城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.75.11.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24551
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;52.75.11.154. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 12:47:45 CST 2025
;; MSG SIZE rcvd: 105
154.11.75.52.in-addr.arpa domain name pointer ec2-52-75-11-154.us-west-2.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
154.11.75.52.in-addr.arpa name = ec2-52-75-11-154.us-west-2.compute.amazonaws.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 216.7.159.250 | attackspam | Feb 4 21:31:28 ms-srv sshd[22910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.7.159.250 Feb 4 21:31:30 ms-srv sshd[22910]: Failed password for invalid user leonidas from 216.7.159.250 port 50978 ssh2 |
2020-03-08 22:34:01 |
| 91.195.248.111 | attackspambots | Honeypot attack, port: 81, PTR: 111.248.195.91.akson45.net. |
2020-03-08 22:49:28 |
| 94.181.94.12 | attackspambots | Mar 8 15:24:18 jane sshd[17022]: Failed password for root from 94.181.94.12 port 55126 ssh2 ... |
2020-03-08 22:45:05 |
| 217.128.22.13 | attackbotsspam | Dec 16 01:16:52 ms-srv sshd[21570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.128.22.13 user=root Dec 16 01:16:54 ms-srv sshd[21570]: Failed password for invalid user root from 217.128.22.13 port 52026 ssh2 |
2020-03-08 22:17:32 |
| 60.220.71.123 | attack | port scan and connect, tcp 1433 (ms-sql-s) |
2020-03-08 22:27:57 |
| 188.158.145.70 | attackbots | Honeypot attack, port: 5555, PTR: adsl-188-158-145-70.sabanet.ir. |
2020-03-08 22:40:10 |
| 209.97.148.173 | attack | Mar 8 15:13:13 vps647732 sshd[20769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.148.173 Mar 8 15:13:14 vps647732 sshd[20769]: Failed password for invalid user test from 209.97.148.173 port 33640 ssh2 ... |
2020-03-08 22:18:02 |
| 117.15.169.130 | attackbots | Mar 8 16:19:43 lukav-desktop sshd\[2860\]: Invalid user ftp from 117.15.169.130 Mar 8 16:19:43 lukav-desktop sshd\[2860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.15.169.130 Mar 8 16:19:46 lukav-desktop sshd\[2860\]: Failed password for invalid user ftp from 117.15.169.130 port 52906 ssh2 Mar 8 16:24:13 lukav-desktop sshd\[2930\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.15.169.130 user=speech-dispatcher Mar 8 16:24:16 lukav-desktop sshd\[2930\]: Failed password for speech-dispatcher from 117.15.169.130 port 52664 ssh2 |
2020-03-08 23:03:52 |
| 164.132.46.197 | attack | Mar 8 19:20:11 gw1 sshd[7145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.46.197 Mar 8 19:20:13 gw1 sshd[7145]: Failed password for invalid user oracle from 164.132.46.197 port 38936 ssh2 ... |
2020-03-08 22:28:50 |
| 42.117.251.26 | attackspambots | Telnet Server BruteForce Attack |
2020-03-08 22:27:01 |
| 216.68.91.104 | attack | Jan 14 19:00:02 ms-srv sshd[5586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.68.91.104 Jan 14 19:00:05 ms-srv sshd[5586]: Failed password for invalid user guest from 216.68.91.104 port 56002 ssh2 |
2020-03-08 22:33:31 |
| 125.212.203.113 | attackbotsspam | Mar 8 13:56:43 hcbbdb sshd\[9379\]: Invalid user rstudio-server from 125.212.203.113 Mar 8 13:56:43 hcbbdb sshd\[9379\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.203.113 Mar 8 13:56:45 hcbbdb sshd\[9379\]: Failed password for invalid user rstudio-server from 125.212.203.113 port 38140 ssh2 Mar 8 14:05:06 hcbbdb sshd\[10307\]: Invalid user tab from 125.212.203.113 Mar 8 14:05:06 hcbbdb sshd\[10307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.203.113 |
2020-03-08 22:26:06 |
| 216.70.250.79 | attack | Jun 24 09:34:29 ms-srv sshd[16168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.70.250.79 Jun 24 09:34:31 ms-srv sshd[16168]: Failed password for invalid user admin from 216.70.250.79 port 44155 ssh2 |
2020-03-08 22:32:18 |
| 111.93.235.74 | attackspam | Mar 8 15:30:36 sso sshd[16752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.235.74 Mar 8 15:30:38 sso sshd[16752]: Failed password for invalid user hduser from 111.93.235.74 port 22532 ssh2 ... |
2020-03-08 22:59:52 |
| 216.155.129.234 | attack | Jan 29 08:44:28 ms-srv sshd[63056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.155.129.234 Jan 29 08:44:30 ms-srv sshd[63056]: Failed password for invalid user admin from 216.155.129.234 port 57794 ssh2 |
2020-03-08 22:52:53 |