城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.81.132.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53844
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.81.132.48. IN A
;; AUTHORITY SECTION:
. 475 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022031500 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 16 02:09:48 CST 2022
;; MSG SIZE rcvd: 106
48.132.81.104.in-addr.arpa domain name pointer a104-81-132-48.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
48.132.81.104.in-addr.arpa name = a104-81-132-48.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 45.143.220.130 | attackspam | " " |
2020-07-05 05:15:52 |
| 176.31.102.37 | attackspam | Jul 4 22:28:47 lnxweb61 sshd[759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.102.37 Jul 4 22:28:47 lnxweb61 sshd[759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.102.37 |
2020-07-05 04:43:23 |
| 106.124.142.206 | attackspambots | Jul 4 22:21:41 srv-ubuntu-dev3 sshd[99272]: Invalid user andrew from 106.124.142.206 Jul 4 22:21:41 srv-ubuntu-dev3 sshd[99272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.142.206 Jul 4 22:21:41 srv-ubuntu-dev3 sshd[99272]: Invalid user andrew from 106.124.142.206 Jul 4 22:21:43 srv-ubuntu-dev3 sshd[99272]: Failed password for invalid user andrew from 106.124.142.206 port 46347 ssh2 Jul 4 22:25:10 srv-ubuntu-dev3 sshd[99806]: Invalid user enlace from 106.124.142.206 Jul 4 22:25:10 srv-ubuntu-dev3 sshd[99806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.142.206 Jul 4 22:25:10 srv-ubuntu-dev3 sshd[99806]: Invalid user enlace from 106.124.142.206 Jul 4 22:25:12 srv-ubuntu-dev3 sshd[99806]: Failed password for invalid user enlace from 106.124.142.206 port 43018 ssh2 Jul 4 22:28:14 srv-ubuntu-dev3 sshd[100313]: Invalid user forge from 106.124.142.206 ... |
2020-07-05 05:19:53 |
| 34.70.53.164 | attackspambots | 21 attempts against mh-ssh on crop |
2020-07-05 04:44:13 |
| 138.197.25.187 | attackspambots | 2020-07-05T03:28:29.948854hostname sshd[62733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.25.187 user=root 2020-07-05T03:28:32.031573hostname sshd[62733]: Failed password for root from 138.197.25.187 port 46358 ssh2 ... |
2020-07-05 04:57:51 |
| 101.53.101.16 | attackspam | port scan and connect, tcp 1433 (ms-sql-s) |
2020-07-05 04:59:36 |
| 122.160.233.137 | attackbotsspam | Icarus honeypot on github |
2020-07-05 04:49:55 |
| 144.76.29.148 | attackbots | 20 attempts against mh-misbehave-ban on pluto |
2020-07-05 04:54:40 |
| 193.29.15.169 | attackbotsspam | Port scan: Attack repeated for 24 hours |
2020-07-05 05:10:31 |
| 139.59.254.93 | attackspam | Jul 4 17:28:27 firewall sshd[14512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.254.93 Jul 4 17:28:27 firewall sshd[14512]: Invalid user mina from 139.59.254.93 Jul 4 17:28:29 firewall sshd[14512]: Failed password for invalid user mina from 139.59.254.93 port 44369 ssh2 ... |
2020-07-05 05:03:40 |
| 196.221.197.181 | attack | DATE:2020-07-04 22:28:13, IP:196.221.197.181, PORT:1433 - MSSQL brute force auth on a honeypot server (epe-dc) |
2020-07-05 05:20:45 |
| 112.85.42.176 | attack | Jul 4 22:57:11 vm0 sshd[17113]: Failed password for root from 112.85.42.176 port 2969 ssh2 Jul 4 22:57:25 vm0 sshd[17113]: error: maximum authentication attempts exceeded for root from 112.85.42.176 port 2969 ssh2 [preauth] ... |
2020-07-05 04:59:07 |
| 167.172.164.37 | attackbots | Jul 4 22:28:20 ns41 sshd[30770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.164.37 |
2020-07-05 05:13:02 |
| 193.70.38.187 | attack | Jul 4 23:45:29 ift sshd\[65243\]: Failed password for root from 193.70.38.187 port 55760 ssh2Jul 4 23:48:38 ift sshd\[436\]: Invalid user soporte from 193.70.38.187Jul 4 23:48:40 ift sshd\[436\]: Failed password for invalid user soporte from 193.70.38.187 port 53924 ssh2Jul 4 23:51:49 ift sshd\[1015\]: Failed password for root from 193.70.38.187 port 52086 ssh2Jul 4 23:54:51 ift sshd\[1321\]: Invalid user deamon from 193.70.38.187 ... |
2020-07-05 04:59:57 |
| 80.254.104.24 | attackbotsspam | 20/7/4@16:28:40: FAIL: Alarm-Network address from=80.254.104.24 ... |
2020-07-05 04:51:22 |