城市(city): unknown
省份(region): unknown
国家(country): South Africa
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.64.242.96
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57721
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.64.242.96. IN A
;; AUTHORITY SECTION:
. 412 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:16:56 CST 2023
;; MSG SIZE rcvd: 106
96.242.64.104.in-addr.arpa domain name pointer a104-64-242-96.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
96.242.64.104.in-addr.arpa name = a104-64-242-96.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 159.65.255.153 | attackbotsspam | Sep 16 03:45:44 server sshd\[13299\]: Invalid user engin from 159.65.255.153 port 38522 Sep 16 03:45:44 server sshd\[13299\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.255.153 Sep 16 03:45:45 server sshd\[13299\]: Failed password for invalid user engin from 159.65.255.153 port 38522 ssh2 Sep 16 03:49:25 server sshd\[15698\]: Invalid user testuser from 159.65.255.153 port 53156 Sep 16 03:49:25 server sshd\[15698\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.255.153 |
2019-09-16 08:51:52 |
| 52.183.10.160 | attackspam | Sep 14 02:15:49 nbi-636 sshd[15897]: Invalid user abcd from 52.183.10.160 port 38025 Sep 14 02:15:52 nbi-636 sshd[15897]: Failed password for invalid user abcd from 52.183.10.160 port 38025 ssh2 Sep 14 02:15:52 nbi-636 sshd[15897]: Received disconnect from 52.183.10.160 port 38025:11: Bye Bye [preauth] Sep 14 02:15:52 nbi-636 sshd[15897]: Disconnected from 52.183.10.160 port 38025 [preauth] Sep 14 02:25:38 nbi-636 sshd[18779]: Invalid user admin from 52.183.10.160 port 44860 Sep 14 02:25:40 nbi-636 sshd[18779]: Failed password for invalid user admin from 52.183.10.160 port 44860 ssh2 Sep 14 02:25:40 nbi-636 sshd[18779]: Received disconnect from 52.183.10.160 port 44860:11: Bye Bye [preauth] Sep 14 02:25:40 nbi-636 sshd[18779]: Disconnected from 52.183.10.160 port 44860 [preauth] Sep 14 02:29:28 nbi-636 sshd[19786]: Invalid user xh from 52.183.10.160 port 44178 Sep 14 02:29:31 nbi-636 sshd[19786]: Failed password for invalid user xh from 52.183.10.160 port 44178 ssh2 Sep........ ------------------------------- |
2019-09-16 09:09:08 |
| 118.25.189.123 | attack | Automatic report - Banned IP Access |
2019-09-16 08:54:24 |
| 191.7.152.13 | attackbots | Sep 15 21:04:05 vps200512 sshd\[20924\]: Invalid user kurt from 191.7.152.13 Sep 15 21:04:05 vps200512 sshd\[20924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.7.152.13 Sep 15 21:04:08 vps200512 sshd\[20924\]: Failed password for invalid user kurt from 191.7.152.13 port 40886 ssh2 Sep 15 21:08:51 vps200512 sshd\[20981\]: Invalid user arrowbaz from 191.7.152.13 Sep 15 21:08:51 vps200512 sshd\[20981\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.7.152.13 |
2019-09-16 09:30:52 |
| 83.67.188.47 | attackspam | Automatic report - Port Scan Attack |
2019-09-16 09:27:49 |
| 103.94.103.14 | attack | firewall-block, port(s): 445/tcp |
2019-09-16 09:09:41 |
| 222.186.42.241 | attack | SSH Brute Force, server-1 sshd[8258]: Failed password for root from 222.186.42.241 port 57204 ssh2 |
2019-09-16 09:18:59 |
| 183.131.82.99 | attackbots | Automated report - ssh fail2ban: Sep 16 02:37:19 wrong password, user=root, port=58908, ssh2 Sep 16 02:37:22 wrong password, user=root, port=58908, ssh2 Sep 16 02:37:24 wrong password, user=root, port=58908, ssh2 |
2019-09-16 09:18:05 |
| 192.241.141.151 | attackspam | Sep 14 02:26:34 xxxxxxx0 sshd[30773]: Invalid user ubnt from 192.241.141.151 port 49836 Sep 14 02:26:36 xxxxxxx0 sshd[30773]: Failed password for invalid user ubnt from 192.241.141.151 port 49836 ssh2 Sep 14 02:30:21 xxxxxxx0 sshd[31418]: Invalid user squid from 192.241.141.151 port 39760 Sep 14 02:30:24 xxxxxxx0 sshd[31418]: Failed password for invalid user squid from 192.241.141.151 port 39760 ssh2 Sep 14 02:34:04 xxxxxxx0 sshd[31989]: Invalid user willshao from 192.241.141.151 port 57496 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=192.241.141.151 |
2019-09-16 09:19:20 |
| 129.213.96.241 | attackspambots | Sep 15 15:00:39 auw2 sshd\[30537\]: Invalid user 123qaz from 129.213.96.241 Sep 15 15:00:39 auw2 sshd\[30537\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.96.241 Sep 15 15:00:41 auw2 sshd\[30537\]: Failed password for invalid user 123qaz from 129.213.96.241 port 22393 ssh2 Sep 15 15:04:55 auw2 sshd\[30914\]: Invalid user superman from 129.213.96.241 Sep 15 15:04:55 auw2 sshd\[30914\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.96.241 |
2019-09-16 09:13:37 |
| 202.169.62.187 | attack | Sep 16 01:05:44 Ubuntu-1404-trusty-64-minimal sshd\[23023\]: Invalid user deploy4 from 202.169.62.187 Sep 16 01:05:44 Ubuntu-1404-trusty-64-minimal sshd\[23023\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.169.62.187 Sep 16 01:05:45 Ubuntu-1404-trusty-64-minimal sshd\[23023\]: Failed password for invalid user deploy4 from 202.169.62.187 port 45576 ssh2 Sep 16 01:20:11 Ubuntu-1404-trusty-64-minimal sshd\[2068\]: Invalid user server from 202.169.62.187 Sep 16 01:20:11 Ubuntu-1404-trusty-64-minimal sshd\[2068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.169.62.187 |
2019-09-16 08:59:45 |
| 220.129.232.157 | attack | Telnet Server BruteForce Attack |
2019-09-16 09:15:04 |
| 223.13.37.109 | attackbots | CN - 1H : (344) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : CN NAME ASN : ASN4134 IP : 223.13.37.109 CIDR : 223.12.0.0/15 PREFIX COUNT : 5430 UNIQUE IP COUNT : 106919680 WYKRYTE ATAKI Z ASN4134 : 1H - 5 3H - 17 6H - 30 12H - 59 24H - 126 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN - data recovery https://help-dysk.pl |
2019-09-16 09:17:37 |
| 195.224.173.133 | attackbotsspam | firewall-block, port(s): 7/tcp, 19/tcp, 20/tcp, 21/tcp, 22/tcp |
2019-09-16 08:58:37 |
| 106.12.120.79 | attack | Sep 15 21:04:21 vps200512 sshd\[20926\]: Invalid user dfk from 106.12.120.79 Sep 15 21:04:21 vps200512 sshd\[20926\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.120.79 Sep 15 21:04:23 vps200512 sshd\[20926\]: Failed password for invalid user dfk from 106.12.120.79 port 41504 ssh2 Sep 15 21:08:15 vps200512 sshd\[20971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.120.79 user=ubuntu Sep 15 21:08:17 vps200512 sshd\[20971\]: Failed password for ubuntu from 106.12.120.79 port 45562 ssh2 |
2019-09-16 09:26:59 |