城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.82.247.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39210
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.82.247.244. IN A
;; AUTHORITY SECTION:
. 247 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400
;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:32:12 CST 2023
;; MSG SIZE rcvd: 107
244.247.82.104.in-addr.arpa domain name pointer a104-82-247-244.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
244.247.82.104.in-addr.arpa name = a104-82-247-244.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
49.69.83.194 | attack | 2222/tcp 22/tcp... [2020-08-23]8pkt,2pt.(tcp) |
2020-08-24 08:06:47 |
150.242.185.57 | attackbotsspam | 1433/tcp [2020-08-23]1pkt |
2020-08-24 08:04:52 |
51.15.118.15 | attack | 2020-08-23T20:25:51.079952abusebot-6.cloudsearch.cf sshd[11792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.118.15 user=root 2020-08-23T20:25:52.899324abusebot-6.cloudsearch.cf sshd[11792]: Failed password for root from 51.15.118.15 port 34880 ssh2 2020-08-23T20:29:11.006320abusebot-6.cloudsearch.cf sshd[11930]: Invalid user soma from 51.15.118.15 port 43702 2020-08-23T20:29:11.012767abusebot-6.cloudsearch.cf sshd[11930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.118.15 2020-08-23T20:29:11.006320abusebot-6.cloudsearch.cf sshd[11930]: Invalid user soma from 51.15.118.15 port 43702 2020-08-23T20:29:13.288507abusebot-6.cloudsearch.cf sshd[11930]: Failed password for invalid user soma from 51.15.118.15 port 43702 ssh2 2020-08-23T20:32:34.844146abusebot-6.cloudsearch.cf sshd[12028]: Invalid user mary from 51.15.118.15 port 52538 ... |
2020-08-24 07:58:04 |
161.35.77.82 | attackbotsspam | Failed password for invalid user pavel from 161.35.77.82 port 39844 ssh2 |
2020-08-24 07:52:07 |
89.215.193.74 | attackbotsspam | 445/tcp [2020-08-23]1pkt |
2020-08-24 07:52:35 |
109.197.72.73 | attackspam | 44574/tcp [2020-08-23]1pkt |
2020-08-24 07:44:04 |
218.92.0.246 | attackspambots | Aug 24 01:53:53 ns381471 sshd[1505]: Failed password for root from 218.92.0.246 port 49375 ssh2 Aug 24 01:53:57 ns381471 sshd[1505]: Failed password for root from 218.92.0.246 port 49375 ssh2 |
2020-08-24 07:57:06 |
61.177.172.61 | attackspam | Aug 24 01:24:54 ip106 sshd[14418]: Failed password for root from 61.177.172.61 port 33541 ssh2 Aug 24 01:24:58 ip106 sshd[14418]: Failed password for root from 61.177.172.61 port 33541 ssh2 ... |
2020-08-24 07:26:07 |
51.91.255.147 | attackbots | Aug 24 01:35:06 [host] sshd[20685]: Invalid user e Aug 24 01:35:07 [host] sshd[20685]: pam_unix(sshd: Aug 24 01:35:09 [host] sshd[20685]: Failed passwor |
2020-08-24 07:45:19 |
158.69.194.115 | attackbotsspam | SSH Brute-Forcing (server1) |
2020-08-24 07:30:31 |
49.235.153.220 | attackbots | Aug 23 23:26:57 OPSO sshd\[18301\]: Invalid user drl from 49.235.153.220 port 56990 Aug 23 23:26:57 OPSO sshd\[18301\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.153.220 Aug 23 23:26:59 OPSO sshd\[18301\]: Failed password for invalid user drl from 49.235.153.220 port 56990 ssh2 Aug 23 23:30:21 OPSO sshd\[19116\]: Invalid user pamela from 49.235.153.220 port 38180 Aug 23 23:30:21 OPSO sshd\[19116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.153.220 |
2020-08-24 07:39:59 |
46.9.167.197 | attack | Aug 23 23:04:43 ip-172-31-16-56 sshd\[21202\]: Invalid user abhijit from 46.9.167.197\ Aug 23 23:04:45 ip-172-31-16-56 sshd\[21202\]: Failed password for invalid user abhijit from 46.9.167.197 port 46028 ssh2\ Aug 23 23:09:36 ip-172-31-16-56 sshd\[21350\]: Invalid user webmaster from 46.9.167.197\ Aug 23 23:09:38 ip-172-31-16-56 sshd\[21350\]: Failed password for invalid user webmaster from 46.9.167.197 port 49726 ssh2\ Aug 23 23:14:16 ip-172-31-16-56 sshd\[21394\]: Failed password for root from 46.9.167.197 port 53425 ssh2\ |
2020-08-24 07:47:34 |
110.78.171.64 | attackspambots | 445/tcp [2020-08-23]1pkt |
2020-08-24 07:58:47 |
182.61.5.136 | attack | 2020-08-23T22:51:15.112172shield sshd\[15288\]: Invalid user john from 182.61.5.136 port 43016 2020-08-23T22:51:15.140149shield sshd\[15288\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.5.136 2020-08-23T22:51:17.946990shield sshd\[15288\]: Failed password for invalid user john from 182.61.5.136 port 43016 ssh2 2020-08-23T22:55:24.243513shield sshd\[15958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.5.136 user=root 2020-08-23T22:55:26.232548shield sshd\[15958\]: Failed password for root from 182.61.5.136 port 45722 ssh2 |
2020-08-24 07:43:07 |
221.227.12.95 | attack | 37215/tcp [2020-08-23]1pkt |
2020-08-24 07:31:47 |