城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.112.154.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19881
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.112.154.57. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025032900 1800 900 604800 86400
;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 29 17:46:22 CST 2025
;; MSG SIZE rcvd: 107
57.154.112.104.in-addr.arpa domain name pointer a104-112-154-57.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
57.154.112.104.in-addr.arpa name = a104-112-154-57.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 202.88.154.70 | attackspambots | May 23 18:34:12 ns37 sshd[17870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.88.154.70 |
2020-05-24 01:13:45 |
| 116.36.168.80 | attackbotsspam | Invalid user usx from 116.36.168.80 port 59390 |
2020-05-24 01:02:32 |
| 58.249.123.38 | attackspam | Invalid user geb from 58.249.123.38 port 55582 |
2020-05-24 01:08:22 |
| 174.138.64.177 | attack | Invalid user hvf from 174.138.64.177 port 53062 |
2020-05-24 00:39:08 |
| 191.209.21.73 | attack | Failed password for invalid user zur from 191.209.21.73 port 54785 ssh2 |
2020-05-24 00:53:21 |
| 143.255.150.81 | attackspambots | May 23 17:09:39 rotator sshd\[659\]: Invalid user djn from 143.255.150.81May 23 17:09:41 rotator sshd\[659\]: Failed password for invalid user djn from 143.255.150.81 port 58414 ssh2May 23 17:13:29 rotator sshd\[1447\]: Invalid user xjm from 143.255.150.81May 23 17:13:31 rotator sshd\[1447\]: Failed password for invalid user xjm from 143.255.150.81 port 55088 ssh2May 23 17:17:19 rotator sshd\[2231\]: Invalid user obx from 143.255.150.81May 23 17:17:20 rotator sshd\[2231\]: Failed password for invalid user obx from 143.255.150.81 port 51786 ssh2 ... |
2020-05-24 00:59:39 |
| 181.129.161.28 | attack | May 23 17:00:36 mintao sshd\[32129\]: Address 181.129.161.28 maps to deltaglobal.com.co, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!\ May 23 17:00:36 mintao sshd\[32129\]: Invalid user liuzongming from 181.129.161.28\ |
2020-05-24 00:54:59 |
| 49.235.240.105 | attack | May 23 14:49:34 lnxmysql61 sshd[30132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.240.105 |
2020-05-24 00:48:49 |
| 213.229.94.19 | attackbotsspam | Invalid user vkw from 213.229.94.19 port 33656 |
2020-05-24 00:51:26 |
| 222.79.184.36 | attackspam | May 23 16:51:17 scw-6657dc sshd[29363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.79.184.36 May 23 16:51:17 scw-6657dc sshd[29363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.79.184.36 May 23 16:51:19 scw-6657dc sshd[29363]: Failed password for invalid user pon from 222.79.184.36 port 39450 ssh2 ... |
2020-05-24 01:12:38 |
| 62.234.120.192 | attackbots | May 23 17:09:32 master sshd[12649]: Failed password for invalid user eie from 62.234.120.192 port 58464 ssh2 |
2020-05-24 00:47:24 |
| 89.141.141.102 | attackbots | Invalid user ubnt from 89.141.141.102 port 53598 |
2020-05-24 01:05:09 |
| 194.67.78.184 | attackspam | Invalid user dvb from 194.67.78.184 port 37050 |
2020-05-24 01:14:48 |
| 64.225.67.233 | attackbotsspam | May 23 18:17:18 vps687878 sshd\[11689\]: Failed password for invalid user dzk from 64.225.67.233 port 59556 ssh2 May 23 18:20:39 vps687878 sshd\[12121\]: Invalid user ame from 64.225.67.233 port 36356 May 23 18:20:39 vps687878 sshd\[12121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.67.233 May 23 18:20:40 vps687878 sshd\[12121\]: Failed password for invalid user ame from 64.225.67.233 port 36356 ssh2 May 23 18:24:09 vps687878 sshd\[12373\]: Invalid user kxw from 64.225.67.233 port 41394 May 23 18:24:09 vps687878 sshd\[12373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.67.233 ... |
2020-05-24 00:46:52 |
| 175.200.172.102 | attackspambots | Invalid user admin from 175.200.172.102 port 38138 |
2020-05-24 00:56:22 |