城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.42.15.67
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7615
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;52.42.15.67. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 22:48:56 CST 2025
;; MSG SIZE rcvd: 104
67.15.42.52.in-addr.arpa domain name pointer ec2-52-42-15-67.us-west-2.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
67.15.42.52.in-addr.arpa name = ec2-52-42-15-67.us-west-2.compute.amazonaws.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 134.122.21.243 | attackspambots | Port scan on 1 port(s): 8088 |
2020-09-27 02:37:08 |
| 46.101.191.77 | attackspam |
|
2020-09-27 03:05:15 |
| 117.4.241.135 | attack | Invalid user isa from 117.4.241.135 port 59816 |
2020-09-27 02:51:50 |
| 198.143.155.138 | attackbots |
|
2020-09-27 02:49:06 |
| 49.88.112.70 | attack | Sep 27 00:24:43 mx sshd[992967]: Failed password for root from 49.88.112.70 port 39131 ssh2 Sep 27 00:24:38 mx sshd[992967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.70 user=root Sep 27 00:24:40 mx sshd[992967]: Failed password for root from 49.88.112.70 port 39131 ssh2 Sep 27 00:24:43 mx sshd[992967]: Failed password for root from 49.88.112.70 port 39131 ssh2 Sep 27 00:24:46 mx sshd[992967]: Failed password for root from 49.88.112.70 port 39131 ssh2 ... |
2020-09-27 03:02:14 |
| 45.83.67.243 | attackbots | Unauthorized access to SSH at 25/Sep/2020:20:33:58 +0000. Received: (SSH-2.0-ZGrab ZGrab SSH Survey) |
2020-09-27 03:08:33 |
| 139.99.120.194 | attackbots |
|
2020-09-27 03:10:29 |
| 189.208.21.212 | attackbots | Automatic report - Port Scan Attack |
2020-09-27 02:55:03 |
| 201.204.169.163 | attack | 20/9/25@16:34:30: FAIL: Alarm-Network address from=201.204.169.163 20/9/25@16:34:30: FAIL: Alarm-Network address from=201.204.169.163 ... |
2020-09-27 02:42:19 |
| 49.232.162.53 | attackspambots | Port scan: Attack repeated for 24 hours |
2020-09-27 02:44:27 |
| 54.36.149.70 | attackbotsspam | W 31101,/var/log/nginx/access.log,-,- |
2020-09-27 03:12:36 |
| 167.99.88.37 | attack | Sep 26 18:44:30 h2779839 sshd[20205]: Invalid user ubuntu from 167.99.88.37 port 38276 Sep 26 18:44:30 h2779839 sshd[20205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.88.37 Sep 26 18:44:30 h2779839 sshd[20205]: Invalid user ubuntu from 167.99.88.37 port 38276 Sep 26 18:44:31 h2779839 sshd[20205]: Failed password for invalid user ubuntu from 167.99.88.37 port 38276 ssh2 Sep 26 18:47:58 h2779839 sshd[20244]: Invalid user stage from 167.99.88.37 port 46680 Sep 26 18:47:58 h2779839 sshd[20244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.88.37 Sep 26 18:47:58 h2779839 sshd[20244]: Invalid user stage from 167.99.88.37 port 46680 Sep 26 18:48:00 h2779839 sshd[20244]: Failed password for invalid user stage from 167.99.88.37 port 46680 ssh2 Sep 26 18:51:35 h2779839 sshd[20302]: Invalid user ubuntu from 167.99.88.37 port 55084 ... |
2020-09-27 03:01:32 |
| 109.167.224.54 | attackspambots | 109.167.224.54 - - [25/Sep/2020:22:33:36 +0200] "GET / HTTP/1.1" 301 651 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/601.7.7 (KHTML, like Gecko) Version/9.1.2 Safari/601.7.7" ... |
2020-09-27 03:15:27 |
| 149.129.242.86 | attackspam | Sep 26 19:38:24 xxxxxxx1 sshd[17295]: Invalid user minecraft from 149.129.242.86 port 51338 Sep 26 19:38:24 xxxxxxx1 sshd[17295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.129.242.86 Sep 26 19:38:27 xxxxxxx1 sshd[17295]: Failed password for invalid user minecraft from 149.129.242.86 port 51338 ssh2 Sep 26 19:45:35 xxxxxxx1 sshd[18230]: Invalid user rtorrent from 149.129.242.86 port 33394 Sep 26 19:45:35 xxxxxxx1 sshd[18230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.129.242.86 Sep 26 19:45:37 xxxxxxx1 sshd[18230]: Failed password for invalid user rtorrent from 149.129.242.86 port 33394 ssh2 Sep 26 19:46:35 xxxxxxx1 sshd[18248]: Invalid user serverpilot from 149.129.242.86 port 37960 Sep 26 19:46:35 xxxxxxx1 sshd[18248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.129.242.86 Sep 26 19:46:36 xxxxxxx1 sshd[18248]: Failed passwor........ ------------------------------ |
2020-09-27 03:05:29 |
| 213.141.131.22 | attack | bruteforce detected |
2020-09-27 03:09:33 |