城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.40.118.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12730
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;52.40.118.68. IN A
;; AUTHORITY SECTION:
. 207 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 11:45:01 CST 2022
;; MSG SIZE rcvd: 105
68.118.40.52.in-addr.arpa domain name pointer ec2-52-40-118-68.us-west-2.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
68.118.40.52.in-addr.arpa name = ec2-52-40-118-68.us-west-2.compute.amazonaws.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 87.98.253.31 | attackbots | 445/tcp 445/tcp 445/tcp... [2019-06-01/22]6pkt,1pt.(tcp) |
2019-06-23 12:20:17 |
| 106.75.84.197 | attackspam | 5007/tcp 4064/tcp 8087/tcp... [2019-06-16/22]14pkt,7pt.(tcp) |
2019-06-23 11:39:16 |
| 80.82.70.221 | attackbots | ¯\_(ツ)_/¯ |
2019-06-23 12:14:41 |
| 208.187.160.3 | attackspam | 445/tcp 445/tcp [2019-06-14/22]2pkt |
2019-06-23 11:46:58 |
| 168.205.108.108 | attackbotsspam | SMTP-sasl brute force ... |
2019-06-23 11:55:09 |
| 40.78.84.224 | attackspam | port scan and connect, tcp 23 (telnet) |
2019-06-23 11:43:56 |
| 112.33.38.252 | attackbotsspam | icarus github smtp honeypot |
2019-06-23 12:16:39 |
| 69.42.66.94 | attack | 445/tcp 445/tcp 445/tcp... [2019-04-24/06-22]13pkt,1pt.(tcp) |
2019-06-23 12:21:06 |
| 129.28.205.28 | attack | 23/tcp 23/tcp 23/tcp... [2019-06-18/22]6pkt,1pt.(tcp) |
2019-06-23 11:32:31 |
| 139.59.34.17 | attackspam | Jun 23 06:01:36 vps647732 sshd[28032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.34.17 Jun 23 06:01:39 vps647732 sshd[28032]: Failed password for invalid user octuser2 from 139.59.34.17 port 56660 ssh2 ... |
2019-06-23 12:21:34 |
| 191.53.239.164 | attackbots | SMTP-sasl brute force ... |
2019-06-23 11:42:16 |
| 177.66.234.115 | attack | failed_logins |
2019-06-23 12:02:46 |
| 111.230.227.17 | attackspambots | Jun 23 03:58:46 ubuntu-2gb-nbg1-dc3-1 sshd[13311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.227.17 Jun 23 03:58:47 ubuntu-2gb-nbg1-dc3-1 sshd[13311]: Failed password for invalid user tao from 111.230.227.17 port 60685 ssh2 ... |
2019-06-23 12:17:47 |
| 178.120.14.126 | attackspam | [portscan] Port scan |
2019-06-23 11:57:10 |
| 199.115.125.173 | attackspam | Dictionary attack on login resource. |
2019-06-23 11:54:17 |