城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.70.0.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34360
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;52.70.0.99. IN A
;; AUTHORITY SECTION:
. 386 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400
;; Query time: 51 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 04:24:13 CST 2022
;; MSG SIZE rcvd: 103
99.0.70.52.in-addr.arpa domain name pointer ec2-52-70-0-99.compute-1.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
99.0.70.52.in-addr.arpa name = ec2-52-70-0-99.compute-1.amazonaws.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 185.176.27.38 | attackbotsspam | Port scan on 15 port(s): 3424 3699 3715 3797 3819 3857 3903 3913 3918 3958 4074 4213 4261 4262 4288 |
2019-08-08 06:48:59 |
| 142.44.218.192 | attackbots | Aug 7 23:48:09 localhost sshd\[21161\]: Invalid user user1 from 142.44.218.192 port 49684 Aug 7 23:48:09 localhost sshd\[21161\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.218.192 Aug 7 23:48:11 localhost sshd\[21161\]: Failed password for invalid user user1 from 142.44.218.192 port 49684 ssh2 |
2019-08-08 06:56:24 |
| 87.170.131.179 | attackspam | Sniffing for setup/upgrade script: 87.170.131.179 - - [04/Aug/2019:21:48:19 +0100] "GET /setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=busybox&curpath=/¤tsetting.htm=1 HTTP/1.1" 404 0 "-" "Mozilla/5.0" |
2019-08-08 06:28:23 |
| 175.138.212.205 | attackbotsspam | SSH Brute Force, server-1 sshd[30575]: Failed password for invalid user simulation from 175.138.212.205 port 35562 ssh2 |
2019-08-08 06:31:58 |
| 68.183.122.94 | attack | 2019-08-07T20:55:23.174490abusebot-4.cloudsearch.cf sshd\[14000\]: Invalid user admin from 68.183.122.94 port 44314 |
2019-08-08 06:47:37 |
| 47.102.96.141 | attack | Sniffing for ThinkPHP CMS files: 47.102.96.141 - - [04/Aug/2019:12:54:39 +0100] "GET /TP/public/index.php HTTP/1.1" 404 558 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.0;en-US; rv:1.9.2) Gecko/20100115 Firefox/3.6)" |
2019-08-08 06:55:22 |
| 78.170.34.61 | attackspam | Automatic report - Port Scan Attack |
2019-08-08 06:45:25 |
| 181.55.95.52 | attackbotsspam | Aug 7 18:15:48 xtremcommunity sshd\[20696\]: Invalid user j0k3r123 from 181.55.95.52 port 36761 Aug 7 18:15:48 xtremcommunity sshd\[20696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.55.95.52 Aug 7 18:15:50 xtremcommunity sshd\[20696\]: Failed password for invalid user j0k3r123 from 181.55.95.52 port 36761 ssh2 Aug 7 18:20:38 xtremcommunity sshd\[20799\]: Invalid user 123456 from 181.55.95.52 port 33963 Aug 7 18:20:38 xtremcommunity sshd\[20799\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.55.95.52 ... |
2019-08-08 06:28:07 |
| 42.115.55.42 | attack | Aug 7 17:36:55 DDOS Attack: SRC=42.115.55.42 DST=[Masked] LEN=40 TOS=0x08 PREC=0x20 TTL=40 DF PROTO=TCP SPT=2043 DPT=80 WINDOW=0 RES=0x00 RST URGP=0 |
2019-08-08 06:19:58 |
| 139.59.190.69 | attack | Aug 7 19:45:15 ip-172-31-62-245 sshd\[12909\]: Invalid user admin1 from 139.59.190.69\ Aug 7 19:45:17 ip-172-31-62-245 sshd\[12909\]: Failed password for invalid user admin1 from 139.59.190.69 port 37068 ssh2\ Aug 7 19:49:41 ip-172-31-62-245 sshd\[12932\]: Invalid user laura from 139.59.190.69\ Aug 7 19:49:44 ip-172-31-62-245 sshd\[12932\]: Failed password for invalid user laura from 139.59.190.69 port 33778 ssh2\ Aug 7 19:54:12 ip-172-31-62-245 sshd\[12942\]: Invalid user teamspeak3 from 139.59.190.69\ |
2019-08-08 06:54:17 |
| 93.211.181.119 | attack | Sniffing for setup/upgrade script: 93.211.181.119 - - [04/Aug/2019:20:49:43 +0100] "GET /setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=busybox&curpath=/¤tsetting.htm=1 HTTP/1.1" 404 0 "-" "Mozilla/5.0" |
2019-08-08 06:44:07 |
| 51.77.52.216 | attackbotsspam | Aug 5 19:45:13 *** sshd[30934]: Failed password for invalid user fwupgrade from 51.77.52.216 port 44577 ssh2 Aug 5 23:31:44 *** sshd[2011]: Failed password for invalid user misp from 51.77.52.216 port 38863 ssh2 Aug 6 07:09:08 *** sshd[12755]: Failed password for invalid user user from 51.77.52.216 port 41793 ssh2 Aug 6 07:09:13 *** sshd[12757]: Failed password for invalid user misp from 51.77.52.216 port 39995 ssh2 Aug 7 01:49:44 *** sshd[5844]: Failed password for invalid user osboxes from 51.77.52.216 port 40147 ssh2 Aug 7 01:49:57 *** sshd[5852]: Failed password for invalid user sans from 51.77.52.216 port 44189 ssh2 Aug 7 05:21:22 *** sshd[10777]: Failed password for invalid user administrator from 51.77.52.216 port 43215 ssh2 Aug 7 05:21:28 *** sshd[10782]: Failed password for invalid user NetLinx from 51.77.52.216 port 43639 ssh2 Aug 7 05:21:35 *** sshd[10787]: Failed password for invalid user administrator from 51.77.52.216 port 33515 ssh2 Aug 7 05:24:39 *** sshd[11355]: Failed password for |
2019-08-08 06:37:29 |
| 137.74.115.225 | attack | Aug 7 18:36:45 MK-Soft-VM3 sshd\[20268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.115.225 user=root Aug 7 18:36:47 MK-Soft-VM3 sshd\[20268\]: Failed password for root from 137.74.115.225 port 38218 ssh2 Aug 7 18:40:35 MK-Soft-VM3 sshd\[20471\]: Invalid user kmem from 137.74.115.225 port 53708 ... |
2019-08-08 06:28:46 |
| 106.13.5.170 | attackbots | SSH Brute Force, server-1 sshd[25284]: Failed password for root from 106.13.5.170 port 60340 ssh2 |
2019-08-08 06:34:06 |
| 177.148.133.202 | attackspambots | Unauthorised access (Aug 7) SRC=177.148.133.202 LEN=52 TTL=114 ID=1749 DF TCP DPT=445 WINDOW=8192 SYN |
2019-08-08 07:09:00 |