城市(city): Dallas
省份(region): Texas
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.93.49.76
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40820
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.93.49.76. IN A
;; AUTHORITY SECTION:
. 211 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022040901 1800 900 604800 86400
;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 10 06:18:43 CST 2022
;; MSG SIZE rcvd: 105
76.49.93.104.in-addr.arpa domain name pointer a104-93-49-76.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
76.49.93.104.in-addr.arpa name = a104-93-49-76.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 182.73.26.178 | attack | Sep 11 14:14:18 aat-srv002 sshd[27815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.73.26.178 Sep 11 14:14:19 aat-srv002 sshd[27815]: Failed password for invalid user admin from 182.73.26.178 port 11679 ssh2 Sep 11 14:21:43 aat-srv002 sshd[28084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.73.26.178 Sep 11 14:21:45 aat-srv002 sshd[28084]: Failed password for invalid user deployer from 182.73.26.178 port 31221 ssh2 ... |
2019-09-12 03:43:31 |
| 77.247.110.30 | attack | CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found |
2019-09-12 03:10:34 |
| 92.188.124.228 | attack | Invalid user musikbot from 92.188.124.228 port 57544 |
2019-09-12 03:11:37 |
| 118.25.233.35 | attackbots | Sep 11 21:32:11 minden010 sshd[21389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.233.35 Sep 11 21:32:13 minden010 sshd[21389]: Failed password for invalid user teamspeak from 118.25.233.35 port 42328 ssh2 Sep 11 21:35:32 minden010 sshd[22560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.233.35 ... |
2019-09-12 03:51:48 |
| 106.12.30.229 | attackbotsspam | Sep 11 21:22:55 dedicated sshd[17928]: Invalid user d3m0 from 106.12.30.229 port 35802 |
2019-09-12 03:24:12 |
| 46.101.76.236 | attackspambots | Sep 11 09:17:35 eddieflores sshd\[31880\]: Invalid user git from 46.101.76.236 Sep 11 09:17:35 eddieflores sshd\[31880\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.76.236 Sep 11 09:17:37 eddieflores sshd\[31880\]: Failed password for invalid user git from 46.101.76.236 port 56476 ssh2 Sep 11 09:26:45 eddieflores sshd\[32608\]: Invalid user developer from 46.101.76.236 Sep 11 09:26:45 eddieflores sshd\[32608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.76.236 |
2019-09-12 03:27:38 |
| 221.140.151.235 | attackbotsspam | Sep 11 19:48:35 MK-Soft-VM6 sshd\[1614\]: Invalid user changeme from 221.140.151.235 port 37706 Sep 11 19:48:35 MK-Soft-VM6 sshd\[1614\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.140.151.235 Sep 11 19:48:36 MK-Soft-VM6 sshd\[1614\]: Failed password for invalid user changeme from 221.140.151.235 port 37706 ssh2 ... |
2019-09-12 03:56:50 |
| 109.100.179.205 | attackbots | Unauthorised access (Sep 11) SRC=109.100.179.205 LEN=44 TTL=53 ID=24407 TCP DPT=8080 WINDOW=60142 SYN |
2019-09-12 03:47:22 |
| 159.122.98.169 | attackbotsspam | SIPVicious Scanner Detection, PTR: a9.62.7a9f.ip4.static.sl-reverse.com. |
2019-09-12 03:31:51 |
| 139.59.87.71 | attack | Sep 11 22:00:18 www sshd\[58269\]: Invalid user student123 from 139.59.87.71 Sep 11 22:00:18 www sshd\[58269\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.87.71 Sep 11 22:00:21 www sshd\[58269\]: Failed password for invalid user student123 from 139.59.87.71 port 60740 ssh2 ... |
2019-09-12 03:11:08 |
| 116.111.16.55 | attackspam | Sep 11 20:59:10 web2 sshd[8243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.111.16.55 Sep 11 20:59:12 web2 sshd[8243]: Failed password for invalid user admin from 116.111.16.55 port 52811 ssh2 |
2019-09-12 03:46:51 |
| 189.164.224.99 | attack | Sep 11 18:01:58 XXXXXX sshd[16274]: Invalid user pink from 189.164.224.99 port 50764 |
2019-09-12 03:05:51 |
| 58.47.177.160 | attackspambots | Sep 11 09:15:47 hcbb sshd\[20674\]: Invalid user wordpress from 58.47.177.160 Sep 11 09:15:47 hcbb sshd\[20674\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.47.177.160 Sep 11 09:15:50 hcbb sshd\[20674\]: Failed password for invalid user wordpress from 58.47.177.160 port 52542 ssh2 Sep 11 09:24:06 hcbb sshd\[21358\]: Invalid user 123123 from 58.47.177.160 Sep 11 09:24:06 hcbb sshd\[21358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.47.177.160 |
2019-09-12 03:30:47 |
| 139.59.38.252 | attack | Sep 11 20:53:21 DAAP sshd[16432]: Invalid user daniel from 139.59.38.252 port 52258 Sep 11 20:53:21 DAAP sshd[16432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.38.252 Sep 11 20:53:21 DAAP sshd[16432]: Invalid user daniel from 139.59.38.252 port 52258 Sep 11 20:53:22 DAAP sshd[16432]: Failed password for invalid user daniel from 139.59.38.252 port 52258 ssh2 Sep 11 20:59:36 DAAP sshd[16469]: Invalid user postgres from 139.59.38.252 port 58872 ... |
2019-09-12 03:25:50 |
| 142.93.114.123 | attack | Sep 11 09:28:37 php1 sshd\[6627\]: Invalid user administrator from 142.93.114.123 Sep 11 09:28:37 php1 sshd\[6627\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.114.123 Sep 11 09:28:39 php1 sshd\[6627\]: Failed password for invalid user administrator from 142.93.114.123 port 33438 ssh2 Sep 11 09:34:39 php1 sshd\[7170\]: Invalid user test from 142.93.114.123 Sep 11 09:34:39 php1 sshd\[7170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.114.123 |
2019-09-12 03:44:04 |