City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.225.99.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61552
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;13.225.99.215. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 06:56:56 CST 2025
;; MSG SIZE rcvd: 106
215.99.225.13.in-addr.arpa domain name pointer server-13-225-99-215.hkg60.r.cloudfront.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
215.99.225.13.in-addr.arpa name = server-13-225-99-215.hkg60.r.cloudfront.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 114.234.31.220 | attack | Brute force SMTP login attempts. |
2019-09-15 13:40:54 |
| 51.75.247.13 | attackbots | F2B jail: sshd. Time: 2019-09-15 07:17:39, Reported by: VKReport |
2019-09-15 13:21:20 |
| 136.232.236.6 | attackspambots | Invalid user sdtdserver from 136.232.236.6 port 37629 |
2019-09-15 14:17:48 |
| 46.166.151.47 | attackspambots | \[2019-09-15 01:39:10\] SECURITY\[20693\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-15T01:39:10.080-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0002146406820574",SessionID="0x7f8a6c362808",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/63541",ACLName="no_extension_match" \[2019-09-15 01:40:14\] SECURITY\[20693\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-15T01:40:14.114-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="81046812410249",SessionID="0x7f8a6c255a88",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/53715",ACLName="no_extension_match" \[2019-09-15 01:42:48\] SECURITY\[20693\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-15T01:42:48.530-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="900146812111447",SessionID="0x7f8a6c6094e8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/65091",ACLName="no_ |
2019-09-15 13:43:45 |
| 192.99.70.12 | attack | Sep 15 05:56:58 nextcloud sshd\[4749\]: Invalid user ftptest from 192.99.70.12 Sep 15 05:56:58 nextcloud sshd\[4749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.70.12 Sep 15 05:57:01 nextcloud sshd\[4749\]: Failed password for invalid user ftptest from 192.99.70.12 port 56216 ssh2 ... |
2019-09-15 13:55:30 |
| 139.59.74.183 | attackspam | Sep 15 07:30:54 mout sshd[4781]: Invalid user po from 139.59.74.183 port 56348 |
2019-09-15 13:41:22 |
| 138.186.138.141 | attack | US - 1H : (257) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : US NAME ASN : ASN264850 IP : 138.186.138.141 CIDR : 138.186.136.0/22 PREFIX COUNT : 5 UNIQUE IP COUNT : 8192 WYKRYTE ATAKI Z ASN264850 : 1H - 1 3H - 1 6H - 1 12H - 1 24H - 2 INFO : Looking for resource vulnerabilities 403 Detected and Blocked by ADMIN - data recovery https://help-dysk.pl |
2019-09-15 13:23:37 |
| 220.120.106.254 | attackbotsspam | Sep 15 05:37:11 localhost sshd\[36139\]: Invalid user superadmin from 220.120.106.254 port 41994 Sep 15 05:37:11 localhost sshd\[36139\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.120.106.254 Sep 15 05:37:13 localhost sshd\[36139\]: Failed password for invalid user superadmin from 220.120.106.254 port 41994 ssh2 Sep 15 05:41:52 localhost sshd\[36315\]: Invalid user admin from 220.120.106.254 port 58154 Sep 15 05:41:52 localhost sshd\[36315\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.120.106.254 ... |
2019-09-15 13:58:52 |
| 52.53.245.164 | attackbotsspam | Sep 15 09:09:22 www sshd\[25171\]: Invalid user aldikact from 52.53.245.164 Sep 15 09:09:22 www sshd\[25171\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.53.245.164 Sep 15 09:09:24 www sshd\[25171\]: Failed password for invalid user aldikact from 52.53.245.164 port 40832 ssh2 ... |
2019-09-15 14:11:16 |
| 222.186.180.20 | attackbotsspam | Sep 15 07:52:13 legacy sshd[12584]: Failed password for root from 222.186.180.20 port 10271 ssh2 Sep 15 07:52:32 legacy sshd[12598]: Failed password for root from 222.186.180.20 port 30558 ssh2 ... |
2019-09-15 13:53:35 |
| 176.31.252.148 | attack | Sep 15 07:01:36 MK-Soft-Root2 sshd\[28434\]: Invalid user deploy from 176.31.252.148 port 56018 Sep 15 07:01:36 MK-Soft-Root2 sshd\[28434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.252.148 Sep 15 07:01:38 MK-Soft-Root2 sshd\[28434\]: Failed password for invalid user deploy from 176.31.252.148 port 56018 ssh2 ... |
2019-09-15 13:26:29 |
| 178.132.201.205 | attack | 3389BruteforceFW21 |
2019-09-15 13:24:49 |
| 211.75.136.208 | attackbots | Sep 14 19:17:46 hiderm sshd\[21280\]: Invalid user ubnt from 211.75.136.208 Sep 14 19:17:46 hiderm sshd\[21280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211-75-136-208.hinet-ip.hinet.net Sep 14 19:17:49 hiderm sshd\[21280\]: Failed password for invalid user ubnt from 211.75.136.208 port 54497 ssh2 Sep 14 19:21:58 hiderm sshd\[21645\]: Invalid user operator from 211.75.136.208 Sep 14 19:21:58 hiderm sshd\[21645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211-75-136-208.hinet-ip.hinet.net |
2019-09-15 13:28:14 |
| 92.222.75.80 | attack | Sep 15 07:47:12 eventyay sshd[18294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.75.80 Sep 15 07:47:14 eventyay sshd[18294]: Failed password for invalid user amaillard from 92.222.75.80 port 40607 ssh2 Sep 15 07:51:22 eventyay sshd[18430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.75.80 ... |
2019-09-15 13:52:06 |
| 51.68.44.13 | attackbotsspam | Sep 15 07:00:29 h2177944 sshd\[18153\]: Invalid user server from 51.68.44.13 port 52568 Sep 15 07:00:29 h2177944 sshd\[18153\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.44.13 Sep 15 07:00:31 h2177944 sshd\[18153\]: Failed password for invalid user server from 51.68.44.13 port 52568 ssh2 Sep 15 07:04:29 h2177944 sshd\[18217\]: Invalid user admin from 51.68.44.13 port 41908 ... |
2019-09-15 13:22:39 |