城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.74.242.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21422
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.74.242.213. IN A
;; AUTHORITY SECTION:
. 547 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400
;; Query time: 167 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:20:55 CST 2023
;; MSG SIZE rcvd: 107
213.242.74.104.in-addr.arpa domain name pointer a104-74-242-213.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
213.242.74.104.in-addr.arpa name = a104-74-242-213.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
35.203.148.246 | attack | Invalid user vdi from 35.203.148.246 port 38110 |
2019-08-15 20:31:27 |
177.11.238.124 | attackbots | Caught in portsentry honeypot |
2019-08-15 21:06:16 |
49.69.127.24 | attackbotsspam | Automatic report - Port Scan Attack |
2019-08-15 20:40:01 |
128.199.88.176 | attackbots | SSH Brute Force, server-1 sshd[1457]: Failed password for invalid user ramiro from 128.199.88.176 port 49656 ssh2 |
2019-08-15 20:49:46 |
108.62.70.179 | attack | 108.62.70.179 - - [15/Aug/2019:04:52:30 -0400] "GET /?page=products&action=..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd%00&linkID=10296 HTTP/1.1" 200 17663 "https://faucetsupply.com/?page=products&action=..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd%00&linkID=10296" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0" ... |
2019-08-15 21:04:09 |
41.33.119.67 | attackbots | Aug 15 14:41:44 root sshd[24448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.33.119.67 Aug 15 14:41:46 root sshd[24448]: Failed password for invalid user tomcat from 41.33.119.67 port 10175 ssh2 Aug 15 14:46:31 root sshd[24478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.33.119.67 ... |
2019-08-15 20:51:27 |
62.234.55.241 | attackbots | Aug 15 16:22:44 microserver sshd[43322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.55.241 user=ntp Aug 15 16:22:46 microserver sshd[43322]: Failed password for ntp from 62.234.55.241 port 39160 ssh2 Aug 15 16:25:08 microserver sshd[43586]: Invalid user werner from 62.234.55.241 port 59542 Aug 15 16:25:08 microserver sshd[43586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.55.241 Aug 15 16:25:10 microserver sshd[43586]: Failed password for invalid user werner from 62.234.55.241 port 59542 ssh2 |
2019-08-15 20:35:00 |
180.168.5.182 | attackspam | Unauthorised access (Aug 15) SRC=180.168.5.182 LEN=48 PREC=0x20 TTL=102 ID=12456 DF TCP DPT=1433 WINDOW=8192 SYN |
2019-08-15 20:37:02 |
202.138.242.121 | attackspambots | Aug 15 02:09:59 web9 sshd\[26350\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.138.242.121 user=mysql Aug 15 02:10:00 web9 sshd\[26350\]: Failed password for mysql from 202.138.242.121 port 43046 ssh2 Aug 15 02:15:44 web9 sshd\[27399\]: Invalid user omsagent from 202.138.242.121 Aug 15 02:15:44 web9 sshd\[27399\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.138.242.121 Aug 15 02:15:46 web9 sshd\[27399\]: Failed password for invalid user omsagent from 202.138.242.121 port 36398 ssh2 |
2019-08-15 20:22:52 |
90.156.152.63 | attackbots | Aug 15 14:41:30 nextcloud sshd\[31497\]: Invalid user xray from 90.156.152.63 Aug 15 14:41:30 nextcloud sshd\[31497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.156.152.63 Aug 15 14:41:32 nextcloud sshd\[31497\]: Failed password for invalid user xray from 90.156.152.63 port 51876 ssh2 ... |
2019-08-15 21:02:55 |
5.39.79.48 | attackspambots | Aug 15 14:44:46 tux-35-217 sshd\[30520\]: Invalid user hhh from 5.39.79.48 port 59580 Aug 15 14:44:46 tux-35-217 sshd\[30520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.79.48 Aug 15 14:44:48 tux-35-217 sshd\[30520\]: Failed password for invalid user hhh from 5.39.79.48 port 59580 ssh2 Aug 15 14:49:34 tux-35-217 sshd\[30544\]: Invalid user photon from 5.39.79.48 port 55921 Aug 15 14:49:34 tux-35-217 sshd\[30544\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.79.48 ... |
2019-08-15 20:51:58 |
200.170.139.169 | attackbotsspam | 2019-08-15T19:37:53.633704enmeeting.mahidol.ac.th sshd\[1018\]: Invalid user hadoop from 200.170.139.169 port 43826 2019-08-15T19:37:53.648589enmeeting.mahidol.ac.th sshd\[1018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.170.139.169 2019-08-15T19:37:56.029843enmeeting.mahidol.ac.th sshd\[1018\]: Failed password for invalid user hadoop from 200.170.139.169 port 43826 ssh2 ... |
2019-08-15 20:44:12 |
195.74.254.98 | attackbots | Telnet Server BruteForce Attack |
2019-08-15 21:05:40 |
147.91.71.165 | attack | Aug 15 09:24:28 XXXXXX sshd[8588]: Invalid user peterd from 147.91.71.165 port 44854 |
2019-08-15 21:11:07 |
190.94.140.95 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-08-15 21:08:43 |