城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.147.52.153
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13544
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;54.147.52.153. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022802 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 07:48:35 CST 2025
;; MSG SIZE rcvd: 106
153.52.147.54.in-addr.arpa domain name pointer ec2-54-147-52-153.compute-1.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
153.52.147.54.in-addr.arpa name = ec2-54-147-52-153.compute-1.amazonaws.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 34.91.216.220 | attackspam | Port Scan detected! ... |
2020-08-13 20:25:25 |
| 117.254.136.122 | attackspam | Unauthorized connection attempt from IP address 117.254.136.122 on Port 445(SMB) |
2020-08-13 20:03:54 |
| 106.54.138.147 | attackspambots | LAV,DEF GET /shell.php |
2020-08-13 20:08:11 |
| 165.3.86.75 | attack | Unauthorized connection attempt from IP address 165.3.86.75 on Port 445(SMB) |
2020-08-13 20:20:38 |
| 51.91.127.201 | attackspam | Aug 13 14:16:57 ip106 sshd[13055]: Failed password for root from 51.91.127.201 port 49682 ssh2 ... |
2020-08-13 20:32:33 |
| 5.62.20.32 | attackbots | (From finsch.jamika@yahoo.com) Good evening, I was just on your site and filled out your contact form. The feedback page on your site sends you messages like this to your email account which is why you're reading through my message right now correct? This is half the battle with any type of advertising, getting people to actually READ your advertisement and this is exactly what you're doing now! If you have an ad message you would like to blast out to millions of websites via their contact forms in the U.S. or to any country worldwide let me know, I can even focus on particular niches and my prices are very reasonable. Send a message to: destineylylazo75@gmail.com |
2020-08-13 20:15:39 |
| 84.2.84.64 | attack | Automatic report - Port Scan Attack |
2020-08-13 20:31:23 |
| 202.83.36.167 | attackspam | Email rejected due to spam filtering |
2020-08-13 20:39:57 |
| 114.67.216.105 | attackbots | Failed password for root from 114.67.216.105 port 50966 ssh2 |
2020-08-13 20:01:29 |
| 106.202.97.186 | attackspambots | Email rejected due to spam filtering |
2020-08-13 20:39:40 |
| 45.67.233.164 | attackspam | From rsistema-imoveis=marcoslimaimoveis.com.br@motivesse.live Thu Aug 13 00:46:27 2020 Received: from yja3n2uxy2q5.motivesse.live ([45.67.233.164]:45554) |
2020-08-13 20:02:32 |
| 222.186.175.163 | attackbotsspam | Aug 13 14:26:52 eventyay sshd[27367]: Failed password for root from 222.186.175.163 port 20318 ssh2 Aug 13 14:27:05 eventyay sshd[27367]: error: maximum authentication attempts exceeded for root from 222.186.175.163 port 20318 ssh2 [preauth] Aug 13 14:27:11 eventyay sshd[27378]: Failed password for root from 222.186.175.163 port 20978 ssh2 ... |
2020-08-13 20:30:38 |
| 144.217.85.4 | attack | Aug 13 17:17:01 gw1 sshd[8454]: Failed password for root from 144.217.85.4 port 57538 ssh2 ... |
2020-08-13 20:29:41 |
| 178.32.105.63 | attackspam | Aug 13 13:17:01 rocket sshd[24999]: Failed password for root from 178.32.105.63 port 49592 ssh2 Aug 13 13:20:50 rocket sshd[25525]: Failed password for root from 178.32.105.63 port 60406 ssh2 ... |
2020-08-13 20:33:32 |
| 181.188.177.88 | attackspam | Email rejected due to spam filtering |
2020-08-13 20:40:28 |