城市(city): Ashburn
省份(region): Virginia
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
NetRange: 54.144.0.0 - 54.221.255.255
CIDR: 54.208.0.0/13, 54.220.0.0/15, 54.160.0.0/11, 54.192.0.0/12, 54.216.0.0/14, 54.144.0.0/12
NetName: AMAZON
NetHandle: NET-54-144-0-0-1
Parent: NET54 (NET-54-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Amazon Technologies Inc. (AT-88-Z)
RegDate: 2014-10-23
Updated: 2021-02-10
Ref: https://rdap.arin.net/registry/ip/54.144.0.0
OrgName: Amazon Technologies Inc.
OrgId: AT-88-Z
Address: 410 Terry Ave N.
City: Seattle
StateProv: WA
PostalCode: 98109
Country: US
RegDate: 2011-12-08
Updated: 2024-01-24
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email) Without these we will be unable to identify the correct owner of the IP address at that point in time.
Ref: https://rdap.arin.net/registry/entity/AT-88-Z
OrgRoutingHandle: ARMP-ARIN
OrgRoutingName: AWS RPKI Management POC
OrgRoutingPhone: +1-206-555-0000
OrgRoutingEmail: aws-rpki-routing-poc@amazon.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/ARMP-ARIN
OrgRoutingHandle: IPROU3-ARIN
OrgRoutingName: IP Routing
OrgRoutingPhone: +1-206-555-0000
OrgRoutingEmail: aws-routing-poc@amazon.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/IPROU3-ARIN
OrgNOCHandle: AANO1-ARIN
OrgNOCName: Amazon AWS Network Operations
OrgNOCPhone: +1-206-555-0000
OrgNOCEmail: amzn-noc-contact@amazon.com
OrgNOCRef: https://rdap.arin.net/registry/entity/AANO1-ARIN
OrgTechHandle: ANO24-ARIN
OrgTechName: Amazon EC2 Network Operations
OrgTechPhone: +1-206-555-0000
OrgTechEmail: amzn-noc-contact@amazon.com
OrgTechRef: https://rdap.arin.net/registry/entity/ANO24-ARIN
OrgAbuseHandle: AEA8-ARIN
OrgAbuseName: Amazon EC2 Abuse
OrgAbusePhone: +1-206-555-0000
OrgAbuseEmail: trustandsafety@support.aws.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/AEA8-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.167.164.51
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31129
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;54.167.164.51. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025101200 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Oct 13 00:02:15 CST 2025
;; MSG SIZE rcvd: 106
51.164.167.54.in-addr.arpa domain name pointer ec2-54-167-164-51.compute-1.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
51.164.167.54.in-addr.arpa name = ec2-54-167-164-51.compute-1.amazonaws.com.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
1.255.70.86 | attackspambots | "Account brute force using dictionary attack against Exchange Online" |
2019-08-06 09:24:38 |
103.106.100.90 | attackspam | "Account brute force using dictionary attack against Exchange Online" |
2019-08-06 09:11:21 |
103.107.161.54 | attack | "Account brute force using dictionary attack against Exchange Online" |
2019-08-06 09:10:30 |
103.109.92.234 | attack | "Account brute force using dictionary attack against Exchange Online" |
2019-08-06 09:06:57 |
103.133.62.2 | attackspambots | "Account brute force using dictionary attack against Exchange Online" |
2019-08-06 08:53:58 |
1.220.9.68 | attackspam | "Account brute force using dictionary attack against Exchange Online" |
2019-08-06 09:26:41 |
103.109.57.207 | attack | "Account brute force using dictionary attack against Exchange Online" |
2019-08-06 09:07:20 |
103.107.37.113 | attackbotsspam | "Account brute force using dictionary attack against Exchange Online" |
2019-08-06 09:10:51 |
103.12.114.38 | attackspambots | "Account brute force using dictionary attack against Exchange Online" |
2019-08-06 09:16:31 |
103.109.0.242 | attack | Mail sent to address harvested from public web site |
2019-08-06 09:09:33 |
103.109.93.214 | attackbotsspam | "Account brute force using dictionary attack against Exchange Online" |
2019-08-06 09:06:34 |
111.231.87.233 | attackbots | Aug 6 02:21:23 mail sshd\[24603\]: Failed password for invalid user ubuntu from 111.231.87.233 port 57360 ssh2 Aug 6 02:37:27 mail sshd\[24829\]: Invalid user ca from 111.231.87.233 port 43220 ... |
2019-08-06 09:37:34 |
1.221.173.148 | attack | "Account brute force using dictionary attack against Exchange Online" |
2019-08-06 09:24:59 |
101.109.116.180 | attack | "Account brute force using dictionary attack against Exchange Online" |
2019-08-06 09:20:44 |
103.102.141.2 | attackspambots | "Account brute force using dictionary attack against Exchange Online" |
2019-08-06 09:13:38 |