城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.192.249.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33744
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;54.192.249.55. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400
;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 05:00:22 CST 2025
;; MSG SIZE rcvd: 106
55.249.192.54.in-addr.arpa domain name pointer server-54-192-249-55.nrt51.r.cloudfront.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
55.249.192.54.in-addr.arpa name = server-54-192-249-55.nrt51.r.cloudfront.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 14.63.167.192 | attack | Aug 2 22:27:48 dedicated sshd[27742]: Invalid user baptist from 14.63.167.192 port 37088 |
2019-08-03 04:46:52 |
| 177.8.58.222 | attack | failed_logins |
2019-08-03 04:34:18 |
| 220.130.221.140 | attack | Aug 2 21:28:25 microserver sshd[49604]: Invalid user dkhan from 220.130.221.140 port 57708 Aug 2 21:28:25 microserver sshd[49604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.221.140 Aug 2 21:28:27 microserver sshd[49604]: Failed password for invalid user dkhan from 220.130.221.140 port 57708 ssh2 Aug 2 21:35:36 microserver sshd[51331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.221.140 user=root Aug 2 21:35:38 microserver sshd[51331]: Failed password for root from 220.130.221.140 port 34336 ssh2 Aug 2 21:49:47 microserver sshd[53941]: Invalid user azuracast from 220.130.221.140 port 37314 Aug 2 21:49:47 microserver sshd[53941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.221.140 Aug 2 21:49:49 microserver sshd[53941]: Failed password for invalid user azuracast from 220.130.221.140 port 37314 ssh2 Aug 2 21:54:34 microserver sshd[54935]: Invalid |
2019-08-03 04:32:54 |
| 196.52.43.104 | attackspambots | Unauthorised access (Aug 2) SRC=196.52.43.104 LEN=44 TTL=247 ID=54321 TCP DPT=445 WINDOW=65535 SYN |
2019-08-03 04:50:13 |
| 41.190.92.194 | attackbots | 2019-08-02T19:29:58.727873abusebot-2.cloudsearch.cf sshd\[24186\]: Invalid user boinc from 41.190.92.194 port 43222 |
2019-08-03 04:53:13 |
| 218.92.0.204 | attack | Aug 2 22:10:38 mail sshd\[26040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.204 user=root Aug 2 22:10:41 mail sshd\[26040\]: Failed password for root from 218.92.0.204 port 30025 ssh2 Aug 2 22:10:42 mail sshd\[26040\]: Failed password for root from 218.92.0.204 port 30025 ssh2 Aug 2 22:10:44 mail sshd\[26040\]: Failed password for root from 218.92.0.204 port 30025 ssh2 Aug 2 22:11:59 mail sshd\[26117\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.204 user=root |
2019-08-03 04:27:26 |
| 185.81.96.80 | attack | Aug 2 22:29:58 www sshd\[229213\]: Invalid user naomi from 185.81.96.80 Aug 2 22:29:58 www sshd\[229213\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.81.96.80 Aug 2 22:30:01 www sshd\[229213\]: Failed password for invalid user naomi from 185.81.96.80 port 50872 ssh2 ... |
2019-08-03 04:28:23 |
| 150.109.167.243 | attackbotsspam | 5009/tcp 32765/udp 9292/tcp... [2019-07-22/08-01]4pkt,3pt.(tcp),1pt.(udp) |
2019-08-03 04:58:13 |
| 59.52.97.130 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2019-08-03 05:10:10 |
| 198.211.102.9 | attackbotsspam | Aug 2 16:53:45 TORMINT sshd\[18440\]: Invalid user omega from 198.211.102.9 Aug 2 16:53:45 TORMINT sshd\[18440\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.102.9 Aug 2 16:53:47 TORMINT sshd\[18440\]: Failed password for invalid user omega from 198.211.102.9 port 57172 ssh2 ... |
2019-08-03 05:15:46 |
| 222.186.52.124 | attack | Aug 2 13:52:59 cac1d2 sshd\[16270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.124 user=root Aug 2 13:53:02 cac1d2 sshd\[16270\]: Failed password for root from 222.186.52.124 port 50930 ssh2 Aug 2 13:53:04 cac1d2 sshd\[16270\]: Failed password for root from 222.186.52.124 port 50930 ssh2 ... |
2019-08-03 04:53:42 |
| 27.128.169.31 | attack | Aug 2 22:16:04 vps647732 sshd[22890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.169.31 Aug 2 22:16:06 vps647732 sshd[22890]: Failed password for invalid user sales1 from 27.128.169.31 port 45070 ssh2 ... |
2019-08-03 04:24:20 |
| 51.79.69.48 | attackbotsspam | Aug 3 00:01:58 www sshd\[112538\]: Invalid user 111111 from 51.79.69.48 Aug 3 00:01:58 www sshd\[112538\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.69.48 Aug 3 00:02:00 www sshd\[112538\]: Failed password for invalid user 111111 from 51.79.69.48 port 56208 ssh2 ... |
2019-08-03 05:07:54 |
| 5.188.86.114 | attackspam | firewall-block, port(s): 1234/tcp, 2017/tcp, 2255/tcp, 2345/tcp, 2589/tcp, 3203/tcp, 3307/tcp, 3315/tcp, 3345/tcp, 3456/tcp, 3555/tcp, 3566/tcp, 3788/tcp, 4563/tcp, 5005/tcp, 5050/tcp, 5555/tcp, 7070/tcp, 7415/tcp, 10000/tcp, 33569/tcp, 34567/tcp |
2019-08-03 05:09:43 |
| 112.85.42.182 | attackspam | Aug 2 23:16:12 server01 sshd\[25676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.182 user=root Aug 2 23:16:14 server01 sshd\[25676\]: Failed password for root from 112.85.42.182 port 48367 ssh2 Aug 2 23:16:31 server01 sshd\[25679\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.182 user=root ... |
2019-08-03 04:38:22 |