城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.124.92.238
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8877
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.124.92.238. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 07:02:03 CST 2025
;; MSG SIZE rcvd: 107
238.92.124.104.in-addr.arpa domain name pointer a104-124-92-238.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
238.92.124.104.in-addr.arpa name = a104-124-92-238.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 216.218.206.85 | attackbots | Port probing on unauthorized port 2323 |
2020-02-23 00:45:46 |
| 198.12.156.154 | attackbots | A Potential Directory Traversal Attempt returned code 200 (success). |
2020-02-23 01:15:11 |
| 35.236.69.165 | attackspambots | Feb 22 18:01:53 pornomens sshd\[30793\]: Invalid user store from 35.236.69.165 port 45884 Feb 22 18:01:53 pornomens sshd\[30793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.236.69.165 Feb 22 18:01:55 pornomens sshd\[30793\]: Failed password for invalid user store from 35.236.69.165 port 45884 ssh2 ... |
2020-02-23 01:08:07 |
| 117.55.241.3 | attackspambots | suspicious action Sat, 22 Feb 2020 13:50:56 -0300 |
2020-02-23 01:16:49 |
| 20.185.8.59 | attackbotsspam | Feb 22 21:29:02 gw1 sshd[10492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.185.8.59 Feb 22 21:29:04 gw1 sshd[10492]: Failed password for invalid user docker from 20.185.8.59 port 33992 ssh2 ... |
2020-02-23 00:50:46 |
| 193.57.40.38 | attackspambots | " " |
2020-02-23 01:17:11 |
| 178.128.24.84 | attackbots | Feb 22 15:10:41 server sshd[3718563]: Failed password for invalid user test from 178.128.24.84 port 35378 ssh2 Feb 22 15:12:35 server sshd[3719755]: Failed password for invalid user openproject from 178.128.24.84 port 50576 ssh2 Feb 22 15:14:38 server sshd[3721046]: Failed password for invalid user bdc from 178.128.24.84 port 37540 ssh2 |
2020-02-23 00:53:20 |
| 222.186.175.140 | attack | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.140 user=root Failed password for root from 222.186.175.140 port 57328 ssh2 Failed password for root from 222.186.175.140 port 57328 ssh2 Failed password for root from 222.186.175.140 port 57328 ssh2 Failed password for root from 222.186.175.140 port 57328 ssh2 |
2020-02-23 00:41:54 |
| 222.186.180.223 | attackspam | Feb 22 18:04:41 MK-Soft-VM8 sshd[26896]: Failed password for root from 222.186.180.223 port 25500 ssh2 Feb 22 18:04:44 MK-Soft-VM8 sshd[26896]: Failed password for root from 222.186.180.223 port 25500 ssh2 ... |
2020-02-23 01:05:36 |
| 209.124.88.26 | attackspam | xmlrpc attack |
2020-02-23 00:44:00 |
| 156.236.119.117 | attack | Feb 22 16:39:02 mail sshd[17835]: Invalid user shiqian from 156.236.119.117 Feb 22 16:39:02 mail sshd[17835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.236.119.117 Feb 22 16:39:02 mail sshd[17835]: Invalid user shiqian from 156.236.119.117 Feb 22 16:39:04 mail sshd[17835]: Failed password for invalid user shiqian from 156.236.119.117 port 39510 ssh2 Feb 22 17:04:49 mail sshd[25253]: Invalid user infowarelab from 156.236.119.117 ... |
2020-02-23 00:34:45 |
| 181.30.28.59 | attackbotsspam | $f2bV_matches |
2020-02-23 00:36:00 |
| 188.131.204.154 | attack | Feb 22 17:24:41 localhost sshd\[17083\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.204.154 user=list Feb 22 17:24:43 localhost sshd\[17083\]: Failed password for list from 188.131.204.154 port 41000 ssh2 Feb 22 17:28:47 localhost sshd\[17479\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.204.154 user=backup |
2020-02-23 00:44:19 |
| 5.57.33.71 | attack | Feb 22 17:48:29 silence02 sshd[32763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.57.33.71 Feb 22 17:48:31 silence02 sshd[32763]: Failed password for invalid user userftp from 5.57.33.71 port 60512 ssh2 Feb 22 17:51:07 silence02 sshd[544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.57.33.71 |
2020-02-23 01:07:09 |
| 89.248.168.176 | attack | suspicious action Sat, 22 Feb 2020 13:51:03 -0300 |
2020-02-23 01:09:13 |