城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.106.14.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65028
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.106.14.207. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 09:49:24 CST 2025
;; MSG SIZE rcvd: 107
207.14.106.104.in-addr.arpa domain name pointer a104-106-14-207.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
207.14.106.104.in-addr.arpa name = a104-106-14-207.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 5.12.16.84 | attackspam | unauthorized connection attempt |
2020-02-26 15:07:07 |
| 213.55.85.126 | attackbots | unauthorized connection attempt |
2020-02-26 14:49:15 |
| 180.183.25.146 | attackbots | unauthorized connection attempt |
2020-02-26 15:08:46 |
| 153.36.112.94 | attackspambots | unauthorized connection attempt |
2020-02-26 15:09:19 |
| 47.40.223.169 | attackspambots | unauthorized connection attempt |
2020-02-26 14:58:59 |
| 121.181.120.99 | attackspambots | unauthorized connection attempt |
2020-02-26 15:24:54 |
| 171.96.251.44 | attackspam | unauthorized connection attempt |
2020-02-26 14:52:38 |
| 58.96.241.5 | attack | unauthorized connection attempt |
2020-02-26 15:13:31 |
| 112.186.191.172 | attackspambots | unauthorized connection attempt |
2020-02-26 15:04:26 |
| 120.24.244.15 | attackbotsspam | unauthorized connection attempt |
2020-02-26 15:25:13 |
| 113.255.174.143 | attack | unauthorized connection attempt |
2020-02-26 15:10:26 |
| 200.54.250.98 | attackspambots | Feb 25 20:39:23 tdfoods sshd\[8082\]: Invalid user vagrant from 200.54.250.98 Feb 25 20:39:23 tdfoods sshd\[8082\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.54.250.98 Feb 25 20:39:25 tdfoods sshd\[8082\]: Failed password for invalid user vagrant from 200.54.250.98 port 54056 ssh2 Feb 25 20:45:37 tdfoods sshd\[8569\]: Invalid user fof from 200.54.250.98 Feb 25 20:45:37 tdfoods sshd\[8569\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.54.250.98 |
2020-02-26 14:50:30 |
| 78.187.53.89 | attackspambots | unauthorized connection attempt |
2020-02-26 15:29:20 |
| 176.97.48.233 | attackbotsspam | DATE:2020-02-26 08:09:15, IP:176.97.48.233, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq) |
2020-02-26 15:24:16 |
| 31.170.53.61 | attack | unauthorized connection attempt |
2020-02-26 15:01:01 |