城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.97.202.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20069
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.97.202.71. IN A
;; AUTHORITY SECTION:
. 313 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:38:01 CST 2023
;; MSG SIZE rcvd: 106
71.202.97.104.in-addr.arpa domain name pointer a104-97-202-71.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
71.202.97.104.in-addr.arpa name = a104-97-202-71.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 189.91.6.16 | attackspambots | failed_logins |
2019-06-30 14:43:42 |
| 218.11.23.142 | attackspambots | 23/tcp [2019-06-30]1pkt |
2019-06-30 14:37:40 |
| 168.228.119.110 | attackbotsspam | Jun 29 23:43:34 web1 postfix/smtpd[4335]: warning: unknown[168.228.119.110]: SASL PLAIN authentication failed: authentication failure ... |
2019-06-30 14:16:14 |
| 142.93.202.47 | attack | Jun 30 03:43:41 MK-Soft-VM3 sshd\[3838\]: Invalid user deploy from 142.93.202.47 port 54936 Jun 30 03:43:41 MK-Soft-VM3 sshd\[3838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.202.47 Jun 30 03:43:43 MK-Soft-VM3 sshd\[3838\]: Failed password for invalid user deploy from 142.93.202.47 port 54936 ssh2 ... |
2019-06-30 14:12:13 |
| 60.190.148.2 | attackbots | SSH Brute Force |
2019-06-30 14:32:14 |
| 142.4.210.157 | attack | [munged]::443 142.4.210.157 - - [30/Jun/2019:07:37:44 +0200] "POST /[munged]: HTTP/1.1" 200 6318 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2019-06-30 14:05:51 |
| 218.28.234.53 | attackbotsspam | 'IP reached maximum auth failures for a one day block' |
2019-06-30 14:30:30 |
| 190.96.136.9 | attack | " " |
2019-06-30 14:20:49 |
| 42.225.236.102 | attack | 23/tcp [2019-06-30]1pkt |
2019-06-30 14:41:00 |
| 125.24.76.186 | attackspam | 445/tcp [2019-06-30]1pkt |
2019-06-30 14:48:01 |
| 188.165.242.200 | attackspam | Invalid user odoo from 188.165.242.200 port 43624 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.242.200 Failed password for invalid user odoo from 188.165.242.200 port 43624 ssh2 Invalid user ulrich from 188.165.242.200 port 48290 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.242.200 |
2019-06-30 14:30:56 |
| 194.32.117.3 | attackbots | Jun 30 04:16:56 DDOS Attack: SRC=194.32.117.3 DST=[Masked] LEN=40 TOS=0x08 PREC=0x20 TTL=247 PROTO=TCP SPT=48140 DPT=80 WINDOW=1200 RES=0x00 RST URGP=0 |
2019-06-30 14:39:06 |
| 115.28.240.215 | attack | Web Probe / Attack |
2019-06-30 14:21:30 |
| 101.109.83.140 | attackbotsspam | SSH-BRUTEFORCE |
2019-06-30 14:11:34 |
| 189.125.2.234 | attack | SSH Brute-Force attacks |
2019-06-30 14:28:11 |