城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.162.118.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10199
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.162.118.104. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021501 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 02:11:19 CST 2025
;; MSG SIZE rcvd: 108
104.118.162.104.in-addr.arpa domain name pointer syn-104-162-118-104.res.spectrum.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
104.118.162.104.in-addr.arpa name = syn-104-162-118-104.res.spectrum.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 45.224.169.224 | attackbots | Sep 14 18:25:03 mail.srvfarm.net postfix/smtpd[2071658]: warning: unknown[45.224.169.224]: SASL PLAIN authentication failed: Sep 14 18:25:04 mail.srvfarm.net postfix/smtpd[2071658]: lost connection after AUTH from unknown[45.224.169.224] Sep 14 18:28:32 mail.srvfarm.net postfix/smtps/smtpd[2072199]: warning: unknown[45.224.169.224]: SASL PLAIN authentication failed: Sep 14 18:28:33 mail.srvfarm.net postfix/smtps/smtpd[2072199]: lost connection after AUTH from unknown[45.224.169.224] Sep 14 18:34:30 mail.srvfarm.net postfix/smtps/smtpd[2075766]: warning: unknown[45.224.169.224]: SASL PLAIN authentication failed: |
2020-09-15 07:26:00 |
| 43.224.182.238 | attack | Sep 14 18:12:43 mail.srvfarm.net postfix/smtps/smtpd[2072918]: warning: unknown[43.224.182.238]: SASL PLAIN authentication failed: Sep 14 18:12:43 mail.srvfarm.net postfix/smtps/smtpd[2072918]: lost connection after AUTH from unknown[43.224.182.238] Sep 14 18:14:59 mail.srvfarm.net postfix/smtps/smtpd[2073110]: warning: unknown[43.224.182.238]: SASL PLAIN authentication failed: Sep 14 18:14:59 mail.srvfarm.net postfix/smtps/smtpd[2073110]: lost connection after AUTH from unknown[43.224.182.238] Sep 14 18:18:37 mail.srvfarm.net postfix/smtpd[2071338]: warning: unknown[43.224.182.238]: SASL PLAIN authentication failed: |
2020-09-15 07:26:17 |
| 161.35.148.75 | attackspam | Sep 14 22:46:38 ajax sshd[4242]: Failed password for root from 161.35.148.75 port 52358 ssh2 |
2020-09-15 07:31:00 |
| 54.39.151.44 | attackspambots | Sep 14 15:55:22 Tower sshd[43001]: Connection from 54.39.151.44 port 42432 on 192.168.10.220 port 22 rdomain "" Sep 14 15:55:22 Tower sshd[43001]: Failed password for root from 54.39.151.44 port 42432 ssh2 Sep 14 15:55:22 Tower sshd[43001]: Received disconnect from 54.39.151.44 port 42432:11: Bye Bye [preauth] Sep 14 15:55:22 Tower sshd[43001]: Disconnected from authenticating user root 54.39.151.44 port 42432 [preauth] |
2020-09-15 07:58:55 |
| 46.105.227.206 | attackspam | $f2bV_matches |
2020-09-15 07:57:12 |
| 43.239.220.52 | attackspambots | Sep 14 20:04:54 mout sshd[23831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.239.220.52 user=root Sep 14 20:04:56 mout sshd[23831]: Failed password for root from 43.239.220.52 port 59335 ssh2 |
2020-09-15 07:54:50 |
| 93.243.56.215 | attackspambots | 2020-09-15T05:57:43.150344billing sshd[19525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=p5df338d7.dip0.t-ipconnect.de 2020-09-15T05:57:43.145063billing sshd[19525]: Invalid user admin from 93.243.56.215 port 45276 2020-09-15T05:57:44.968828billing sshd[19525]: Failed password for invalid user admin from 93.243.56.215 port 45276 ssh2 ... |
2020-09-15 07:39:53 |
| 162.243.22.191 | attackbots | Time: Mon Sep 14 17:17:27 2020 +0000 IP: 162.243.22.191 (US/United States/srv02.ny.sv3.us) Failures: 5 (sshd) Interval: 3600 seconds Blocked: Permanent Block [LF_SSHD] Log entries: Sep 14 16:58:31 ca-48-ede1 sshd[14260]: Invalid user jag from 162.243.22.191 port 47179 Sep 14 16:58:33 ca-48-ede1 sshd[14260]: Failed password for invalid user jag from 162.243.22.191 port 47179 ssh2 Sep 14 17:08:41 ca-48-ede1 sshd[14637]: Failed password for root from 162.243.22.191 port 47769 ssh2 Sep 14 17:12:49 ca-48-ede1 sshd[14794]: Failed password for root from 162.243.22.191 port 49476 ssh2 Sep 14 17:17:25 ca-48-ede1 sshd[14957]: Invalid user maill from 162.243.22.191 port 51184 |
2020-09-15 07:46:22 |
| 217.19.154.220 | attack | Invalid user fax from 217.19.154.220 port 37124 |
2020-09-15 08:00:00 |
| 35.226.225.113 | attackbotsspam | Sep 15 02:44:06 www sshd\[61103\]: Invalid user telecomadmin from 35.226.225.113 Sep 15 02:44:06 www sshd\[61103\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.226.225.113 Sep 15 02:44:07 www sshd\[61103\]: Failed password for invalid user telecomadmin from 35.226.225.113 port 33224 ssh2 ... |
2020-09-15 07:45:42 |
| 45.141.84.72 | attackspam | Unauthorized connection attempt from IP address 45.141.84.72 on Port 143(IMAP) |
2020-09-15 07:53:55 |
| 167.114.103.140 | attackspam | Sep 15 01:23:28 * sshd[7379]: Failed password for root from 167.114.103.140 port 44207 ssh2 |
2020-09-15 07:50:08 |
| 139.215.217.180 | attackbots | Sep 14 23:59:08 itv-usvr-01 sshd[2350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.215.217.180 user=root Sep 14 23:59:10 itv-usvr-01 sshd[2350]: Failed password for root from 139.215.217.180 port 33351 ssh2 |
2020-09-15 07:34:20 |
| 159.65.30.66 | attackbots | Sep 15 00:59:43 ip106 sshd[13020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.30.66 Sep 15 00:59:45 ip106 sshd[13020]: Failed password for invalid user avanthi from 159.65.30.66 port 52010 ssh2 ... |
2020-09-15 07:31:26 |
| 54.39.147.2 | attackspambots | SSH BruteForce Attack |
2020-09-15 07:37:27 |