城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.64.93.15
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41112
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.64.93.15. IN A
;; AUTHORITY SECTION:
. 117 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:16:47 CST 2023
;; MSG SIZE rcvd: 105
15.93.64.104.in-addr.arpa domain name pointer a104-64-93-15.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
15.93.64.104.in-addr.arpa name = a104-64-93-15.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
180.76.97.86 | attackspambots | Dec 15 23:25:48 vtv3 sshd[16618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.97.86 Dec 15 23:25:50 vtv3 sshd[16618]: Failed password for invalid user catholic from 180.76.97.86 port 50902 ssh2 Dec 15 23:32:00 vtv3 sshd[19473]: Failed password for root from 180.76.97.86 port 51986 ssh2 Dec 15 23:43:35 vtv3 sshd[24698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.97.86 Dec 15 23:43:37 vtv3 sshd[24698]: Failed password for invalid user skoglar from 180.76.97.86 port 54204 ssh2 Dec 15 23:49:33 vtv3 sshd[27702]: Failed password for root from 180.76.97.86 port 55402 ssh2 Dec 16 00:01:04 vtv3 sshd[1316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.97.86 Dec 16 00:01:05 vtv3 sshd[1316]: Failed password for invalid user stoelen from 180.76.97.86 port 57728 ssh2 Dec 16 00:06:55 vtv3 sshd[3973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty= |
2019-12-16 07:43:07 |
145.239.89.243 | attack | Dec 16 01:11:05 mail sshd[20415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.89.243 Dec 16 01:11:07 mail sshd[20415]: Failed password for invalid user maraszek from 145.239.89.243 port 43936 ssh2 Dec 16 01:16:10 mail sshd[22647]: Failed password for backup from 145.239.89.243 port 51346 ssh2 |
2019-12-16 08:18:31 |
222.186.3.249 | attackspambots | Dec 16 00:56:30 OPSO sshd\[24011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.3.249 user=root Dec 16 00:56:32 OPSO sshd\[24011\]: Failed password for root from 222.186.3.249 port 18279 ssh2 Dec 16 00:56:34 OPSO sshd\[24011\]: Failed password for root from 222.186.3.249 port 18279 ssh2 Dec 16 00:56:36 OPSO sshd\[24011\]: Failed password for root from 222.186.3.249 port 18279 ssh2 Dec 16 00:58:25 OPSO sshd\[24326\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.3.249 user=root |
2019-12-16 08:06:24 |
111.231.139.30 | attackbotsspam | Dec 16 00:49:29 vps691689 sshd[31361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.139.30 Dec 16 00:49:30 vps691689 sshd[31361]: Failed password for invalid user spurway from 111.231.139.30 port 37194 ssh2 ... |
2019-12-16 08:10:28 |
46.38.144.57 | attackspambots | Dec 16 00:32:20 s1 postfix/submission/smtpd\[4002\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 16 00:32:48 s1 postfix/submission/smtpd\[4002\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 16 00:33:16 s1 postfix/submission/smtpd\[25926\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 16 00:33:43 s1 postfix/submission/smtpd\[5843\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 16 00:34:11 s1 postfix/submission/smtpd\[4002\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 16 00:34:39 s1 postfix/submission/smtpd\[4002\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 16 00:35:07 s1 postfix/submission/smtpd\[4836\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 16 00:35:34 s1 postfix/submission/smtpd\[5843\]: warning: unknown\[46.38.144.57\] |
2019-12-16 07:54:44 |
37.49.230.64 | attack | Portscan or hack attempt detected by psad/fwsnort |
2019-12-16 08:05:47 |
