城市(city): unknown
省份(region): unknown
国家(country): Japan
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.65.130.160
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4257
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;54.65.130.160. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 06:28:36 CST 2025
;; MSG SIZE rcvd: 106
160.130.65.54.in-addr.arpa domain name pointer ec2-54-65-130-160.ap-northeast-1.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
160.130.65.54.in-addr.arpa name = ec2-54-65-130-160.ap-northeast-1.compute.amazonaws.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 68.183.182.199 | attackbots | Jan 25 03:46:44 vpn sshd[3260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.182.199 Jan 25 03:46:46 vpn sshd[3260]: Failed password for invalid user apache from 68.183.182.199 port 41127 ssh2 Jan 25 03:52:23 vpn sshd[3278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.182.199 |
2020-01-05 17:14:48 |
| 68.183.122.94 | attackspam | Dec 31 13:43:17 vpn sshd[8543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.122.94 Dec 31 13:43:19 vpn sshd[8543]: Failed password for invalid user ubuntu from 68.183.122.94 port 46986 ssh2 Dec 31 13:46:58 vpn sshd[8562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.122.94 |
2020-01-05 17:28:34 |
| 68.183.129.99 | attack | Dec 3 04:24:02 vpn sshd[29826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.129.99 Dec 3 04:24:04 vpn sshd[29826]: Failed password for invalid user radio from 68.183.129.99 port 39740 ssh2 Dec 3 04:29:10 vpn sshd[29856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.129.99 |
2020-01-05 17:25:15 |
| 68.183.182.178 | attackbotsspam | Dec 23 15:09:10 vpn sshd[18238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.182.178 Dec 23 15:09:13 vpn sshd[18238]: Failed password for invalid user temp from 68.183.182.178 port 46046 ssh2 Dec 23 15:13:53 vpn sshd[18257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.182.178 |
2020-01-05 17:15:03 |
| 68.183.124.72 | attackspambots | Nov 25 06:13:59 vpn sshd[28419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.124.72 Nov 25 06:14:01 vpn sshd[28419]: Failed password for invalid user admin from 68.183.124.72 port 39578 ssh2 Nov 25 06:23:24 vpn sshd[28463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.124.72 |
2020-01-05 17:25:41 |
| 133.130.109.118 | attackbots | Jan 5 08:31:55 hcbbdb sshd\[24294\]: Invalid user zabbix from 133.130.109.118 Jan 5 08:31:55 hcbbdb sshd\[24294\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v133-130-109-118.a038.g.tyo1.static.cnode.io Jan 5 08:31:57 hcbbdb sshd\[24294\]: Failed password for invalid user zabbix from 133.130.109.118 port 44502 ssh2 Jan 5 08:33:51 hcbbdb sshd\[24493\]: Invalid user test from 133.130.109.118 Jan 5 08:33:51 hcbbdb sshd\[24493\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v133-130-109-118.a038.g.tyo1.static.cnode.io |
2020-01-05 16:58:13 |
| 68.183.62.73 | attackbots | Mar 4 05:39:17 vpn sshd[28929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.62.73 Mar 4 05:39:20 vpn sshd[28929]: Failed password for invalid user qn from 68.183.62.73 port 36554 ssh2 Mar 4 05:44:58 vpn sshd[28964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.62.73 |
2020-01-05 16:57:22 |
| 68.183.227.116 | attackspam | Feb 28 20:45:23 vpn sshd[7705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.227.116 Feb 28 20:45:25 vpn sshd[7705]: Failed password for invalid user ui from 68.183.227.116 port 52075 ssh2 Feb 28 20:52:31 vpn sshd[7712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.227.116 |
2020-01-05 17:07:54 |
| 68.183.165.130 | attackbotsspam | Feb 25 23:48:44 vpn sshd[21807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.165.130 Feb 25 23:48:46 vpn sshd[21807]: Failed password for invalid user lc from 68.183.165.130 port 40424 ssh2 Feb 25 23:54:56 vpn sshd[21825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.165.130 |
2020-01-05 17:16:29 |
| 68.183.186.94 | attackspambots | Feb 6 12:47:20 vpn sshd[4516]: Failed password for root from 68.183.186.94 port 49268 ssh2 Feb 6 12:49:50 vpn sshd[4518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.186.94 Feb 6 12:49:52 vpn sshd[4518]: Failed password for invalid user bot from 68.183.186.94 port 57934 ssh2 |
2020-01-05 17:10:47 |
| 68.183.115.83 | attack | Jan 10 11:35:11 vpn sshd[3450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.115.83 Jan 10 11:35:13 vpn sshd[3450]: Failed password for invalid user tester from 68.183.115.83 port 52406 ssh2 Jan 10 11:38:10 vpn sshd[3466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.115.83 |
2020-01-05 17:29:50 |
| 68.183.104.77 | attack | Mar 9 02:25:26 vpn sshd[20700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.104.77 Mar 9 02:25:27 vpn sshd[20700]: Failed password for invalid user ftpuser from 68.183.104.77 port 33250 ssh2 Mar 9 02:30:06 vpn sshd[20712]: Failed password for root from 68.183.104.77 port 44088 ssh2 |
2020-01-05 17:31:27 |
| 68.183.124.53 | attack | Unauthorized connection attempt detected from IP address 68.183.124.53 to port 2220 [J] |
2020-01-05 17:26:02 |
| 157.7.129.148 | attackbots | $f2bV_matches |
2020-01-05 17:09:33 |
| 68.183.52.89 | attackbotsspam | Dec 2 08:52:33 vpn sshd[22497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.52.89 Dec 2 08:52:36 vpn sshd[22497]: Failed password for invalid user tablette from 68.183.52.89 port 48182 ssh2 Dec 2 08:59:55 vpn sshd[22540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.52.89 |
2020-01-05 17:00:00 |