城市(city): Dublin
省份(region): Leinster
国家(country): Ireland
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.214.90.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12999
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;52.214.90.239. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 12:32:48 CST 2025
;; MSG SIZE rcvd: 106
239.90.214.52.in-addr.arpa domain name pointer ec2-52-214-90-239.eu-west-1.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
239.90.214.52.in-addr.arpa name = ec2-52-214-90-239.eu-west-1.compute.amazonaws.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 190.221.81.6 | attackspambots | Nov 26 09:36:30 MK-Soft-VM7 sshd[18182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.221.81.6 Nov 26 09:36:32 MK-Soft-VM7 sshd[18182]: Failed password for invalid user steny from 190.221.81.6 port 39364 ssh2 ... |
2019-11-26 18:38:53 |
| 180.183.57.91 | attackbots | Attempt to attack host OS, exploiting network vulnerabilities, on 26-11-2019 06:25:39. |
2019-11-26 18:12:29 |
| 110.185.100.176 | attack | Nov 25 22:00:50 tdfoods sshd\[3962\]: Invalid user broderse from 110.185.100.176 Nov 25 22:00:50 tdfoods sshd\[3962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.185.100.176 Nov 25 22:00:52 tdfoods sshd\[3962\]: Failed password for invalid user broderse from 110.185.100.176 port 42837 ssh2 Nov 25 22:05:48 tdfoods sshd\[4336\]: Invalid user guest from 110.185.100.176 Nov 25 22:05:48 tdfoods sshd\[4336\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.185.100.176 |
2019-11-26 18:40:59 |
| 192.161.94.117 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 26-11-2019 06:25:41. |
2019-11-26 18:08:36 |
| 1.85.38.14 | attackbotsspam | Attempt to attack host OS, exploiting network vulnerabilities, on 26-11-2019 06:25:27. |
2019-11-26 18:33:31 |
| 106.54.25.82 | attackspambots | 2019-11-26T09:20:11.750143scmdmz1 sshd\[1495\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.25.82 user=root 2019-11-26T09:20:13.965339scmdmz1 sshd\[1495\]: Failed password for root from 106.54.25.82 port 38326 ssh2 2019-11-26T09:27:08.888413scmdmz1 sshd\[2065\]: Invalid user generalconst from 106.54.25.82 port 43416 ... |
2019-11-26 18:30:21 |
| 171.100.3.58 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 26-11-2019 06:25:37. |
2019-11-26 18:15:15 |
| 106.12.179.165 | attackspambots | Nov 25 23:43:52 php1 sshd\[5083\]: Invalid user inscoe from 106.12.179.165 Nov 25 23:43:52 php1 sshd\[5083\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.179.165 Nov 25 23:43:54 php1 sshd\[5083\]: Failed password for invalid user inscoe from 106.12.179.165 port 41654 ssh2 Nov 25 23:51:27 php1 sshd\[5702\]: Invalid user salle from 106.12.179.165 Nov 25 23:51:27 php1 sshd\[5702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.179.165 |
2019-11-26 18:13:14 |
| 54.38.188.34 | attackbotsspam | 2019-11-26T09:23:04.917306shield sshd\[12487\]: Invalid user qwerty from 54.38.188.34 port 40348 2019-11-26T09:23:04.921690shield sshd\[12487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.ip-54-38-188.eu 2019-11-26T09:23:07.113574shield sshd\[12487\]: Failed password for invalid user qwerty from 54.38.188.34 port 40348 ssh2 2019-11-26T09:29:05.457956shield sshd\[13139\]: Invalid user vahe from 54.38.188.34 port 48476 2019-11-26T09:29:05.462115shield sshd\[13139\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.ip-54-38-188.eu |
2019-11-26 18:34:49 |
| 203.135.4.146 | attackbots | Attempt to attack host OS, exploiting network vulnerabilities, on 26-11-2019 06:25:43. |
2019-11-26 18:05:11 |
| 193.8.82.16 | attack | Nov 26 15:23:50 w sshd[10130]: Invalid user grigor from 193.8.82.16 Nov 26 15:23:50 w sshd[10130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.8.82.16 Nov 26 15:23:52 w sshd[10130]: Failed password for invalid user grigor from 193.8.82.16 port 46890 ssh2 Nov 26 15:23:52 w sshd[10130]: Received disconnect from 193.8.82.16: 11: Bye Bye [preauth] Nov 26 16:03:38 w sshd[10474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.8.82.16 user=r.r Nov 26 16:03:40 w sshd[10474]: Failed password for r.r from 193.8.82.16 port 49960 ssh2 Nov 26 16:03:40 w sshd[10474]: Received disconnect from 193.8.82.16: 11: Bye Bye [preauth] Nov 26 16:11:04 w sshd[10598]: Invalid user ankeny from 193.8.82.16 Nov 26 16:11:04 w sshd[10598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.8.82.16 Nov 26 16:11:07 w sshd[10598]: Failed password for invalid user anken........ ------------------------------- |
2019-11-26 18:30:46 |
| 171.243.109.100 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 26-11-2019 06:25:38. |
2019-11-26 18:14:47 |
| 125.24.137.171 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 26-11-2019 06:25:36. |
2019-11-26 18:16:55 |
| 113.175.162.28 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 26-11-2019 06:25:31. |
2019-11-26 18:26:44 |
| 103.5.18.67 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 26-11-2019 06:25:28. |
2019-11-26 18:32:57 |