城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): Akamai Technologies, Inc.
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.111.119.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11815
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.111.119.81. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019050500 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Mon May 06 00:55:18 +08 2019
;; MSG SIZE rcvd: 118
81.119.111.104.in-addr.arpa domain name pointer a104-111-119-81.deploy.static.akamaitechnologies.com.
Server: 67.207.67.3
Address: 67.207.67.3#53
Non-authoritative answer:
81.119.111.104.in-addr.arpa name = a104-111-119-81.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 113.172.74.10 | attackbotsspam | Attempt to attack host OS, exploiting network vulnerabilities, on 04-11-2019 14:35:17. |
2019-11-04 23:40:18 |
| 140.143.66.239 | attackbotsspam | Nov 4 17:25:04 server sshd\[25431\]: Invalid user uf from 140.143.66.239 Nov 4 17:25:04 server sshd\[25431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.66.239 Nov 4 17:25:06 server sshd\[25431\]: Failed password for invalid user uf from 140.143.66.239 port 39544 ssh2 Nov 4 17:35:21 server sshd\[28358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.66.239 user=root Nov 4 17:35:23 server sshd\[28358\]: Failed password for root from 140.143.66.239 port 35986 ssh2 ... |
2019-11-04 23:26:35 |
| 51.91.212.79 | attackspambots | Connection by 51.91.212.79 on port: 1025 got caught by honeypot at 11/4/2019 1:35:56 PM |
2019-11-04 23:04:29 |
| 178.42.250.27 | attack | Unauthorised access (Nov 4) SRC=178.42.250.27 LEN=44 TTL=54 ID=20520 TCP DPT=23 WINDOW=33706 SYN |
2019-11-04 23:11:47 |
| 220.98.84.31 | attackbots | Nov 4 15:35:37 MK-Soft-Root2 sshd[9723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.98.84.31 Nov 4 15:35:38 MK-Soft-Root2 sshd[9723]: Failed password for invalid user ul from 220.98.84.31 port 64025 ssh2 ... |
2019-11-04 23:15:58 |
| 111.122.181.250 | attackspam | Automatic report - Banned IP Access |
2019-11-04 23:25:24 |
| 134.209.145.168 | attackspam | xmlrpc attack |
2019-11-04 23:46:27 |
| 54.37.88.73 | attack | $f2bV_matches |
2019-11-04 23:44:09 |
| 77.250.208.21 | attack | Nov 4 15:31:16 SilenceServices sshd[19921]: Failed password for root from 77.250.208.21 port 57934 ssh2 Nov 4 15:35:44 SilenceServices sshd[21159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.250.208.21 Nov 4 15:35:46 SilenceServices sshd[21159]: Failed password for invalid user upload from 77.250.208.21 port 40192 ssh2 |
2019-11-04 23:09:32 |
| 58.179.143.122 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 04-11-2019 14:35:23. |
2019-11-04 23:29:03 |
| 49.88.112.68 | attackbotsspam | Nov 4 11:48:45 firewall sshd[19541]: Failed password for root from 49.88.112.68 port 17060 ssh2 Nov 4 11:49:34 firewall sshd[19562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.68 user=root Nov 4 11:49:36 firewall sshd[19562]: Failed password for root from 49.88.112.68 port 50765 ssh2 ... |
2019-11-04 23:47:50 |
| 195.201.124.187 | attackbots | Nov 4 16:02:13 vps691689 sshd[28487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.201.124.187 Nov 4 16:02:15 vps691689 sshd[28487]: Failed password for invalid user manager from 195.201.124.187 port 32948 ssh2 ... |
2019-11-04 23:16:18 |
| 118.89.164.38 | attackbots | xmlrpc attack |
2019-11-04 23:23:39 |
| 92.207.180.50 | attack | Nov 4 16:26:54 vps691689 sshd[28944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.207.180.50 Nov 4 16:26:56 vps691689 sshd[28944]: Failed password for invalid user jordan23 from 92.207.180.50 port 45975 ssh2 Nov 4 16:31:28 vps691689 sshd[29026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.207.180.50 ... |
2019-11-04 23:38:43 |
| 157.245.115.45 | attackbotsspam | Nov 4 10:03:12 ny01 sshd[27432]: Failed password for root from 157.245.115.45 port 44522 ssh2 Nov 4 10:07:14 ny01 sshd[27793]: Failed password for root from 157.245.115.45 port 54794 ssh2 |
2019-11-04 23:12:09 |