城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.107.100.128
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47245
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.107.100.128. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400
;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 07:42:26 CST 2025
;; MSG SIZE rcvd: 108
128.100.107.104.in-addr.arpa domain name pointer a104-107-100-128.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
128.100.107.104.in-addr.arpa name = a104-107-100-128.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 109.252.81.25 | attackbotsspam | Unauthorized connection attempt from IP address 109.252.81.25 on Port 445(SMB) |
2019-07-19 13:13:59 |
| 202.51.114.2 | attackbots | Autoban 202.51.114.2 AUTH/CONNECT |
2019-07-19 13:38:55 |
| 202.99.223.202 | attackspam | Jul 19 07:14:03 localhost sshd\[31207\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.99.223.202 user=root Jul 19 07:14:05 localhost sshd\[31207\]: Failed password for root from 202.99.223.202 port 40266 ssh2 Jul 19 07:19:49 localhost sshd\[31721\]: Invalid user ftpvm from 202.99.223.202 port 60760 Jul 19 07:19:49 localhost sshd\[31721\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.99.223.202 |
2019-07-19 13:27:01 |
| 159.135.233.15 | attackbots | NAME : MNO87-159-135-224-0-0 CIDR : 159.135.224.0/20 | EMAIL - SPAM {Looking for resource vulnerabilities} DDoS Attack USA - California - block certain countries :) IP: 159.135.233.15 Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN - data recovery https://help-dysk.pl |
2019-07-19 13:35:12 |
| 58.84.20.112 | attackspambots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-19 01:32:47,919 INFO [amun_request_handler] PortScan Detected on Port: 445 (58.84.20.112) |
2019-07-19 13:52:49 |
| 162.252.127.85 | attack | Dec 26 08:35:17 vpn sshd[6199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.252.127.85 Dec 26 08:35:19 vpn sshd[6199]: Failed password for invalid user info from 162.252.127.85 port 39274 ssh2 Dec 26 08:38:36 vpn sshd[6208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.252.127.85 |
2019-07-19 13:50:01 |
| 163.10.1.155 | attackbots | Mar 24 09:12:02 vpn sshd[4603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.10.1.155 Mar 24 09:12:04 vpn sshd[4603]: Failed password for invalid user admin from 163.10.1.155 port 45638 ssh2 Mar 24 09:18:04 vpn sshd[4625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.10.1.155 |
2019-07-19 13:28:12 |
| 181.196.184.154 | attack | Unauthorized connection attempt from IP address 181.196.184.154 on Port 445(SMB) |
2019-07-19 13:17:49 |
| 218.150.220.194 | attackbotsspam | Invalid user windows from 218.150.220.194 port 41908 |
2019-07-19 13:54:41 |
| 128.199.140.131 | attack | 2019-07-19T06:18:03.981003lon01.zurich-datacenter.net sshd\[18791\]: Invalid user tesla from 128.199.140.131 port 40170 2019-07-19T06:18:03.986300lon01.zurich-datacenter.net sshd\[18791\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.140.131 2019-07-19T06:18:06.119012lon01.zurich-datacenter.net sshd\[18791\]: Failed password for invalid user tesla from 128.199.140.131 port 40170 ssh2 2019-07-19T06:23:40.027013lon01.zurich-datacenter.net sshd\[19006\]: Invalid user herman from 128.199.140.131 port 39966 2019-07-19T06:23:40.032710lon01.zurich-datacenter.net sshd\[19006\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.140.131 ... |
2019-07-19 13:51:55 |
| 118.174.113.222 | attackbots | Automatic report - Port Scan Attack |
2019-07-19 13:15:39 |
| 116.193.131.29 | attack | Attempted WordPress login: "GET /wp-login.php" |
2019-07-19 13:58:56 |
| 186.67.179.2 | attackspam | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-19 04:38:02,079 INFO [amun_request_handler] PortScan Detected on Port: 445 (186.67.179.2) |
2019-07-19 14:09:31 |
| 209.85.217.65 | attackspambots | Thu, 18 Jul 2019 16:35:04 -0400 Received: from mail-vs1-f65.google.com ([209.85.217.65]:40521) From: Paul Weiss |
2019-07-19 14:07:32 |
| 84.85.23.67 | attack | Jul 19 07:51:23 s0 sshd\[116092\]: Invalid user user from 84.85.23.67 port 59464 Jul 19 07:51:23 s0 sshd\[116092\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.85.23.67 Jul 19 07:51:25 s0 sshd\[116092\]: Failed password for invalid user user from 84.85.23.67 port 59464 ssh2 ... |
2019-07-19 14:03:13 |