City: Boardman
Region: Oregon
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 100.21.16.63
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4514
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;100.21.16.63. IN A
;; AUTHORITY SECTION:
. 524 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022032801 1800 900 604800 86400
;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 29 11:24:17 CST 2022
;; MSG SIZE rcvd: 105
63.16.21.100.in-addr.arpa domain name pointer ec2-100-21-16-63.us-west-2.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
63.16.21.100.in-addr.arpa name = ec2-100-21-16-63.us-west-2.compute.amazonaws.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
132.232.2.184 | attackbots | Oct 15 21:55:35 markkoudstaal sshd[16499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.2.184 Oct 15 21:55:37 markkoudstaal sshd[16499]: Failed password for invalid user demelsa from 132.232.2.184 port 7467 ssh2 Oct 15 21:59:55 markkoudstaal sshd[16943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.2.184 |
2019-10-16 04:09:13 |
78.29.9.120 | attackbotsspam | [portscan] tcp/1433 [MsSQL] in spfbl.net:'listed' *(RWIN=1024)(10151156) |
2019-10-16 03:51:13 |
125.231.58.84 | attackbots | Fail2Ban Ban Triggered |
2019-10-16 03:58:05 |
129.21.67.167 | attack | Brute force attempt |
2019-10-16 04:16:58 |
51.15.159.7 | attackbotsspam | fraudulent SSH attempt |
2019-10-16 04:20:26 |
37.49.227.109 | attackspambots | 10/15/2019-14:57:42.491386 37.49.227.109 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 33 |
2019-10-16 03:52:04 |
217.21.193.20 | attackspam | 10/15/2019-11:06:01.932652 217.21.193.20 Protocol: 1 GPL SCAN PING NMAP |
2019-10-16 03:42:31 |
106.12.105.10 | attack | Oct 15 21:59:53 ns41 sshd[4809]: Failed password for root from 106.12.105.10 port 59186 ssh2 Oct 15 21:59:53 ns41 sshd[4809]: Failed password for root from 106.12.105.10 port 59186 ssh2 |
2019-10-16 04:09:34 |
112.85.42.227 | attackspambots | Oct 15 15:45:59 TORMINT sshd\[26640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.227 user=root Oct 15 15:46:01 TORMINT sshd\[26640\]: Failed password for root from 112.85.42.227 port 35341 ssh2 Oct 15 15:46:43 TORMINT sshd\[26674\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.227 user=root ... |
2019-10-16 03:56:38 |
92.118.160.45 | attack | 5222/tcp 389/tcp 27017/tcp... [2019-08-15/10-15]137pkt,64pt.(tcp),6pt.(udp),1tp.(icmp) |
2019-10-16 03:58:37 |
202.133.252.2 | attackbotsspam | [portscan] tcp/1433 [MsSQL] *(RWIN=1024)(10151156) |
2019-10-16 03:42:46 |
185.183.159.212 | attack | Oct 15 16:42:48 firewall sshd[20966]: Failed password for invalid user ts2 from 185.183.159.212 port 55946 ssh2 Oct 15 16:46:29 firewall sshd[21045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.183.159.212 user=root Oct 15 16:46:31 firewall sshd[21045]: Failed password for root from 185.183.159.212 port 39072 ssh2 ... |
2019-10-16 03:52:28 |
165.227.143.37 | attackbots | Oct 15 16:30:09 www sshd\[12196\]: Invalid user frappe from 165.227.143.37 port 49016 ... |
2019-10-16 03:53:02 |
39.135.32.60 | attackbotsspam | [portscan] tcp/1433 [MsSQL] in spfbl.net:'listed' *(RWIN=14600)(10151156) |
2019-10-16 03:54:04 |
62.234.156.66 | attackspambots | Oct 15 21:55:39 root sshd[16676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.156.66 Oct 15 21:55:42 root sshd[16676]: Failed password for invalid user toor from 62.234.156.66 port 57150 ssh2 Oct 15 21:59:50 root sshd[16745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.156.66 ... |
2019-10-16 04:13:17 |