城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.144.80.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23757
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;54.144.80.195. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400
;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 16:37:49 CST 2025
;; MSG SIZE rcvd: 106
195.80.144.54.in-addr.arpa domain name pointer ec2-54-144-80-195.compute-1.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
195.80.144.54.in-addr.arpa name = ec2-54-144-80-195.compute-1.amazonaws.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 196.43.231.123 | attackbotsspam | Dec 6 02:17:27 web1 sshd\[5520\]: Invalid user klascano from 196.43.231.123 Dec 6 02:17:27 web1 sshd\[5520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.43.231.123 Dec 6 02:17:29 web1 sshd\[5520\]: Failed password for invalid user klascano from 196.43.231.123 port 47589 ssh2 Dec 6 02:21:38 web1 sshd\[5946\]: Invalid user server from 196.43.231.123 Dec 6 02:21:38 web1 sshd\[5946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.43.231.123 |
2019-12-06 20:37:18 |
| 109.228.204.154 | attackbots | $f2bV_matches |
2019-12-06 20:25:25 |
| 122.51.71.197 | attackbotsspam | Dec 6 16:07:23 microserver sshd[52048]: Invalid user vaumousse from 122.51.71.197 port 47040 Dec 6 16:07:23 microserver sshd[52048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.71.197 Dec 6 16:07:25 microserver sshd[52048]: Failed password for invalid user vaumousse from 122.51.71.197 port 47040 ssh2 Dec 6 16:15:21 microserver sshd[53355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.71.197 user=games Dec 6 16:15:23 microserver sshd[53355]: Failed password for games from 122.51.71.197 port 56686 ssh2 |
2019-12-06 20:16:53 |
| 93.173.92.148 | attackbots | Automatic report - Port Scan Attack |
2019-12-06 20:10:44 |
| 129.211.63.79 | attack | Dec 6 10:21:59 lnxweb61 sshd[22655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.63.79 |
2019-12-06 20:35:48 |
| 49.234.28.54 | attackbots | Dec 6 12:26:35 mail sshd[5698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.28.54 Dec 6 12:26:37 mail sshd[5698]: Failed password for invalid user e3w2q1 from 49.234.28.54 port 55972 ssh2 Dec 6 12:35:46 mail sshd[10116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.28.54 |
2019-12-06 20:05:57 |
| 129.211.121.171 | attackbotsspam | Dec 5 23:49:59 hpm sshd\[29227\]: Invalid user 123456 from 129.211.121.171 Dec 5 23:49:59 hpm sshd\[29227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.121.171 Dec 5 23:50:01 hpm sshd\[29227\]: Failed password for invalid user 123456 from 129.211.121.171 port 40908 ssh2 Dec 5 23:56:59 hpm sshd\[29859\]: Invalid user shusuke from 129.211.121.171 Dec 5 23:56:59 hpm sshd\[29859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.121.171 |
2019-12-06 20:04:08 |
| 116.171.247.114 | attackspambots | Dec 5 19:35:23 h2034429 sshd[13138]: Did not receive identification string from 116.171.247.114 Dec 5 19:35:51 h2034429 sshd[13147]: Connection closed by 116.171.247.114 port 57014 [preauth] Dec 5 19:35:52 h2034429 sshd[13153]: Connection closed by 116.171.247.114 port 58265 [preauth] Dec 5 19:36:02 h2034429 sshd[13159]: Connection closed by 116.171.247.114 port 62550 [preauth] Dec 5 19:36:07 h2034429 sshd[13161]: Connection closed by 116.171.247.114 port 64875 [preauth] Dec 5 19:36:24 h2034429 sshd[13174]: Connection closed by 116.171.247.114 port 5546 [preauth] Dec 5 19:37:52 h2034429 sshd[13188]: Connection closed by 116.171.247.114 port 10795 [preauth] Dec 5 19:37:57 h2034429 sshd[13192]: Connection closed by 116.171.247.114 port 13266 [preauth] Dec 5 19:38:04 h2034429 sshd[13196]: Connection closed by 116.171.247.114 port 1 .... truncated .... 03:42:23 h2034429 sshd[27129]: Connection closed by 116.171.247.114 port 36149 [preauth] Dec 6 03:42:31 h2034429........ ------------------------------- |
2019-12-06 20:44:48 |
| 222.186.180.6 | attackspambots | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.6 user=root Failed password for root from 222.186.180.6 port 6988 ssh2 Failed password for root from 222.186.180.6 port 6988 ssh2 Failed password for root from 222.186.180.6 port 6988 ssh2 Failed password for root from 222.186.180.6 port 6988 ssh2 |
2019-12-06 20:45:57 |
| 195.112.232.219 | attack | Unauthorised access (Dec 6) SRC=195.112.232.219 LEN=52 TTL=116 ID=5905 DF TCP DPT=445 WINDOW=8192 SYN |
2019-12-06 20:33:52 |
| 201.145.180.172 | attack | Port 1433 Scan |
2019-12-06 20:17:14 |
| 51.15.207.74 | attack | 2019-12-06T11:59:33.221968abusebot-6.cloudsearch.cf sshd\[4713\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.207.74 user=root |
2019-12-06 20:05:43 |
| 115.197.223.105 | attackbotsspam | Automatic report - Port Scan Attack |
2019-12-06 20:04:25 |
| 207.46.13.190 | attack | Automatic report - Banned IP Access |
2019-12-06 20:08:54 |
| 80.211.35.16 | attack | Dec 6 14:16:27 pkdns2 sshd\[9120\]: Address 80.211.35.16 maps to dns1.cloud.it, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Dec 6 14:16:27 pkdns2 sshd\[9120\]: Invalid user puta from 80.211.35.16Dec 6 14:16:29 pkdns2 sshd\[9120\]: Failed password for invalid user puta from 80.211.35.16 port 45130 ssh2Dec 6 14:22:35 pkdns2 sshd\[9374\]: Address 80.211.35.16 maps to dns1.arubacloud.fr, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Dec 6 14:22:35 pkdns2 sshd\[9374\]: Invalid user kehl from 80.211.35.16Dec 6 14:22:37 pkdns2 sshd\[9374\]: Failed password for invalid user kehl from 80.211.35.16 port 55358 ssh2 ... |
2019-12-06 20:23:47 |