城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.103.48.60
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22460
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.103.48.60.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 03:18:18 CST 2025
;; MSG SIZE  rcvd: 10660.48.103.104.in-addr.arpa domain name pointer a104-103-48-60.deploy.static.akamaitechnologies.com.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
60.48.103.104.in-addr.arpa	name = a104-103-48-60.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:| IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 34.220.200.139 | attackspam | Jul 25 22:01:11 h2177944 sshd\[6482\]: Invalid user el from 34.220.200.139 port 34654 Jul 25 22:01:11 h2177944 sshd\[6482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.220.200.139 Jul 25 22:01:13 h2177944 sshd\[6482\]: Failed password for invalid user el from 34.220.200.139 port 34654 ssh2 Jul 25 22:07:44 h2177944 sshd\[6609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.220.200.139 user=root ... | 2019-07-26 04:18:11 | 
| 200.233.131.21 | attackspambots | Jul 25 18:05:29 animalibera sshd[3425]: Invalid user daniel from 200.233.131.21 port 60595 ... | 2019-07-26 04:17:20 | 
| 193.189.89.133 | attackspambots | Unauthorized connection attempt from IP address 193.189.89.133 on Port 445(SMB) | 2019-07-26 04:35:27 | 
| 89.185.81.100 | attackspam | [portscan] Port scan | 2019-07-26 04:21:16 | 
| 64.136.154.170 | attack | NAME : AERIO-64-136-128-0 CIDR : 64.136.128.0/19 SYN Flood DDoS Attack USA - California - block certain countries :) IP: 64.136.154.170 Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN - data recovery https://help-dysk.pl | 2019-07-26 04:42:28 | 
| 45.227.254.30 | attackbotsspam | 25.07.2019 19:47:25 Connection to port 33899 blocked by firewall | 2019-07-26 04:25:10 | 
| 14.162.145.73 | attackbots | Unauthorized connection attempt from IP address 14.162.145.73 on Port 445(SMB) | 2019-07-26 04:22:54 | 
| 138.68.59.131 | attackspambots | Time: Thu Jul 25 16:06:50 2019 -0300 IP: 138.68.59.131 (US/United States/-) Failures: 20 (WordPressBruteForcePOST) Interval: 3600 seconds Blocked: Permanent Block | 2019-07-26 04:40:21 | 
| 165.227.210.71 | attackspambots | $f2bV_matches | 2019-07-26 04:28:38 | 
| 34.87.61.116 | attack | "to=EM | 2019-07-26 04:19:58 | 
| 68.183.91.25 | attackspam | Jul 25 21:52:50 mail1 sshd\[13774\]: Invalid user gaurav from 68.183.91.25 port 56172 Jul 25 21:52:50 mail1 sshd\[13774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.91.25 Jul 25 21:52:53 mail1 sshd\[13774\]: Failed password for invalid user gaurav from 68.183.91.25 port 56172 ssh2 Jul 25 22:04:28 mail1 sshd\[19026\]: Invalid user leandro from 68.183.91.25 port 40192 Jul 25 22:04:28 mail1 sshd\[19026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.91.25 ... | 2019-07-26 04:08:13 | 
| 185.254.122.100 | attackbots | 25.07.2019 18:25:15 Connection to port 29901 blocked by firewall | 2019-07-26 04:10:23 | 
| 123.1.186.5 | attackspambots | Brute force attempt | 2019-07-26 04:19:07 | 
| 90.224.194.245 | attack | scan z | 2019-07-26 04:06:44 | 
| 62.117.95.154 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - | 2019-07-26 04:46:45 |