城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.201.194.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14990
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;52.201.194.149. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022300 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 22:34:22 CST 2025
;; MSG SIZE rcvd: 107
149.194.201.52.in-addr.arpa domain name pointer ec2-52-201-194-149.compute-1.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
149.194.201.52.in-addr.arpa name = ec2-52-201-194-149.compute-1.amazonaws.com.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
221.224.239.238 | attack | SSH brute-force attempt |
2020-04-23 02:58:59 |
203.177.71.253 | attackbots | fail2ban |
2020-04-23 03:01:39 |
208.253.27.66 | attackspam | Honeypot attack, port: 445, PTR: PTR record not found |
2020-04-23 02:41:53 |
182.253.119.50 | attack | Apr 22 19:16:32 srv206 sshd[6701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.119.50 user=root Apr 22 19:16:34 srv206 sshd[6701]: Failed password for root from 182.253.119.50 port 36498 ssh2 Apr 22 19:23:45 srv206 sshd[6809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.119.50 user=root Apr 22 19:23:47 srv206 sshd[6809]: Failed password for root from 182.253.119.50 port 48602 ssh2 ... |
2020-04-23 02:46:01 |
45.177.166.60 | attackbots | (sshd) Failed SSH login from 45.177.166.60 (BR/Brazil/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Apr 22 07:59:55 host sshd[58212]: Did not receive identification string from 45.177.166.60 port 53798 |
2020-04-23 02:47:28 |
116.105.102.211 | attackspam | Invalid user nagesh from 116.105.102.211 port 64904 |
2020-04-23 03:11:06 |
47.112.127.29 | attack | Apr 22 14:57:45 lukav-desktop sshd\[15745\]: Invalid user wg from 47.112.127.29 Apr 22 14:57:45 lukav-desktop sshd\[15745\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.112.127.29 Apr 22 14:57:47 lukav-desktop sshd\[15745\]: Failed password for invalid user wg from 47.112.127.29 port 40570 ssh2 Apr 22 14:59:53 lukav-desktop sshd\[15866\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.112.127.29 user=root Apr 22 14:59:55 lukav-desktop sshd\[15866\]: Failed password for root from 47.112.127.29 port 34446 ssh2 |
2020-04-23 02:46:55 |
218.4.163.146 | attackspambots | Invalid user ubuntu from 218.4.163.146 port 35249 |
2020-04-23 02:59:29 |
106.124.137.190 | attackbots | Apr 22 14:45:23 *** sshd[22066]: Invalid user ta from 106.124.137.190 |
2020-04-23 03:14:18 |
201.163.180.183 | attack | Too many connections or unauthorized access detected from Arctic banned ip |
2020-04-23 03:02:29 |
42.114.249.7 | attackspam | Honeypot attack, port: 445, PTR: PTR record not found |
2020-04-23 02:49:35 |
182.219.172.224 | attackbots | no |
2020-04-23 03:04:18 |
106.12.28.124 | attack | Apr 22 15:15:55 srv01 sshd[4770]: Invalid user test from 106.12.28.124 port 53626 Apr 22 15:15:55 srv01 sshd[4770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.28.124 Apr 22 15:15:55 srv01 sshd[4770]: Invalid user test from 106.12.28.124 port 53626 Apr 22 15:15:57 srv01 sshd[4770]: Failed password for invalid user test from 106.12.28.124 port 53626 ssh2 Apr 22 15:22:00 srv01 sshd[5305]: Invalid user jl from 106.12.28.124 port 60932 ... |
2020-04-23 03:15:52 |
85.203.44.140 | attackspambots | SSH Bruteforce attempt |
2020-04-23 02:57:43 |
177.198.74.151 | attack | fail2ban |
2020-04-23 03:05:12 |