城市(city): unknown
省份(region): unknown
国家(country): Korea (the Republic of)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.116.235.59
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50210
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;54.116.235.59.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 03:17:58 CST 2025
;; MSG SIZE  rcvd: 10659.235.116.54.in-addr.arpa domain name pointer ec2-54-116-235-59.ap-northeast-2.compute.amazonaws.com.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
59.235.116.54.in-addr.arpa	name = ec2-54-116-235-59.ap-northeast-2.compute.amazonaws.com.
Authoritative answers can be found from:| IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 154.8.217.73 | attackspam | 2019-10-24T07:04:44.078885shield sshd\[20622\]: Invalid user paulo from 154.8.217.73 port 50644 2019-10-24T07:04:44.086857shield sshd\[20622\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.217.73 2019-10-24T07:04:46.390628shield sshd\[20622\]: Failed password for invalid user paulo from 154.8.217.73 port 50644 ssh2 2019-10-24T07:10:50.421888shield sshd\[22004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.217.73 user=root 2019-10-24T07:10:52.304431shield sshd\[22004\]: Failed password for root from 154.8.217.73 port 57958 ssh2 | 2019-10-24 15:39:53 | 
| 185.176.27.166 | attack | 10/24/2019-09:08:04.717353 185.176.27.166 Protocol: 6 ET DROP Dshield Block Listed Source group 1 | 2019-10-24 15:33:28 | 
| 185.170.209.66 | attackspambots | Oct 24 04:46:24 XXX sshd[64994]: Invalid user ev from 185.170.209.66 port 50474 | 2019-10-24 15:42:52 | 
| 117.50.49.57 | attackspam | Invalid user system from 117.50.49.57 port 48872 | 2019-10-24 15:32:11 | 
| 178.128.117.55 | attackbotsspam | Oct 24 03:06:48 xtremcommunity sshd\[48665\]: Invalid user hossain from 178.128.117.55 port 58646 Oct 24 03:06:48 xtremcommunity sshd\[48665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.117.55 Oct 24 03:06:51 xtremcommunity sshd\[48665\]: Failed password for invalid user hossain from 178.128.117.55 port 58646 ssh2 Oct 24 03:11:34 xtremcommunity sshd\[48802\]: Invalid user wolfbuluo666 from 178.128.117.55 port 41192 Oct 24 03:11:34 xtremcommunity sshd\[48802\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.117.55 ... | 2019-10-24 16:05:10 | 
| 46.101.17.215 | attackbots | Oct 24 09:10:59 h2177944 sshd\[1578\]: Invalid user ts-dev from 46.101.17.215 port 54312 Oct 24 09:10:59 h2177944 sshd\[1578\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.17.215 Oct 24 09:11:02 h2177944 sshd\[1578\]: Failed password for invalid user ts-dev from 46.101.17.215 port 54312 ssh2 Oct 24 09:20:11 h2177944 sshd\[1895\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.17.215 user=root ... | 2019-10-24 15:51:04 | 
| 117.2.123.95 | attackspam | 445/tcp [2019-10-24]1pkt | 2019-10-24 15:36:34 | 
| 49.88.112.77 | attackbotsspam | Oct 24 10:17:04 pkdns2 sshd\[63816\]: Failed password for root from 49.88.112.77 port 53172 ssh2Oct 24 10:17:07 pkdns2 sshd\[63816\]: Failed password for root from 49.88.112.77 port 53172 ssh2Oct 24 10:17:09 pkdns2 sshd\[63816\]: Failed password for root from 49.88.112.77 port 53172 ssh2Oct 24 10:20:43 pkdns2 sshd\[63982\]: Failed password for root from 49.88.112.77 port 21386 ssh2Oct 24 10:22:59 pkdns2 sshd\[64044\]: Failed password for root from 49.88.112.77 port 45434 ssh2Oct 24 10:23:01 pkdns2 sshd\[64044\]: Failed password for root from 49.88.112.77 port 45434 ssh2 ... | 2019-10-24 15:29:57 | 
| 36.255.99.63 | attack | 445/tcp 445/tcp 445/tcp [2019-10-24]3pkt | 2019-10-24 15:28:27 | 
| 45.142.195.5 | attack | Oct 24 10:04:27 vmanager6029 postfix/smtpd\[28344\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 24 10:05:09 vmanager6029 postfix/smtpd\[28344\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 | 2019-10-24 16:06:11 | 
| 104.131.29.92 | attackspam | Invalid user www from 104.131.29.92 port 59369 | 2019-10-24 16:10:33 | 
| 103.56.113.201 | attack | Oct 24 08:40:12 SilenceServices sshd[3092]: Failed password for root from 103.56.113.201 port 40126 ssh2 Oct 24 08:44:32 SilenceServices sshd[4220]: Failed password for root from 103.56.113.201 port 59173 ssh2 | 2019-10-24 15:49:30 | 
| 180.245.174.135 | attackbots | 445/tcp [2019-10-24]1pkt | 2019-10-24 15:48:16 | 
| 36.73.31.243 | attackbots | 445/tcp [2019-10-24]1pkt | 2019-10-24 15:51:24 | 
| 195.192.228.222 | attack | firewall-block, port(s): 23/tcp | 2019-10-24 15:51:55 |