城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.89.243.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12805
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.89.243.142. IN A
;; AUTHORITY SECTION:
. 491 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:34:26 CST 2023
;; MSG SIZE rcvd: 107
142.243.89.104.in-addr.arpa domain name pointer a104-89-243-142.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
142.243.89.104.in-addr.arpa name = a104-89-243-142.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 114.40.147.249 | attack | Port Scan detected! ... |
2020-05-28 17:43:11 |
| 198.211.126.138 | attackbotsspam | 2020-05-28T08:08:17.739017randservbullet-proofcloud-66.localdomain sshd[21033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.126.138 user=root 2020-05-28T08:08:20.198808randservbullet-proofcloud-66.localdomain sshd[21033]: Failed password for root from 198.211.126.138 port 33760 ssh2 2020-05-28T08:21:24.738107randservbullet-proofcloud-66.localdomain sshd[21086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.126.138 user=ftp 2020-05-28T08:21:26.906691randservbullet-proofcloud-66.localdomain sshd[21086]: Failed password for ftp from 198.211.126.138 port 33872 ssh2 ... |
2020-05-28 17:23:41 |
| 64.59.136.142 | attackbotsspam | SSH login attempts. |
2020-05-28 18:00:46 |
| 77.238.185.51 | attackbots | SSH login attempts. |
2020-05-28 17:56:35 |
| 106.13.176.163 | attackbotsspam | May 28 09:15:40 minden010 sshd[439]: Failed password for root from 106.13.176.163 port 56576 ssh2 May 28 09:17:10 minden010 sshd[971]: Failed password for root from 106.13.176.163 port 45370 ssh2 May 28 09:18:42 minden010 sshd[1230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.176.163 ... |
2020-05-28 17:55:02 |
| 2a01:4f8:191:8463::2 | attack | 20 attempts against mh-misbehave-ban on cell |
2020-05-28 17:30:52 |
| 94.191.66.227 | attack | Brute force attempt |
2020-05-28 17:59:57 |
| 92.222.75.80 | attackbots | Invalid user ioana from 92.222.75.80 port 40360 |
2020-05-28 17:50:38 |
| 61.92.148.114 | attackspam | May 28 09:12:43 srv-ubuntu-dev3 sshd[91218]: Invalid user nasa from 61.92.148.114 May 28 09:12:43 srv-ubuntu-dev3 sshd[91218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.92.148.114 May 28 09:12:43 srv-ubuntu-dev3 sshd[91218]: Invalid user nasa from 61.92.148.114 May 28 09:12:45 srv-ubuntu-dev3 sshd[91218]: Failed password for invalid user nasa from 61.92.148.114 port 59994 ssh2 May 28 09:16:26 srv-ubuntu-dev3 sshd[91823]: Invalid user zhaowei from 61.92.148.114 May 28 09:16:26 srv-ubuntu-dev3 sshd[91823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.92.148.114 May 28 09:16:26 srv-ubuntu-dev3 sshd[91823]: Invalid user zhaowei from 61.92.148.114 May 28 09:16:28 srv-ubuntu-dev3 sshd[91823]: Failed password for invalid user zhaowei from 61.92.148.114 port 36510 ssh2 May 28 09:20:05 srv-ubuntu-dev3 sshd[92333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost= ... |
2020-05-28 17:21:16 |
| 150.223.13.155 | attack | May 28 07:59:30 buvik sshd[11139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.223.13.155 user=root May 28 07:59:32 buvik sshd[11139]: Failed password for root from 150.223.13.155 port 45872 ssh2 May 28 08:03:19 buvik sshd[12203]: Invalid user ubuntu from 150.223.13.155 ... |
2020-05-28 17:27:43 |
| 106.12.12.242 | attack | Invalid user stef from 106.12.12.242 port 34176 |
2020-05-28 17:59:31 |
| 154.16.246.84 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-05-28 17:54:01 |
| 106.54.11.34 | attackspambots | May 28 11:06:25 vpn01 sshd[12999]: Failed password for root from 106.54.11.34 port 38486 ssh2 ... |
2020-05-28 17:24:06 |
| 187.222.245.85 | attack | SSH login attempts. |
2020-05-28 17:57:48 |
| 61.72.255.26 | attack | 21 attempts against mh-ssh on cloud |
2020-05-28 17:31:30 |