城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.116.5.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46858
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.116.5.245. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013101 1800 900 604800 86400
;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 05:24:28 CST 2025
;; MSG SIZE rcvd: 106
245.5.116.104.in-addr.arpa domain name pointer a104-116-5-245.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
245.5.116.104.in-addr.arpa name = a104-116-5-245.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 109.234.38.61 | attackspambots | 0,75-13/38 [bc03/m259] concatform PostRequest-Spammer scoring: Lusaka01 |
2019-08-08 09:45:25 |
| 189.8.68.56 | attack | 2019-08-08T01:22:15.411810abusebot-6.cloudsearch.cf sshd\[23249\]: Invalid user lukasz from 189.8.68.56 port 57466 |
2019-08-08 09:47:48 |
| 216.155.94.51 | attackbots | SSH Brute-Force reported by Fail2Ban |
2019-08-08 09:48:21 |
| 149.56.44.101 | attack | Aug 8 00:18:27 itv-usvr-02 sshd[27038]: Invalid user gpadmin from 149.56.44.101 port 55926 Aug 8 00:18:27 itv-usvr-02 sshd[27038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.44.101 Aug 8 00:18:27 itv-usvr-02 sshd[27038]: Invalid user gpadmin from 149.56.44.101 port 55926 Aug 8 00:18:29 itv-usvr-02 sshd[27038]: Failed password for invalid user gpadmin from 149.56.44.101 port 55926 ssh2 Aug 8 00:27:47 itv-usvr-02 sshd[27054]: Invalid user nicole from 149.56.44.101 port 52076 |
2019-08-08 10:10:28 |
| 104.152.52.26 | attackbots | Attack from: 104.152.52.26 Classification: WEB Masscan/Sysscan Scanner Activity -1.2 |
2019-08-08 10:09:48 |
| 39.69.57.152 | attackspambots | Seq 2995002506 |
2019-08-08 09:38:08 |
| 219.92.16.81 | attackspam | Aug 7 19:54:30 *** sshd[27062]: Invalid user wanker from 219.92.16.81 |
2019-08-08 10:12:55 |
| 146.185.175.132 | attack | Aug 7 14:20:25 TORMINT sshd\[8941\]: Invalid user heroin from 146.185.175.132 Aug 7 14:20:25 TORMINT sshd\[8941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.185.175.132 Aug 7 14:20:27 TORMINT sshd\[8941\]: Failed password for invalid user heroin from 146.185.175.132 port 55770 ssh2 ... |
2019-08-08 09:40:19 |
| 192.241.249.53 | attack | Aug 7 22:44:20 vmd17057 sshd\[31575\]: Invalid user mbrown from 192.241.249.53 port 41464 Aug 7 22:44:20 vmd17057 sshd\[31575\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.249.53 Aug 7 22:44:22 vmd17057 sshd\[31575\]: Failed password for invalid user mbrown from 192.241.249.53 port 41464 ssh2 ... |
2019-08-08 10:03:21 |
| 160.20.109.141 | attackbotsspam | TCP Port: 25 _ invalid blocked barracudacentral zen-spamhaus _ _ _ _ (774) |
2019-08-08 09:42:30 |
| 77.247.181.165 | attackspambots | $f2bV_matches |
2019-08-08 10:11:22 |
| 106.15.58.250 | attack | Unauthorised access (Aug 7) SRC=106.15.58.250 LEN=40 TTL=43 ID=49169 TCP DPT=8080 WINDOW=5129 SYN Unauthorised access (Aug 7) SRC=106.15.58.250 LEN=40 TTL=42 ID=55937 TCP DPT=8080 WINDOW=61978 SYN |
2019-08-08 10:08:59 |
| 188.162.195.200 | attackbotsspam | Unauthorised access (Aug 7) SRC=188.162.195.200 LEN=52 TTL=114 ID=27011 DF TCP DPT=445 WINDOW=8192 SYN |
2019-08-08 10:07:27 |
| 36.73.104.14 | attackbotsspam | firewall-block, port(s): 81/tcp |
2019-08-08 09:38:27 |
| 52.208.42.190 | attackbotsspam | $f2bV_matches |
2019-08-08 10:08:25 |