城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.187.34.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60426
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;54.187.34.39. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 20:22:03 CST 2025
;; MSG SIZE rcvd: 105
39.34.187.54.in-addr.arpa domain name pointer ec2-54-187-34-39.us-west-2.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
39.34.187.54.in-addr.arpa name = ec2-54-187-34-39.us-west-2.compute.amazonaws.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 129.226.67.136 | attackspam | 2020-05-06T22:37:50.634590mail.broermann.family sshd[17072]: Invalid user stephane from 129.226.67.136 port 47526 2020-05-06T22:37:50.641210mail.broermann.family sshd[17072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.67.136 2020-05-06T22:37:50.634590mail.broermann.family sshd[17072]: Invalid user stephane from 129.226.67.136 port 47526 2020-05-06T22:37:53.042740mail.broermann.family sshd[17072]: Failed password for invalid user stephane from 129.226.67.136 port 47526 ssh2 2020-05-06T22:40:58.924593mail.broermann.family sshd[17204]: Invalid user hja from 129.226.67.136 port 41862 ... |
2020-05-07 06:29:24 |
| 42.115.123.252 | attack | Dovecot Invalid User Login Attempt. |
2020-05-07 06:07:52 |
| 185.50.149.12 | attack | May 6 23:53:03 relay postfix/smtpd\[13730\]: warning: unknown\[185.50.149.12\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 6 23:53:19 relay postfix/smtpd\[10314\]: warning: unknown\[185.50.149.12\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 7 00:00:43 relay postfix/smtpd\[17278\]: warning: unknown\[185.50.149.12\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 7 00:00:55 relay postfix/smtpd\[9848\]: warning: unknown\[185.50.149.12\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 7 00:02:35 relay postfix/smtpd\[17278\]: warning: unknown\[185.50.149.12\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-05-07 06:06:00 |
| 185.164.138.21 | attackspam | SASL PLAIN auth failed: ruser=... |
2020-05-07 06:29:54 |
| 183.88.243.225 | attackbots | Dovecot Invalid User Login Attempt. |
2020-05-07 06:27:00 |
| 222.252.43.69 | attackbotsspam | 2020-05-06 22:11:06 plain_virtual_exim authenticator failed for ([127.0.0.1]) [222.252.43.69]: 535 Incorrect authentication data ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=222.252.43.69 |
2020-05-07 06:27:30 |
| 37.59.102.132 | attack | May 6 15:07:08 foo sshd[17323]: Did not receive identification string from 37.59.102.132 May 6 16:08:34 foo sshd[18872]: Address 37.59.102.132 maps to erp.asycom.es, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! May 6 16:08:34 foo sshd[18872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.102.132 user=r.r May 6 16:08:36 foo sshd[18872]: Failed password for r.r from 37.59.102.132 port 51150 ssh2 May 6 16:08:36 foo sshd[18872]: Received disconnect from 37.59.102.132: 11: Bye Bye [preauth] May 6 16:08:37 foo sshd[18874]: Address 37.59.102.132 maps to erp.asycom.es, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! May 6 16:08:37 foo sshd[18874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.102.132 user=r.r May 6 16:08:39 foo sshd[18874]: Failed password for r.r from 37.59.102.132 port 52964 ssh2 May 6 16:08:39 foo sshd[18........ ------------------------------- |
2020-05-07 06:26:26 |
| 167.172.24.59 | attackspambots | May 6 19:52:36 ntop sshd[10886]: Invalid user dup from 167.172.24.59 port 43090 May 6 19:52:36 ntop sshd[10886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.24.59 May 6 19:52:38 ntop sshd[10886]: Failed password for invalid user dup from 167.172.24.59 port 43090 ssh2 May 6 19:52:39 ntop sshd[10886]: Received disconnect from 167.172.24.59 port 43090:11: Bye Bye [preauth] May 6 19:52:39 ntop sshd[10886]: Disconnected from invalid user dup 167.172.24.59 port 43090 [preauth] May 6 19:58:41 ntop sshd[15070]: Invalid user dup from 167.172.24.59 port 34840 May 6 19:58:41 ntop sshd[15070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.24.59 May 6 19:58:42 ntop sshd[15070]: Failed password for invalid user dup from 167.172.24.59 port 34840 ssh2 May 6 19:58:43 ntop sshd[15070]: Received disconnect from 167.172.24.59 port 34840:11: Bye Bye [preauth] May 6 19:58:43 ntop........ ------------------------------- |
2020-05-07 06:38:50 |
| 191.184.42.175 | attackbots | May 6 18:23:22 firewall sshd[9195]: Failed password for invalid user homekit from 191.184.42.175 port 59186 ssh2 May 6 18:31:11 firewall sshd[9444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.184.42.175 user=root May 6 18:31:13 firewall sshd[9444]: Failed password for root from 191.184.42.175 port 35530 ssh2 ... |
2020-05-07 06:22:16 |
| 160.16.144.52 | attack | (smtpauth) Failed SMTP AUTH login from 160.16.144.52 (JP/Japan/tk2-408-45048.vs.sakura.ne.jp): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-05-07 00:51:31 login authenticator failed for tk2-408-45048.vs.sakura.ne.jp (ADMIN) [160.16.144.52]: 535 Incorrect authentication data (set_id=contact@nazeranyekta.ir) |
2020-05-07 06:08:37 |
| 45.142.195.7 | attackbotsspam | $f2bV_matches |
2020-05-07 06:15:56 |
| 138.68.16.40 | attackspam | invalid login attempt (elasticsearch) |
2020-05-07 06:10:25 |
| 185.175.93.23 | attack | Multiport scan : 34 ports scanned 5921 5922 5923 5924(x2) 5925(x2) 5926 5927(x2) 5928(x2) 5929(x2) 5930(x2) 5931(x2) 5932(x2) 5933 5934(x2) 5935(x2) 5936(x2) 5937 5938 5939 5940 5941 5942 5943 5944 5945 5948 5953 5955 5957 5958 5959 5960 5961 5963 |
2020-05-07 06:33:15 |
| 128.199.96.100 | attackbots | May 6 19:00:51 firewall sshd[9981]: Invalid user dtr from 128.199.96.100 May 6 19:00:52 firewall sshd[9981]: Failed password for invalid user dtr from 128.199.96.100 port 42336 ssh2 May 6 19:04:55 firewall sshd[10090]: Invalid user tom from 128.199.96.100 ... |
2020-05-07 06:12:16 |
| 193.176.181.214 | attackbots | 2020-05-06T22:32:16.928951rocketchat.forhosting.nl sshd[691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.176.181.214 2020-05-06T22:32:16.924654rocketchat.forhosting.nl sshd[691]: Invalid user nagios from 193.176.181.214 port 50686 2020-05-06T22:32:18.477195rocketchat.forhosting.nl sshd[691]: Failed password for invalid user nagios from 193.176.181.214 port 50686 ssh2 ... |
2020-05-07 06:32:41 |