City: Ashburn
Region: Virginia
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 13.200.0.0 - 13.239.255.255
CIDR: 13.200.0.0/13, 13.224.0.0/12, 13.208.0.0/12
NetName: AT-88-Z
NetHandle: NET-13-200-0-0-1
Parent: NET13 (NET-13-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Amazon Technologies Inc. (AT-88-Z)
RegDate: 2019-10-01
Updated: 2021-02-10
Ref: https://rdap.arin.net/registry/ip/13.200.0.0
OrgName: Amazon Technologies Inc.
OrgId: AT-88-Z
Address: 410 Terry Ave N.
City: Seattle
StateProv: WA
PostalCode: 98109
Country: US
RegDate: 2011-12-08
Updated: 2024-01-24
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email) Without these we will be unable to identify the correct owner of the IP address at that point in time.
Ref: https://rdap.arin.net/registry/entity/AT-88-Z
OrgRoutingHandle: IPROU3-ARIN
OrgRoutingName: IP Routing
OrgRoutingPhone: +1-206-555-0000
OrgRoutingEmail: aws-routing-poc@amazon.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/IPROU3-ARIN
OrgTechHandle: ANO24-ARIN
OrgTechName: Amazon EC2 Network Operations
OrgTechPhone: +1-206-555-0000
OrgTechEmail: amzn-noc-contact@amazon.com
OrgTechRef: https://rdap.arin.net/registry/entity/ANO24-ARIN
OrgAbuseHandle: AEA8-ARIN
OrgAbuseName: Amazon EC2 Abuse
OrgAbusePhone: +1-206-555-0000
OrgAbuseEmail: trustandsafety@support.aws.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/AEA8-ARIN
OrgRoutingHandle: ARMP-ARIN
OrgRoutingName: AWS RPKI Management POC
OrgRoutingPhone: +1-206-555-0000
OrgRoutingEmail: aws-rpki-routing-poc@amazon.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/ARMP-ARIN
OrgNOCHandle: AANO1-ARIN
OrgNOCName: Amazon AWS Network Operations
OrgNOCPhone: +1-206-555-0000
OrgNOCEmail: amzn-noc-contact@amazon.com
OrgNOCRef: https://rdap.arin.net/registry/entity/AANO1-ARIN
# end
# start
NetRange: 13.216.0.0 - 13.223.255.255
CIDR: 13.216.0.0/13
NetName: AMAZON-IAD
NetHandle: NET-13-216-0-0-1
Parent: AT-88-Z (NET-13-200-0-0-1)
NetType: Reallocated
OriginAS:
Organization: Amazon Data Services Northern Virginia (ADSN-1)
RegDate: 2024-09-27
Updated: 2024-09-27
Ref: https://rdap.arin.net/registry/ip/13.216.0.0
OrgName: Amazon Data Services Northern Virginia
OrgId: ADSN-1
Address: 13200 Woodland Park Road
City: Herndon
StateProv: VA
PostalCode: 20171
Country: US
RegDate: 2018-04-25
Updated: 2025-08-14
Ref: https://rdap.arin.net/registry/entity/ADSN-1
OrgNOCHandle: AANO1-ARIN
OrgNOCName: Amazon AWS Network Operations
OrgNOCPhone: +1-206-555-0000
OrgNOCEmail: amzn-noc-contact@amazon.com
OrgNOCRef: https://rdap.arin.net/registry/entity/AANO1-ARIN
OrgTechHandle: ANO24-ARIN
OrgTechName: Amazon EC2 Network Operations
OrgTechPhone: +1-206-555-0000
OrgTechEmail: amzn-noc-contact@amazon.com
OrgTechRef: https://rdap.arin.net/registry/entity/ANO24-ARIN
OrgAbuseHandle: AEA8-ARIN
OrgAbuseName: Amazon EC2 Abuse
OrgAbusePhone: +1-206-555-0000
OrgAbuseEmail: trustandsafety@support.aws.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/AEA8-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.221.161.178
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43195
