城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.90.71.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49958
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;52.90.71.66. IN A
;; AUTHORITY SECTION:
. 483 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 17:52:45 CST 2022
;; MSG SIZE rcvd: 104
66.71.90.52.in-addr.arpa domain name pointer ec2-52-90-71-66.compute-1.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
66.71.90.52.in-addr.arpa name = ec2-52-90-71-66.compute-1.amazonaws.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 41.32.231.101 | attackspam | Automatic report - Port Scan Attack |
2019-09-04 10:52:32 |
| 196.43.165.47 | attack | Sep 3 23:16:28 server sshd\[21938\]: Invalid user pichu from 196.43.165.47 port 42486 Sep 3 23:16:28 server sshd\[21938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.43.165.47 Sep 3 23:16:30 server sshd\[21938\]: Failed password for invalid user pichu from 196.43.165.47 port 42486 ssh2 Sep 3 23:23:55 server sshd\[15020\]: Invalid user day from 196.43.165.47 port 55112 Sep 3 23:23:55 server sshd\[15020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.43.165.47 |
2019-09-04 10:53:58 |
| 212.129.38.146 | attackbotsspam | Sep 3 10:48:40 php2 sshd\[22760\]: Invalid user test1 from 212.129.38.146 Sep 3 10:48:40 php2 sshd\[22760\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.38.146 Sep 3 10:48:42 php2 sshd\[22760\]: Failed password for invalid user test1 from 212.129.38.146 port 49972 ssh2 Sep 3 10:52:35 php2 sshd\[23161\]: Invalid user victoria from 212.129.38.146 Sep 3 10:52:35 php2 sshd\[23161\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.38.146 |
2019-09-04 11:25:05 |
| 200.251.37.234 | attackbots | Unauthorized connection attempt from IP address 200.251.37.234 on Port 445(SMB) |
2019-09-04 11:27:52 |
| 92.101.161.226 | attack | 19/9/3@14:31:39: FAIL: IoT-SSH address from=92.101.161.226 ... |
2019-09-04 11:14:51 |
| 122.195.200.148 | attackbotsspam | Sep 3 17:30:05 tdfoods sshd\[26181\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.195.200.148 user=root Sep 3 17:30:06 tdfoods sshd\[26181\]: Failed password for root from 122.195.200.148 port 12496 ssh2 Sep 3 17:30:09 tdfoods sshd\[26181\]: Failed password for root from 122.195.200.148 port 12496 ssh2 Sep 3 17:30:12 tdfoods sshd\[26181\]: Failed password for root from 122.195.200.148 port 12496 ssh2 Sep 3 17:30:13 tdfoods sshd\[26207\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.195.200.148 user=root |
2019-09-04 11:32:54 |
| 219.250.188.133 | attack | Sep 4 05:30:43 mail sshd\[26679\]: Invalid user bing from 219.250.188.133 port 47997 Sep 4 05:30:43 mail sshd\[26679\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.250.188.133 Sep 4 05:30:45 mail sshd\[26679\]: Failed password for invalid user bing from 219.250.188.133 port 47997 ssh2 Sep 4 05:36:13 mail sshd\[27263\]: Invalid user test from 219.250.188.133 port 42113 Sep 4 05:36:13 mail sshd\[27263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.250.188.133 |
2019-09-04 11:40:19 |
| 77.81.16.173 | attackbotsspam | Unauthorized connection attempt from IP address 77.81.16.173 on Port 445(SMB) |
2019-09-04 11:31:46 |
| 139.155.143.195 | attackbots | Sep 4 01:03:01 server sshd\[18515\]: Invalid user wind from 139.155.143.195 port 43132 Sep 4 01:03:01 server sshd\[18515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.143.195 Sep 4 01:03:03 server sshd\[18515\]: Failed password for invalid user wind from 139.155.143.195 port 43132 ssh2 Sep 4 01:06:53 server sshd\[12938\]: Invalid user admin from 139.155.143.195 port 47330 Sep 4 01:06:53 server sshd\[12938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.143.195 |
2019-09-04 11:28:39 |
| 221.204.11.179 | attackbots | Sep 4 02:32:10 www5 sshd\[59475\]: Invalid user steam from 221.204.11.179 Sep 4 02:32:10 www5 sshd\[59475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.204.11.179 Sep 4 02:32:12 www5 sshd\[59475\]: Failed password for invalid user steam from 221.204.11.179 port 34716 ssh2 ... |
2019-09-04 11:00:31 |
| 67.205.142.212 | attack | Sep 3 22:16:15 dedicated sshd[3870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.142.212 user=root Sep 3 22:16:17 dedicated sshd[3870]: Failed password for root from 67.205.142.212 port 58462 ssh2 |
2019-09-04 11:18:16 |
| 125.130.110.20 | attackbots | Sep 3 23:33:14 MK-Soft-VM7 sshd\[32164\]: Invalid user cw123 from 125.130.110.20 port 33242 Sep 3 23:33:14 MK-Soft-VM7 sshd\[32164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.130.110.20 Sep 3 23:33:15 MK-Soft-VM7 sshd\[32164\]: Failed password for invalid user cw123 from 125.130.110.20 port 33242 ssh2 ... |
2019-09-04 10:51:35 |
| 218.98.40.154 | attack | 2019-09-04T03:08:23.173467abusebot-4.cloudsearch.cf sshd\[11764\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.40.154 user=root |
2019-09-04 11:19:36 |
| 218.215.188.167 | attackbotsspam | Sep 4 03:10:44 ms-srv sshd[32855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.215.188.167 Sep 4 03:10:46 ms-srv sshd[32855]: Failed password for invalid user mysql2 from 218.215.188.167 port 52424 ssh2 |
2019-09-04 10:58:32 |
| 125.113.118.235 | attack | Sep 3 21:31:49 www sshd\[53870\]: Invalid user admin from 125.113.118.235Sep 3 21:31:51 www sshd\[53870\]: Failed password for invalid user admin from 125.113.118.235 port 40245 ssh2Sep 3 21:31:54 www sshd\[53870\]: Failed password for invalid user admin from 125.113.118.235 port 40245 ssh2 ... |
2019-09-04 10:55:24 |