城市(city): Ashburn
省份(region): Virginia
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.196.244.61
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56802
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;54.196.244.61. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025110301 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Nov 04 07:30:30 CST 2025
;; MSG SIZE rcvd: 106
61.244.196.54.in-addr.arpa domain name pointer ec2-54-196-244-61.compute-1.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
61.244.196.54.in-addr.arpa name = ec2-54-196-244-61.compute-1.amazonaws.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 18.162.109.62 | attackspambots | Lines containing failures of 18.162.109.62 Oct 5 11:51:47 www sshd[31558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.162.109.62 user=r.r Oct 5 11:51:48 www sshd[31558]: Failed password for r.r from 18.162.109.62 port 53092 ssh2 Oct 5 11:51:49 www sshd[31558]: Received disconnect from 18.162.109.62 port 53092:11: Bye Bye [preauth] Oct 5 11:51:49 www sshd[31558]: Disconnected from authenticating user r.r 18.162.109.62 port 53092 [preauth] Oct 5 12:00:24 www sshd[1055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.162.109.62 user=r.r Oct 5 12:00:26 www sshd[1055]: Failed password for r.r from 18.162.109.62 port 51652 ssh2 Oct 5 12:00:26 www sshd[1055]: Received disconnect from 18.162.109.62 port 51652:11: Bye Bye [preauth] Oct 5 12:00:26 www sshd[1055]: Disconnected from authenticating user r.r 18.162.109.62 port 51652 [preauth] Oct 5 12:04:11 www sshd[1673]: pam_unix(s........ ------------------------------ |
2020-10-08 12:38:40 |
| 171.246.63.231 | attackspam | Port probing on unauthorized port 23 |
2020-10-08 12:37:33 |
| 182.162.104.153 | attackbots | 182.162.104.153 (KR/South Korea/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Oct 8 00:15:55 server2 sshd[20621]: Failed password for root from 183.63.172.52 port 11289 ssh2 Oct 8 00:16:48 server2 sshd[21190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.18.158 user=root Oct 8 00:12:23 server2 sshd[18742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.162.104.153 user=root Oct 8 00:12:25 server2 sshd[18742]: Failed password for root from 182.162.104.153 port 53219 ssh2 Oct 8 00:15:53 server2 sshd[20621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.63.172.52 user=root Oct 8 00:11:43 server2 sshd[18281]: Failed password for root from 192.144.140.20 port 56084 ssh2 IP Addresses Blocked: 183.63.172.52 (CN/China/-) 49.234.18.158 (CN/China/-) |
2020-10-08 12:52:08 |
| 106.12.123.239 | attackspam | Failed password for invalid user samba from 106.12.123.239 port 42704 ssh2 |
2020-10-08 12:15:56 |
| 122.248.33.1 | attackspam | $f2bV_matches |
2020-10-08 12:26:50 |
| 118.24.92.39 | attackbotsspam | Oct 7 23:46:29 rancher-0 sshd[527288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.92.39 user=root Oct 7 23:46:31 rancher-0 sshd[527288]: Failed password for root from 118.24.92.39 port 37040 ssh2 ... |
2020-10-08 12:20:08 |
| 184.178.172.16 | attack | C1,Magento Bruteforce Login Attack POST /index.php/admin/ |
2020-10-08 12:50:08 |
| 120.85.61.98 | attack | Oct 8 03:59:24 xeon sshd[40479]: Failed password for root from 120.85.61.98 port 39115 ssh2 |
2020-10-08 12:21:12 |
| 27.68.25.196 | attack | 20/10/7@16:47:19: FAIL: Alarm-Telnet address from=27.68.25.196 20/10/7@16:47:20: FAIL: Alarm-Telnet address from=27.68.25.196 ... |
2020-10-08 12:28:05 |
| 103.131.71.101 | attackbotsspam | (mod_security) mod_security (id:210730) triggered by 103.131.71.101 (VN/Vietnam/bot-103-131-71-101.coccoc.com): 5 in the last 3600 secs |
2020-10-08 12:36:27 |
| 27.66.72.56 | attack |
|
2020-10-08 12:17:57 |
| 195.201.117.103 | attackspam | Forbidden directory scan :: 2020/10/07 20:47:30 [error] 47022#47022: *156658 access forbidden by rule, client: 195.201.117.103, server: [censored_1], request: "GET //wp-content/plugins/wp-file-manager/readme.txt HTTP/1.1", host: "[censored_1]" |
2020-10-08 12:15:16 |
| 195.154.105.228 | attackspam | 2020-10-07T20:50:57.681275morrigan.ad5gb.com sshd[2495958]: Disconnected from authenticating user root 195.154.105.228 port 49368 [preauth] |
2020-10-08 12:19:40 |
| 122.51.59.95 | attack | Oct 8 10:50:46 itv-usvr-02 sshd[8136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.59.95 user=root Oct 8 10:55:10 itv-usvr-02 sshd[8330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.59.95 user=root Oct 8 10:59:26 itv-usvr-02 sshd[8488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.59.95 user=root |
2020-10-08 12:48:11 |
| 78.180.51.216 | attackspambots | Port probing on unauthorized port 445 |
2020-10-08 12:34:47 |