城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.227.7.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25140
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;54.227.7.42. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400
;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 05:50:03 CST 2025
;; MSG SIZE rcvd: 104
42.7.227.54.in-addr.arpa domain name pointer ec2-54-227-7-42.compute-1.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
42.7.227.54.in-addr.arpa name = ec2-54-227-7-42.compute-1.amazonaws.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 81.22.45.251 | attack | 29.06.2019 05:03:59 Connection to port 5920 blocked by firewall |
2019-06-29 14:28:06 |
| 141.98.10.33 | attackspambots | Rude login attack (5 tries in 1d) |
2019-06-29 15:07:59 |
| 51.254.51.182 | attack | 2019-06-29T08:25:46.534932scmdmz1 sshd\[6661\]: Invalid user qhsupport from 51.254.51.182 port 47623 2019-06-29T08:25:46.538321scmdmz1 sshd\[6661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip182.ip-51-254-51.eu 2019-06-29T08:25:48.732022scmdmz1 sshd\[6661\]: Failed password for invalid user qhsupport from 51.254.51.182 port 47623 ssh2 ... |
2019-06-29 14:58:25 |
| 220.130.196.86 | attackbots | LinkSys E-series Routers Remote Code Execution Vulnerability, PTR: 220-130-196-86.HINET-IP.hinet.net. |
2019-06-29 15:16:18 |
| 202.43.168.66 | attackspam | Jun 29 01:08:40 mail postfix/smtpd\[15494\]: NOQUEUE: reject: RCPT from unknown\[202.43.168.66\]: 554 5.7.1 Service unavailable\; Client host \[202.43.168.66\] blocked using zen.spamhaus.org\; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/202.43.168.66\; from=\ |
2019-06-29 15:13:03 |
| 58.64.129.145 | attackbots | Honeypot attack, port: 445, PTR: PTR record not found |
2019-06-29 14:42:58 |
| 209.126.67.48 | attackspam | SIP brute force |
2019-06-29 15:15:23 |
| 157.55.39.199 | attackbotsspam | SQL injection:/index.php?menu_selected=143&language=664&sub_menu_selected=988&random=true&random=true&random=true&random=true&random=true&random=true&random=true&random=true&random=true&random=true&random=true&random=true&name=&name=&name=&name=&name=&name=&name=&name=&name=&name=&name=&name=&name=&name=&name=&name=&name=&name=&name=&name= |
2019-06-29 14:31:33 |
| 95.8.111.118 | attackbots | Honeypot attack, port: 23, PTR: 95.8.111.118.dynamic.ttnet.com.tr. |
2019-06-29 14:40:50 |
| 92.119.160.11 | attack | Jun 29 07:11:36 TCP Attack: SRC=92.119.160.11 DST=[Masked] LEN=40 TOS=0x08 PREC=0x20 TTL=240 PROTO=TCP SPT=50155 DPT=11667 WINDOW=1024 RES=0x00 SYN URGP=0 |
2019-06-29 15:14:02 |
| 134.175.184.238 | attackspam | 2019-06-29T01:07:55.822316scmdmz1 sshd\[32120\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.184.238 user=admin 2019-06-29T01:07:57.763078scmdmz1 sshd\[32120\]: Failed password for admin from 134.175.184.238 port 37524 ssh2 2019-06-29T01:09:35.626130scmdmz1 sshd\[32148\]: Invalid user avery from 134.175.184.238 port 54870 ... |
2019-06-29 14:44:10 |
| 189.129.24.11 | attackbots | Honeypot attack, port: 445, PTR: dsl-189-129-24-11-dyn.prod-infinitum.com.mx. |
2019-06-29 14:52:58 |
| 222.87.139.44 | attack | $f2bV_matches |
2019-06-29 14:41:43 |
| 209.97.149.96 | attack | Jun 28 23:06:02 master sshd[22099]: Failed password for root from 209.97.149.96 port 59888 ssh2 |
2019-06-29 15:06:39 |
| 171.104.245.77 | attackspam | 2019-06-28 18:09:16 dovecot_login authenticator failed for (eapagahe.com) [171.104.245.77]:58215 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=ler@lerctr.org) 2019-06-28 18:09:24 dovecot_login authenticator failed for (eapagahe.com) [171.104.245.77]:58470 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=ler@lerctr.org) 2019-06-28 18:09:36 dovecot_login authenticator failed for (eapagahe.com) [171.104.245.77]:58978 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=ler@lerctr.org) ... |
2019-06-29 14:43:31 |