城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.164.129.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19855
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;54.164.129.139. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019050301 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sat May 04 10:23:03 +08 2019
;; MSG SIZE rcvd: 118
139.129.164.54.in-addr.arpa domain name pointer ec2-54-164-129-139.compute-1.amazonaws.com.
Server: 67.207.67.3
Address: 67.207.67.3#53
Non-authoritative answer:
139.129.164.54.in-addr.arpa name = ec2-54-164-129-139.compute-1.amazonaws.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 200.87.36.19 | attackbots | SMB Server BruteForce Attack |
2020-05-28 17:45:51 |
| 159.65.152.201 | attack | Invalid user test from 159.65.152.201 port 41396 |
2020-05-28 17:40:23 |
| 112.85.42.229 | attack | May 28 11:32:30 abendstille sshd\[5517\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.229 user=root May 28 11:32:33 abendstille sshd\[5517\]: Failed password for root from 112.85.42.229 port 45148 ssh2 May 28 11:33:22 abendstille sshd\[6287\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.229 user=root May 28 11:33:24 abendstille sshd\[6287\]: Failed password for root from 112.85.42.229 port 59922 ssh2 May 28 11:33:27 abendstille sshd\[6287\]: Failed password for root from 112.85.42.229 port 59922 ssh2 ... |
2020-05-28 17:48:18 |
| 51.159.52.209 | attack | May 28 05:21:31 NPSTNNYC01T sshd[31383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.159.52.209 May 28 05:21:33 NPSTNNYC01T sshd[31383]: Failed password for invalid user danko from 51.159.52.209 port 33242 ssh2 May 28 05:26:37 NPSTNNYC01T sshd[31854]: Failed password for root from 51.159.52.209 port 37770 ssh2 ... |
2020-05-28 17:37:57 |
| 77.238.185.51 | attackbots | SSH login attempts. |
2020-05-28 17:56:35 |
| 81.22.100.7 | attackbotsspam | Unauthorized connection attempt detected from IP address 81.22.100.7 to port 80 |
2020-05-28 17:57:23 |
| 104.47.4.36 | attackspambots | SSH login attempts. |
2020-05-28 18:15:29 |
| 49.232.27.254 | attackspam | 2020-05-28T05:48:24.487327v22018076590370373 sshd[27059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.27.254 2020-05-28T05:48:24.480485v22018076590370373 sshd[27059]: Invalid user Administrator from 49.232.27.254 port 48240 2020-05-28T05:48:26.301917v22018076590370373 sshd[27059]: Failed password for invalid user Administrator from 49.232.27.254 port 48240 ssh2 2020-05-28T05:53:18.307993v22018076590370373 sshd[9341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.27.254 user=root 2020-05-28T05:53:20.147856v22018076590370373 sshd[9341]: Failed password for root from 49.232.27.254 port 44158 ssh2 ... |
2020-05-28 17:51:23 |
| 58.87.70.210 | attack | Invalid user webadmin from 58.87.70.210 port 58860 |
2020-05-28 18:01:25 |
| 221.12.107.26 | attackbotsspam | May 28 12:36:58 master sshd[32281]: Failed password for invalid user itmuser from 221.12.107.26 port 60915 ssh2 |
2020-05-28 17:45:26 |
| 187.222.245.85 | attack | SSH login attempts. |
2020-05-28 17:57:48 |
| 154.16.246.84 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-05-28 17:54:01 |
| 45.227.255.224 | attack | 73 packets to ports 21 22 102 106 110 123 125 143 220 443 465 502 587 626 631 993 995 1434 1521 1911 2525 3306 3307 3308 5432 5672 6379 7547 8007 8080 8090 8095 8443 8888 8983 9000 9200 10025 20000 27017 47808 |
2020-05-28 17:41:53 |
| 177.39.112.18 | attack | May 28 10:34:52 debian-2gb-nbg1-2 kernel: \[12913682.933462\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=177.39.112.18 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=45195 PROTO=TCP SPT=51786 DPT=31163 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-05-28 18:10:36 |
| 178.165.99.208 | attackspambots | Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-05-28 18:13:36 |