城市(city): Central
省份(region): Central and Western Hong Kong Island
国家(country): Hong Kong
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 96.16.106.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44652
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;96.16.106.30. IN A
;; AUTHORITY SECTION:
. 598 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023011002 1800 900 604800 86400
;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 11 08:14:24 CST 2023
;; MSG SIZE rcvd: 105
30.106.16.96.in-addr.arpa domain name pointer a96-16-106-30.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
30.106.16.96.in-addr.arpa name = a96-16-106-30.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 80.229.253.212 | attackbotsspam | SSH Brute-Force reported by Fail2Ban |
2019-10-24 07:47:12 |
| 119.29.245.158 | attack | Oct 23 13:23:01 auw2 sshd\[25123\]: Invalid user print from 119.29.245.158 Oct 23 13:23:01 auw2 sshd\[25123\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.245.158 Oct 23 13:23:03 auw2 sshd\[25123\]: Failed password for invalid user print from 119.29.245.158 port 41128 ssh2 Oct 23 13:27:46 auw2 sshd\[25532\]: Invalid user qhsupport from 119.29.245.158 Oct 23 13:27:46 auw2 sshd\[25532\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.245.158 |
2019-10-24 07:43:33 |
| 202.152.1.67 | attackspam | Oct 23 13:03:14 wbs sshd\[30757\]: Invalid user iceuser from 202.152.1.67 Oct 23 13:03:14 wbs sshd\[30757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=gapura.idola.net.id Oct 23 13:03:16 wbs sshd\[30757\]: Failed password for invalid user iceuser from 202.152.1.67 port 37460 ssh2 Oct 23 13:07:50 wbs sshd\[31113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=gapura.idola.net.id user=root Oct 23 13:07:52 wbs sshd\[31113\]: Failed password for root from 202.152.1.67 port 48756 ssh2 |
2019-10-24 07:24:11 |
| 163.172.99.30 | attackspam | Automatic report - Port Scan Attack |
2019-10-24 07:22:14 |
| 196.62.115.110 | attack | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/196.62.115.110/ PK - 1H : (13) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : PK NAME ASN : ASN58895 IP : 196.62.115.110 CIDR : 196.62.0.0/17 PREFIX COUNT : 107 UNIQUE IP COUNT : 108800 ATTACKS DETECTED ASN58895 : 1H - 1 3H - 1 6H - 1 12H - 1 24H - 1 DateTime : 2019-10-23 22:13:05 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-10-24 07:18:26 |
| 54.36.150.26 | attackspam | Automatic report - Banned IP Access |
2019-10-24 07:43:11 |
| 89.109.23.190 | attackspambots | 2019-10-23T23:39:09.589876abusebot-3.cloudsearch.cf sshd\[1334\]: Invalid user nas from 89.109.23.190 port 33504 |
2019-10-24 07:40:21 |
| 69.171.73.9 | attackbots | Invalid user www from 69.171.73.9 port 60156 |
2019-10-24 07:54:15 |
| 221.215.130.162 | attackspambots | 2019-10-23T20:12:37.108933abusebot-5.cloudsearch.cf sshd\[9127\]: Invalid user keith from 221.215.130.162 port 42520 |
2019-10-24 07:32:43 |
| 79.137.33.20 | attack | Oct 21 03:23:29 odroid64 sshd\[30765\]: Invalid user tom from 79.137.33.20 Oct 21 03:23:29 odroid64 sshd\[30765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.33.20 Oct 21 03:23:32 odroid64 sshd\[30765\]: Failed password for invalid user tom from 79.137.33.20 port 46757 ssh2 Oct 21 03:23:29 odroid64 sshd\[30765\]: Invalid user tom from 79.137.33.20 Oct 21 03:23:29 odroid64 sshd\[30765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.33.20 Oct 21 03:23:32 odroid64 sshd\[30765\]: Failed password for invalid user tom from 79.137.33.20 port 46757 ssh2 ... |
2019-10-24 07:51:25 |
| 89.248.174.215 | attack | ET DROP Dshield Block Listed Source group 1 - port: 8089 proto: TCP cat: Misc Attack |
2019-10-24 07:24:24 |
| 106.13.146.93 | attackspam | Oct 24 01:21:37 mail sshd[28170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.146.93 Oct 24 01:21:39 mail sshd[28170]: Failed password for invalid user com from 106.13.146.93 port 45158 ssh2 Oct 24 01:26:52 mail sshd[30026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.146.93 |
2019-10-24 07:39:59 |
| 84.208.62.38 | attack | Oct 24 01:43:46 MK-Soft-VM4 sshd[28927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.208.62.38 Oct 24 01:43:49 MK-Soft-VM4 sshd[28927]: Failed password for invalid user test from 84.208.62.38 port 51530 ssh2 ... |
2019-10-24 07:44:02 |
| 37.187.120.121 | attackspambots | 2019-10-23T22:46:39.206696abusebot-5.cloudsearch.cf sshd\[10925\]: Invalid user cjohnson from 37.187.120.121 port 45846 |
2019-10-24 07:16:31 |
| 104.200.110.210 | attackspam | 2019-10-23T20:43:19.432820shield sshd\[22776\]: Invalid user 123456789a@ from 104.200.110.210 port 34798 2019-10-23T20:43:19.436970shield sshd\[22776\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.200.110.210 2019-10-23T20:43:21.158593shield sshd\[22776\]: Failed password for invalid user 123456789a@ from 104.200.110.210 port 34798 ssh2 2019-10-23T20:47:38.672653shield sshd\[23561\]: Invalid user pAsswORD from 104.200.110.210 port 44904 2019-10-23T20:47:38.680537shield sshd\[23561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.200.110.210 |
2019-10-24 07:36:33 |