城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.89.52.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54062
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.89.52.49. IN A
;; AUTHORITY SECTION:
. 450 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400
;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:34:31 CST 2023
;; MSG SIZE rcvd: 105
49.52.89.104.in-addr.arpa domain name pointer a104-89-52-49.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
49.52.89.104.in-addr.arpa name = a104-89-52-49.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
116.232.16.70 | attackspam | Jan 15 04:38:19 localhost sshd\[15233\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.232.16.70 user=root Jan 15 04:38:21 localhost sshd\[15233\]: Failed password for root from 116.232.16.70 port 60390 ssh2 Jan 15 04:51:20 localhost sshd\[15418\]: Invalid user user from 116.232.16.70 port 58934 ... |
2020-01-15 16:49:06 |
122.51.60.228 | attack | Unauthorized connection attempt detected from IP address 122.51.60.228 to port 2220 [J] |
2020-01-15 16:39:27 |
36.81.172.39 | attackbotsspam | 1579063905 - 01/15/2020 05:51:45 Host: 36.81.172.39/36.81.172.39 Port: 445 TCP Blocked |
2020-01-15 16:38:54 |
123.148.247.46 | attackbotsspam | Automatic report - XMLRPC Attack |
2020-01-15 17:12:35 |
95.213.177.124 | attack | Automatic report - Banned IP Access |
2020-01-15 16:40:38 |
14.177.234.250 | attackspambots | 1579063858 - 01/15/2020 05:50:58 Host: 14.177.234.250/14.177.234.250 Port: 445 TCP Blocked |
2020-01-15 17:00:02 |
125.161.106.7 | attackbots | Unauthorized connection attempt detected from IP address 125.161.106.7 to port 445 |
2020-01-15 17:10:15 |
66.212.25.186 | attackbotsspam | 15.01.2020 05:51:12 - Login Fail on hMailserver Detected by ELinOX-hMail-A2F |
2020-01-15 16:57:12 |
222.186.42.7 | attackbotsspam | Jan 15 09:39:02 cp sshd[3506]: Failed password for root from 222.186.42.7 port 56416 ssh2 Jan 15 09:39:02 cp sshd[3506]: Failed password for root from 222.186.42.7 port 56416 ssh2 Jan 15 09:39:04 cp sshd[3506]: Failed password for root from 222.186.42.7 port 56416 ssh2 |
2020-01-15 16:41:41 |
198.100.146.94 | attackbotsspam | fail2ban honeypot |
2020-01-15 16:50:34 |
115.57.127.137 | attackbotsspam | (sshd) Failed SSH login from 115.57.127.137 (CN/China/hn.kd.ny.adsl): 5 in the last 3600 secs |
2020-01-15 16:58:54 |
222.186.42.155 | attackbots | SSH Brute Force, server-1 sshd[8716]: Failed password for root from 222.186.42.155 port 16910 ssh2 |
2020-01-15 16:47:55 |
187.151.240.170 | attack | Unauthorized connection attempt detected from IP address 187.151.240.170 to port 9000 [J] |
2020-01-15 17:06:58 |
5.135.253.172 | attackspambots | Unauthorized connection attempt detected from IP address 5.135.253.172 to port 2220 [J] |
2020-01-15 16:54:15 |
185.100.87.190 | attackspam | Unauthorized connection attempt detected from IP address 185.100.87.190 to port 1433 |
2020-01-15 16:51:22 |