城市(city): Ashburn
省份(region): Virginia
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.97.85.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54933
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.97.85.45. IN A
;; AUTHORITY SECTION:
. 276 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023111102 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 12 09:28:25 CST 2023
;; MSG SIZE rcvd: 105
45.85.97.104.in-addr.arpa domain name pointer a104-97-85-45.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
45.85.97.104.in-addr.arpa name = a104-97-85-45.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 213.6.172.134 | attack | Jan 1 07:34:17 ms-srv sshd[23734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.6.172.134 Jan 1 07:34:19 ms-srv sshd[23734]: Failed password for invalid user sapiyah from 213.6.172.134 port 57199 ssh2 |
2020-03-08 23:20:12 |
| 112.169.86.86 | attack | Honeypot attack, port: 81, PTR: PTR record not found |
2020-03-08 23:25:28 |
| 213.74.203.106 | attack | Sep 24 01:38:02 ms-srv sshd[47392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.74.203.106 Sep 24 01:38:03 ms-srv sshd[47392]: Failed password for invalid user test from 213.74.203.106 port 37755 ssh2 |
2020-03-08 23:15:42 |
| 222.186.31.204 | attackspam | [MK-VM5] SSH login failed |
2020-03-08 22:52:23 |
| 112.85.42.182 | attack | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.182 user=root Failed password for root from 112.85.42.182 port 8957 ssh2 Failed password for root from 112.85.42.182 port 8957 ssh2 Failed password for root from 112.85.42.182 port 8957 ssh2 Failed password for root from 112.85.42.182 port 8957 ssh2 |
2020-03-08 22:51:33 |
| 51.79.66.142 | attack | 2020-03-08T08:19:18.320104linuxbox-skyline sshd[41224]: Invalid user hobbit from 51.79.66.142 port 34818 ... |
2020-03-08 23:12:13 |
| 176.52.245.166 | attackspam | Wordpress Admin Login attack |
2020-03-08 23:11:09 |
| 49.205.157.216 | attack | Honeypot attack, port: 5555, PTR: broadband.actcorp.in. |
2020-03-08 22:43:53 |
| 213.60.165.77 | attackbotsspam | Jan 28 04:44:46 ms-srv sshd[42842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.60.165.77 Jan 28 04:44:48 ms-srv sshd[42842]: Failed password for invalid user mysql from 213.60.165.77 port 33436 ssh2 |
2020-03-08 23:19:50 |
| 213.79.114.246 | attackspambots | Aug 10 13:19:04 ms-srv sshd[53397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.79.114.246 Aug 10 13:19:06 ms-srv sshd[53397]: Failed password for invalid user admin from 213.79.114.246 port 35148 ssh2 |
2020-03-08 23:15:25 |
| 122.51.231.49 | attackspambots | (sshd) Failed SSH login from 122.51.231.49 (CN/China/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 8 14:17:54 ubnt-55d23 sshd[28557]: Invalid user david from 122.51.231.49 port 56046 Mar 8 14:17:56 ubnt-55d23 sshd[28557]: Failed password for invalid user david from 122.51.231.49 port 56046 ssh2 |
2020-03-08 23:18:16 |
| 213.58.145.237 | attackspam | Mar 6 07:20:03 ms-srv sshd[50005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.58.145.237 Mar 6 07:20:05 ms-srv sshd[50005]: Failed password for invalid user zabbix from 213.58.145.237 port 45836 ssh2 |
2020-03-08 23:27:21 |
| 216.14.66.150 | attackspambots | Oct 8 00:20:53 ms-srv sshd[53763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.14.66.150 user=root Oct 8 00:20:56 ms-srv sshd[53763]: Failed password for invalid user root from 216.14.66.150 port 38943 ssh2 |
2020-03-08 22:58:57 |
| 216.144.251.86 | attackspam | Sep 1 21:29:40 ms-srv sshd[2777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.144.251.86 user=root Sep 1 21:29:42 ms-srv sshd[2777]: Failed password for invalid user root from 216.144.251.86 port 40592 ssh2 |
2020-03-08 22:54:10 |
| 213.91.179.135 | attackbots | Feb 28 02:23:39 ms-srv sshd[50601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.91.179.135 user=root Feb 28 02:23:41 ms-srv sshd[50601]: Failed password for invalid user root from 213.91.179.135 port 3522 ssh2 |
2020-03-08 23:07:03 |