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;13.221.161.178. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041500 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 16 00:30:06 CST 2026
;; MSG SIZE rcvd: 107
178.161.221.13.in-addr.arpa domain name pointer ec2-13-221-161-178.compute-1.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
178.161.221.13.in-addr.arpa name = ec2-13-221-161-178.compute-1.amazonaws.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 45.171.204.112 | attackbotsspam | telnet attack script |
2020-08-24 22:30:13 |
| 77.247.181.165 | attackspam | Aug 24 15:33:25 prod4 sshd\[16054\]: Failed password for root from 77.247.181.165 port 27930 ssh2 Aug 24 15:33:28 prod4 sshd\[16054\]: Failed password for root from 77.247.181.165 port 27930 ssh2 Aug 24 15:33:30 prod4 sshd\[16054\]: Failed password for root from 77.247.181.165 port 27930 ssh2 ... |
2020-08-24 22:42:54 |
| 5.39.82.14 | attack | 5.39.82.14 - - [24/Aug/2020:15:26:30 +0100] "POST /wp-login.php HTTP/1.1" 200 2017 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 5.39.82.14 - - [24/Aug/2020:15:26:30 +0100] "POST /wp-login.php HTTP/1.1" 200 1969 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 5.39.82.14 - - [24/Aug/2020:15:26:30 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-08-24 22:44:13 |
| 87.117.2.240 | attackbots | 1598269839 - 08/24/2020 13:50:39 Host: 87.117.2.240/87.117.2.240 Port: 445 TCP Blocked |
2020-08-24 22:46:05 |
| 51.210.102.82 | attack | Aug 24 14:53:10 ns382633 sshd\[11562\]: Invalid user pam from 51.210.102.82 port 43310 Aug 24 14:53:10 ns382633 sshd\[11562\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.210.102.82 Aug 24 14:53:12 ns382633 sshd\[11562\]: Failed password for invalid user pam from 51.210.102.82 port 43310 ssh2 Aug 24 15:02:31 ns382633 sshd\[13660\]: Invalid user james from 51.210.102.82 port 55374 Aug 24 15:02:31 ns382633 sshd\[13660\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.210.102.82 |
2020-08-24 22:10:07 |
| 118.25.139.201 | attack | Aug 24 14:34:10 home sshd[22270]: Failed password for root from 118.25.139.201 port 50366 ssh2 Aug 24 14:38:49 home sshd[23854]: Invalid user webuser from 118.25.139.201 port 43152 Aug 24 14:38:49 home sshd[23854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.139.201 Aug 24 14:38:49 home sshd[23854]: Invalid user webuser from 118.25.139.201 port 43152 Aug 24 14:38:51 home sshd[23854]: Failed password for invalid user webuser from 118.25.139.201 port 43152 ssh2 ... |
2020-08-24 22:05:09 |
| 187.188.149.151 | attack | Aug 24 15:38:23 home sshd[44214]: Invalid user server from 187.188.149.151 port 15454 Aug 24 15:38:23 home sshd[44214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.188.149.151 Aug 24 15:38:23 home sshd[44214]: Invalid user server from 187.188.149.151 port 15454 Aug 24 15:38:25 home sshd[44214]: Failed password for invalid user server from 187.188.149.151 port 15454 ssh2 Aug 24 15:42:57 home sshd[45736]: Invalid user lzy from 187.188.149.151 port 49195 ... |
2020-08-24 22:05:37 |
| 51.178.51.152 | attack | Aug 24 13:53:43 l03 sshd[7685]: Invalid user filip from 51.178.51.152 port 54666 ... |
2020-08-24 22:46:35 |
