城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.105.90.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8006
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.105.90.113. IN A
;; AUTHORITY SECTION:
. 598 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 15:40:13 CST 2022
;; MSG SIZE rcvd: 107
113.90.105.104.in-addr.arpa domain name pointer a104-105-90-113.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
113.90.105.104.in-addr.arpa name = a104-105-90-113.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 118.100.87.131 | attackspam | xmlrpc attack |
2020-08-02 17:24:55 |
| 104.131.55.236 | attack | Aug 2 10:56:25 ns37 sshd[8655]: Failed password for root from 104.131.55.236 port 40295 ssh2 Aug 2 10:56:25 ns37 sshd[8655]: Failed password for root from 104.131.55.236 port 40295 ssh2 |
2020-08-02 17:05:11 |
| 138.197.171.79 | attack | Aug 2 10:20:14 gw1 sshd[1079]: Failed password for root from 138.197.171.79 port 44006 ssh2 ... |
2020-08-02 17:01:57 |
| 122.51.169.118 | attackbotsspam | Invalid user demo from 122.51.169.118 port 37126 |
2020-08-02 17:24:33 |
| 171.231.108.16 | attackbots | 1596340140 - 08/02/2020 05:49:00 Host: 171.231.108.16/171.231.108.16 Port: 445 TCP Blocked |
2020-08-02 17:16:31 |
| 193.142.59.110 | attack | Hits on port : 3306 |
2020-08-02 17:08:19 |
| 117.50.43.135 | attack | Invalid user liangying from 117.50.43.135 port 59422 |
2020-08-02 16:57:17 |
| 85.95.150.143 | attack | Aug 2 05:35:56 ws24vmsma01 sshd[115039]: Failed password for root from 85.95.150.143 port 42486 ssh2 ... |
2020-08-02 17:03:21 |
| 195.154.53.237 | attack | [2020-08-02 05:02:20] NOTICE[1248][C-00002af6] chan_sip.c: Call from '' (195.154.53.237:52891) to extension '15011972595725668' rejected because extension not found in context 'public'. [2020-08-02 05:02:20] SECURITY[1275] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-02T05:02:20.846-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="15011972595725668",SessionID="0x7f27203cfef8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/195.154.53.237/52891",ACLName="no_extension_match" [2020-08-02 05:05:59] NOTICE[1248][C-00002afd] chan_sip.c: Call from '' (195.154.53.237:51565) to extension '16011972595725668' rejected because extension not found in context 'public'. [2020-08-02 05:05:59] SECURITY[1275] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-02T05:05:59.336-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="16011972595725668",SessionID="0x7f2720091b18",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress ... |
2020-08-02 17:21:06 |
| 117.173.133.207 | attackbotsspam | 08/01/2020-23:49:07.802581 117.173.133.207 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2020-08-02 17:12:11 |
| 167.99.185.216 | attackspam | Aug 2 06:44:42 *** sshd[32763]: User root from 167.99.185.216 not allowed because not listed in AllowUsers |
2020-08-02 16:46:49 |
| 179.99.210.161 | attackbots | Automatic report - Banned IP Access |
2020-08-02 17:03:54 |
| 190.78.178.217 | attackspambots | Icarus honeypot on github |
2020-08-02 17:05:37 |
| 51.77.200.101 | attack | Invalid user xit from 51.77.200.101 port 39148 |
2020-08-02 17:18:03 |
| 203.148.87.179 | attackspam | SSH Brute-Forcing (server2) |
2020-08-02 17:26:26 |