106.13.139.163 | attack | Dec 16 00:30:11 ns3042688 sshd\[15817\]: Invalid user user from 106.13.139.163 Dec 16 00:30:11 ns3042688 sshd\[15817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.163 Dec 16 00:30:13 ns3042688 sshd\[15817\]: Failed password for invalid user user from 106.13.139.163 port 44352 ssh2 Dec 16 00:36:49 ns3042688 sshd\[18843\]: Invalid user apache from 106.13.139.163 Dec 16 00:36:49 ns3042688 sshd\[18843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.163 ... |
2019-12-16 07:52:24 |
114.219.56.124 | attack | 2019-12-15T23:38:14.250416abusebot-6.cloudsearch.cf sshd\[25224\]: Invalid user ftpuser from 114.219.56.124 port 49340 2019-12-15T23:38:14.255743abusebot-6.cloudsearch.cf sshd\[25224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.219.56.124 2019-12-15T23:38:16.498733abusebot-6.cloudsearch.cf sshd\[25224\]: Failed password for invalid user ftpuser from 114.219.56.124 port 49340 ssh2 2019-12-15T23:45:06.344488abusebot-6.cloudsearch.cf sshd\[25360\]: Invalid user doomi from 114.219.56.124 port 48620 |
2019-12-16 08:13:37 |
106.12.86.205 | attackbotsspam | $f2bV_matches |
2019-12-16 07:43:25 |
193.56.28.244 | attackspam | Dec 15 17:48:46 web1 postfix/smtpd[1292]: warning: unknown[193.56.28.244]: SASL LOGIN authentication failed: authentication failure Dec 15 17:48:47 web1 postfix/smtpd[1292]: warning: unknown[193.56.28.244]: SASL LOGIN authentication failed: authentication failure Dec 15 17:48:50 web1 postfix/smtpd[1292]: warning: unknown[193.56.28.244]: SASL LOGIN authentication failed: authentication failure Dec 15 17:48:51 web1 postfix/smtpd[1292]: warning: unknown[193.56.28.244]: SASL LOGIN authentication failed: authentication failure Dec 15 17:48:53 web1 postfix/smtpd[1292]: warning: unknown[193.56.28.244]: SASL LOGIN authentication failed: authentication failure ... |
2019-12-16 08:09:51 |
177.103.254.24 | attackbotsspam | Dec 15 13:34:04 tdfoods sshd\[9045\]: Invalid user tomato from 177.103.254.24 Dec 15 13:34:04 tdfoods sshd\[9045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.103.254.24 Dec 15 13:34:06 tdfoods sshd\[9045\]: Failed password for invalid user tomato from 177.103.254.24 port 55514 ssh2 Dec 15 13:40:33 tdfoods sshd\[9710\]: Invalid user info from 177.103.254.24 Dec 15 13:40:34 tdfoods sshd\[9710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.103.254.24 |
2019-12-16 07:41:29 |
175.207.13.200 | attack | Dec 16 01:03:28 meumeu sshd[21797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.207.13.200 Dec 16 01:03:29 meumeu sshd[21797]: Failed password for invalid user guest666 from 175.207.13.200 port 54906 ssh2 Dec 16 01:10:12 meumeu sshd[22821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.207.13.200 ... |
2019-12-16 08:10:15 |
198.108.67.93 | attackspambots | Dec 15 23:48:44 debian-2gb-nbg1-2 kernel: \[102912.756466\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=198.108.67.93 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=37 ID=5998 PROTO=TCP SPT=47379 DPT=9096 WINDOW=1024 RES=0x00 SYN URGP=0 |
2019-12-16 08:21:19 |
190.202.54.12 | attackbots | Dec 15 13:03:38 php1 sshd\[11128\]: Invalid user kafka from 190.202.54.12 Dec 15 13:03:38 php1 sshd\[11128\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.202.54.12 Dec 15 13:03:40 php1 sshd\[11128\]: Failed password for invalid user kafka from 190.202.54.12 port 29870 ssh2 Dec 15 13:10:46 php1 sshd\[12337\]: Invalid user asterisk from 190.202.54.12 Dec 15 13:10:46 php1 sshd\[12337\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.202.54.12 |
2019-12-16 07:44:28 |
40.92.69.11 | attackspambots | Dec 16 01:49:04 debian-2gb-vpn-nbg1-1 kernel: [828515.395043] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.69.11 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=52069 DF PROTO=TCP SPT=58246 DPT=25 WINDOW=0 RES=0x00 ACK RST URGP=0 |
2019-12-16 08:02:29 |