119 | attackbots | leo_www  | 
                    2020-08-21 06:30:26 | 
| 68.183.82.166 | attackspam | 2020-08-20T17:34:40.1936541495-001 sshd[599]: Invalid user jupyter from 68.183.82.166 port 41796 2020-08-20T17:34:41.8772951495-001 sshd[599]: Failed password for invalid user jupyter from 68.183.82.166 port 41796 ssh2 2020-08-20T17:39:59.1112261495-001 sshd[978]: Invalid user daniel from 68.183.82.166 port 49172 2020-08-20T17:39:59.1150421495-001 sshd[978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.82.166 2020-08-20T17:39:59.1112261495-001 sshd[978]: Invalid user daniel from 68.183.82.166 port 49172 2020-08-20T17:40:01.2562451495-001 sshd[978]: Failed password for invalid user daniel from 68.183.82.166 port 49172 ssh2 ...  | 
                    2020-08-21 06:34:17 | 
| 66.70.142.214 | attack | Invalid user developer from 66.70.142.214 port 57654  | 
                    2020-08-21 06:16:44 | 
| 124.156.102.254 | attack | Aug 20 17:52:51 ny01 sshd[4747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.102.254 Aug 20 17:52:54 ny01 sshd[4747]: Failed password for invalid user katja from 124.156.102.254 port 55932 ssh2 Aug 20 17:58:39 ny01 sshd[5911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.102.254  | 
                    2020-08-21 06:21:58 | 
| 62.210.206.78 | attackspambots | Invalid user wifi from 62.210.206.78 port 59392  | 
                    2020-08-21 06:17:59 | 
| 167.99.146.47 | attackspam | " "  | 
                    2020-08-21 06:12:52 |