城市(city): Wetumpka
省份(region): Alabama
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.137.4.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29693
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.137.4.140. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025062800 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 19:40:45 CST 2025
;; MSG SIZE rcvd: 106
140.4.137.104.in-addr.arpa domain name pointer syn-104-137-004-140.res.spectrum.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
140.4.137.104.in-addr.arpa name = syn-104-137-004-140.res.spectrum.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 176.212.104.19 | attackspam | port 23 |
2020-10-04 23:30:30 |
| 107.77.202.13 | attackbotsspam | Chat Spam |
2020-10-04 23:24:54 |
| 80.237.28.146 | attackspam | SMB Server BruteForce Attack |
2020-10-04 23:29:34 |
| 190.203.88.235 | attack | 445/tcp [2020-10-03]1pkt |
2020-10-04 23:49:17 |
| 47.176.38.253 | attackbots | Brute%20Force%20SSH |
2020-10-04 23:40:17 |
| 188.170.13.225 | attackbotsspam | Unauthorized SSH login attempts |
2020-10-04 23:39:54 |
| 118.43.97.168 | attackspambots | Automatic report - Banned IP Access |
2020-10-04 23:44:18 |
| 18.139.162.95 | attackspambots | Brute Force |
2020-10-04 23:35:23 |
| 173.255.243.28 | attackbots |
|
2020-10-04 23:31:24 |
| 112.85.42.117 | attackspam | Failed password for root from 112.85.42.117 port 1332 ssh2 Failed password for root from 112.85.42.117 port 1332 ssh2 Failed password for root from 112.85.42.117 port 1332 ssh2 Failed password for root from 112.85.42.117 port 1332 ssh2 |
2020-10-04 23:09:52 |
| 130.162.71.237 | attackspambots | Bruteforce detected by fail2ban |
2020-10-04 23:08:19 |
| 36.81.81.40 | attackspam | 139/tcp 445/tcp [2020-10-01]2pkt |
2020-10-04 23:24:31 |
| 118.70.176.193 | attackbotsspam | 139/tcp 139/tcp 445/tcp [2020-10-01]3pkt |
2020-10-04 23:20:19 |
| 168.194.13.4 | attackspambots | Oct 4 12:55:19 *** sshd[27129]: User root from 168.194.13.4 not allowed because not listed in AllowUsers |
2020-10-04 23:15:24 |
| 35.204.152.99 | attack | (mod_security) mod_security (id:5000135) triggered by 35.204.152.99 (NL/Netherlands/99.152.204.35.bc.googleusercontent.com): 5 in the last 14400 secs; ID: zul |
2020-10-04 23:43:59 |