城市(city): Ashburn
省份(region): Virginia
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.227.163.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32789
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;34.227.163.41. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025111101 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Nov 12 05:00:42 CST 2025
;; MSG SIZE rcvd: 106
41.163.227.34.in-addr.arpa domain name pointer ec2-34-227-163-41.compute-1.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
41.163.227.34.in-addr.arpa name = ec2-34-227-163-41.compute-1.amazonaws.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 103.121.117.181 | attackspambots | SSH Bruteforce attack |
2020-02-13 22:12:33 |
| 42.115.18.57 | attackbotsspam | *Port Scan* detected from 42.115.18.57 (KH/Cambodia/-). 11 hits in the last 261 seconds |
2020-02-13 22:02:29 |
| 80.66.81.36 | attackbots | Feb 13 14:58:19 relay postfix/smtpd\[12262\]: warning: unknown\[80.66.81.36\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Feb 13 15:01:09 relay postfix/smtpd\[12105\]: warning: unknown\[80.66.81.36\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Feb 13 15:01:33 relay postfix/smtpd\[7871\]: warning: unknown\[80.66.81.36\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Feb 13 15:05:16 relay postfix/smtpd\[7771\]: warning: unknown\[80.66.81.36\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Feb 13 15:05:40 relay postfix/smtpd\[7871\]: warning: unknown\[80.66.81.36\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-02-13 22:18:21 |
| 63.135.16.10 | attackspam | Telnet/23 MH Probe, BF, Hack - |
2020-02-13 22:22:16 |
| 222.186.175.216 | attack | 2020-02-14T01:01:40.536325luisaranguren sshd[1495389]: Failed none for root from 222.186.175.216 port 59448 ssh2 2020-02-14T01:01:48.733033luisaranguren sshd[1495389]: Failed password for root from 222.186.175.216 port 59448 ssh2 ... |
2020-02-13 22:06:52 |
| 114.113.126.163 | attackbotsspam | Feb 13 14:10:04 Invalid user postgres from 114.113.126.163 port 60521 |
2020-02-13 21:49:49 |
| 185.143.223.97 | attack | postfix |
2020-02-13 22:20:56 |
| 45.40.217.136 | attackspam | ICMP MH Probe, Scan /Distributed - |
2020-02-13 21:59:28 |
| 81.38.16.78 | attackbots | 1581601812 - 02/13/2020 14:50:12 Host: 81.38.16.78/81.38.16.78 Port: 445 TCP Blocked |
2020-02-13 22:19:16 |
| 189.182.80.66 | attack | Port probing on unauthorized port 9530 |
2020-02-13 21:59:58 |
| 89.248.172.101 | attackbots | 02/13/2020-14:50:42.469695 89.248.172.101 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-02-13 21:53:50 |
| 64.37.5.230 | attack | Telnet/23 MH Probe, BF, Hack - |
2020-02-13 22:09:24 |
| 80.82.77.232 | attackspam | 02/13/2020-09:00:28.101999 80.82.77.232 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-02-13 22:10:15 |
| 218.92.0.178 | attack | tried it too often |
2020-02-13 22:23:07 |
| 104.248.94.159 | attack | Feb 13 14:50:11 v22018076622670303 sshd\[32333\]: Invalid user gustavo from 104.248.94.159 port 33806 Feb 13 14:50:11 v22018076622670303 sshd\[32333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.94.159 Feb 13 14:50:13 v22018076622670303 sshd\[32333\]: Failed password for invalid user gustavo from 104.248.94.159 port 33806 ssh2 ... |
2020-02-13 22:18:02 |