| 185.220.100.255 | attackspambots | (imapd) Failed IMAP login from 185.220.100.255 (DE/Germany/tor-exit-4.zbau.f3netze.de): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Aug 24 16:20:44 ir1 dovecot[3110802]: imap-login: Disconnected (auth failed, 1 attempts in 3 secs): user= |
2020-08-24 22:39:34 |
| 106.54.194.77 | attack | Aug 24 16:03:10 server sshd[16126]: Failed password for invalid user crh from 106.54.194.77 port 39068 ssh2 Aug 24 16:06:57 server sshd[17978]: Failed password for invalid user ubuntu from 106.54.194.77 port 51144 ssh2 Aug 24 16:10:39 server sshd[19879]: Failed password for invalid user tomcat from 106.54.194.77 port 34980 ssh2 |
2020-08-24 22:26:31 |
| 49.230.20.98 | attackspambots | *Port Scan* detected from 49.230.20.98 (TH/Thailand/-). 21 hits in the last 50 seconds; Ports: *; Direction: in; Trigger: PS_LIMIT; Logs: Aug 24 18:50:21 serv kernel: Firewall: *Port Flood* IN=eth0 OUT= MAC=02:8b:61:de:f0:8e:00:21:d8:ca:1e:40:08:00 SRC=49.230.20.98 DST=*** LEN=60 TOS=0x00 PREC=0x00 TTL=57 ID=28991 DF PROTO=TCP SPT=24811 DPT=80 WINDOW=29200 RES=0x00 SYN URGP=0 Aug 24 18:50:21 serv kernel: Firewall: *Port Flood* IN=eth0 OUT= MAC=02:8b:61:de:f0:8e:00:21:d8:ca:1e:40:08:00 SRC=49.230.20.98 DST=*** LEN=48 TOS=0x00 PREC=0x00 TTL=56 ID=38082 DF PROTO=TCP SPT=14709 DPT=80 WINDOW=14600 RES=0x00 SYN URGP=0 Aug 24 18:50:21 serv kernel: Firewall: *Port Flood* IN=eth0 OUT= MAC=02:8b:61:de:f0:8e:00:21:d8:ca:1e:40:08:00 SRC=49.230.20.98 DST=*** LEN=48 TOS=0x00 PREC=0x00 TTL=57 ID=35824 DF PROTO=TCP SPT=37358 DPT=80 WINDOW=14600 RES=0x00 SYN URGP=0 Aug 24 18:50:21 serv kernel: Firewal |
2020-08-24 22:22:44 |
| 185.212.195.122 | attackspambots | Aug 24 13:51:12 melroy-server sshd[31715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.212.195.122 Aug 24 13:51:14 melroy-server sshd[31715]: Failed password for invalid user webmaster from 185.212.195.122 port 42322 ssh2 ... |
2020-08-24 22:20:28 |
| 145.239.206.190 | attackspam | Aug 24 14:51:08 journals sshd\[123089\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.206.190 user=root Aug 24 14:51:10 journals sshd\[123089\]: Failed password for root from 145.239.206.190 port 61193 ssh2 Aug 24 14:51:12 journals sshd\[123089\]: Failed password for root from 145.239.206.190 port 61193 ssh2 Aug 24 14:51:14 journals sshd\[123089\]: Failed password for root from 145.239.206.190 port 61193 ssh2 Aug 24 14:51:17 journals sshd\[123089\]: Failed password for root from 145.239.206.190 port 61193 ssh2 ... |
2020-08-24 22:17:08 |
| 152.32.201.189 | attackbotsspam | 2020-08-24T12:31:30.863938shield sshd\[6427\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.201.189 user=root 2020-08-24T12:31:33.032534shield sshd\[6427\]: Failed password for root from 152.32.201.189 port 60404 ssh2 2020-08-24T12:34:02.993921shield sshd\[6844\]: Invalid user backoffice from 152.32.201.189 port 36528 2020-08-24T12:34:03.003288shield sshd\[6844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.201.189 2020-08-24T12:34:04.840863shield sshd\[6844\]: Failed password for invalid user backoffice from 152.32.201.189 port 36528 ssh2 |
2020-08-24 22:35:36 |
| 178.148.244.66 | attackspambots | Automatic report - XMLRPC Attack |
2020-08-24 22:24:47 |