城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.89.107.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 666
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;52.89.107.12. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025032900 1800 900 604800 86400
;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 29 23:30:21 CST 2025
;; MSG SIZE rcvd: 105
12.107.89.52.in-addr.arpa domain name pointer ec2-52-89-107-12.us-west-2.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
12.107.89.52.in-addr.arpa name = ec2-52-89-107-12.us-west-2.compute.amazonaws.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 218.98.40.134 | attackbotsspam | Sep 9 22:45:15 Ubuntu-1404-trusty-64-minimal sshd\[6278\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.40.134 user=root Sep 9 22:45:17 Ubuntu-1404-trusty-64-minimal sshd\[6278\]: Failed password for root from 218.98.40.134 port 20750 ssh2 Sep 9 22:45:25 Ubuntu-1404-trusty-64-minimal sshd\[6324\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.40.134 user=root Sep 9 22:45:26 Ubuntu-1404-trusty-64-minimal sshd\[6324\]: Failed password for root from 218.98.40.134 port 42334 ssh2 Sep 10 01:21:42 Ubuntu-1404-trusty-64-minimal sshd\[9768\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.40.134 user=root |
2019-09-10 07:24:45 |
| 185.18.69.201 | attackspam | Sep 9 16:56:52 lnxded63 sshd[10354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.18.69.201 |
2019-09-10 06:56:22 |
| 177.23.16.42 | attackbotsspam | Automatic report - Port Scan Attack |
2019-09-10 06:54:36 |
| 189.206.1.142 | attackbotsspam | Sep 9 18:03:56 MK-Soft-VM5 sshd\[16334\]: Invalid user web@123 from 189.206.1.142 port 37560 Sep 9 18:03:57 MK-Soft-VM5 sshd\[16334\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.206.1.142 Sep 9 18:03:59 MK-Soft-VM5 sshd\[16334\]: Failed password for invalid user web@123 from 189.206.1.142 port 37560 ssh2 ... |
2019-09-10 07:02:07 |
| 41.228.12.149 | attackbots | Sep 9 23:00:44 km20725 sshd\[16070\]: Invalid user weblogic from 41.228.12.149Sep 9 23:00:46 km20725 sshd\[16070\]: Failed password for invalid user weblogic from 41.228.12.149 port 41142 ssh2Sep 9 23:08:18 km20725 sshd\[16439\]: Invalid user zabbix from 41.228.12.149Sep 9 23:08:20 km20725 sshd\[16439\]: Failed password for invalid user zabbix from 41.228.12.149 port 55196 ssh2 ... |
2019-09-10 07:19:03 |
| 218.98.26.181 | attackspam | Sep 9 22:27:35 localhost sshd\[16718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.26.181 user=root Sep 9 22:27:37 localhost sshd\[16718\]: Failed password for root from 218.98.26.181 port 54476 ssh2 Sep 9 22:27:39 localhost sshd\[16718\]: Failed password for root from 218.98.26.181 port 54476 ssh2 Sep 9 22:27:41 localhost sshd\[16718\]: Failed password for root from 218.98.26.181 port 54476 ssh2 Sep 9 22:27:43 localhost sshd\[16722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.26.181 user=root ... |
2019-09-10 07:01:32 |
| 201.66.230.67 | attackbotsspam | 2019-09-09T22:41:26.786888abusebot-2.cloudsearch.cf sshd\[15325\]: Invalid user vyatta from 201.66.230.67 port 53310 |
2019-09-10 07:02:39 |
| 196.201.234.150 | attack | RDP Bruteforce |
2019-09-10 07:27:57 |
| 217.182.253.230 | attackspam | Sep 9 13:20:59 tdfoods sshd\[10287\]: Invalid user oracle from 217.182.253.230 Sep 9 13:20:59 tdfoods sshd\[10287\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=230.ip-217-182-253.eu Sep 9 13:21:01 tdfoods sshd\[10287\]: Failed password for invalid user oracle from 217.182.253.230 port 56056 ssh2 Sep 9 13:26:08 tdfoods sshd\[10850\]: Invalid user redmine from 217.182.253.230 Sep 9 13:26:08 tdfoods sshd\[10850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=230.ip-217-182-253.eu |
2019-09-10 07:27:28 |
| 106.51.143.178 | attackbotsspam | Sep 9 20:21:23 h2177944 sshd\[30636\]: Invalid user vnc from 106.51.143.178 port 46030 Sep 9 20:21:23 h2177944 sshd\[30636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.143.178 Sep 9 20:21:25 h2177944 sshd\[30636\]: Failed password for invalid user vnc from 106.51.143.178 port 46030 ssh2 Sep 9 20:27:55 h2177944 sshd\[30892\]: Invalid user sammy from 106.51.143.178 port 52102 Sep 9 20:27:55 h2177944 sshd\[30892\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.143.178 ... |
2019-09-10 06:57:17 |
| 222.92.137.106 | attack | Sep 10 02:22:14 itv-usvr-01 sshd[13844]: Invalid user tom from 222.92.137.106 Sep 10 02:22:14 itv-usvr-01 sshd[13844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.92.137.106 Sep 10 02:22:14 itv-usvr-01 sshd[13844]: Invalid user tom from 222.92.137.106 Sep 10 02:22:16 itv-usvr-01 sshd[13844]: Failed password for invalid user tom from 222.92.137.106 port 40876 ssh2 Sep 10 02:27:40 itv-usvr-01 sshd[14030]: Invalid user git from 222.92.137.106 |
2019-09-10 07:03:42 |
| 40.121.198.205 | attackspam | 30 failed attempt(s) in the last 24h |
2019-09-10 07:09:15 |
| 165.227.150.158 | attack | SSH invalid-user multiple login try |
2019-09-10 07:14:56 |
| 75.80.193.222 | attack | Sep 9 19:23:58 saschabauer sshd[2226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.80.193.222 Sep 9 19:24:00 saschabauer sshd[2226]: Failed password for invalid user team from 75.80.193.222 port 32771 ssh2 |
2019-09-10 07:37:44 |
| 175.212.62.83 | attack | Sep 10 04:39:03 areeb-Workstation sshd[18567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.212.62.83 Sep 10 04:39:05 areeb-Workstation sshd[18567]: Failed password for invalid user support from 175.212.62.83 port 51292 ssh2 ... |
2019-09-10 07:29:46 |