City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.55.103.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49176
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;13.55.103.134. IN A
;; AUTHORITY SECTION:
. 296 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400
;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 12:07:10 CST 2022
;; MSG SIZE rcvd: 106
134.103.55.13.in-addr.arpa domain name pointer ec2-13-55-103-134.ap-southeast-2.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
134.103.55.13.in-addr.arpa name = ec2-13-55-103-134.ap-southeast-2.compute.amazonaws.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 185.47.161.228 | attackspambots | 2019-07-19T01:05:16.408890WS-Zach sshd[22372]: Invalid user mao from 185.47.161.228 port 39930 2019-07-19T01:05:16.414714WS-Zach sshd[22372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.47.161.228 2019-07-19T01:05:16.408890WS-Zach sshd[22372]: Invalid user mao from 185.47.161.228 port 39930 2019-07-19T01:05:18.801720WS-Zach sshd[22372]: Failed password for invalid user mao from 185.47.161.228 port 39930 ssh2 2019-07-19T02:00:56.769350WS-Zach sshd[18495]: Invalid user xk from 185.47.161.228 port 55334 ... |
2019-07-19 15:36:43 |
| 65.189.1.108 | attack | ... |
2019-07-19 15:15:23 |
| 110.244.2.4 | attack | [Aegis] @ 2019-07-19 07:00:09 0100 -> Attempt to use mail server as relay (550: Requested action not taken). |
2019-07-19 15:40:31 |
| 108.36.94.38 | attackbots | Jul 19 08:56:42 meumeu sshd[15021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.36.94.38 Jul 19 08:56:44 meumeu sshd[15021]: Failed password for invalid user zxincsap from 108.36.94.38 port 23876 ssh2 Jul 19 09:03:39 meumeu sshd[16253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.36.94.38 ... |
2019-07-19 15:12:39 |
| 5.15.134.215 | attack | Automatic report - Port Scan Attack |
2019-07-19 15:46:21 |
| 124.112.45.222 | attackspam | Brute force attempt |
2019-07-19 15:10:25 |
| 185.35.139.72 | attack | Apr 18 09:15:25 vtv3 sshd\[9947\]: Invalid user pgsql from 185.35.139.72 port 60780 Apr 18 09:15:25 vtv3 sshd\[9947\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.35.139.72 Apr 18 09:15:27 vtv3 sshd\[9947\]: Failed password for invalid user pgsql from 185.35.139.72 port 60780 ssh2 Apr 18 09:20:53 vtv3 sshd\[12543\]: Invalid user kkw from 185.35.139.72 port 54690 Apr 18 09:20:53 vtv3 sshd\[12543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.35.139.72 Jul 19 08:02:34 vtv3 sshd\[30078\]: Invalid user reg from 185.35.139.72 port 36768 Jul 19 08:02:34 vtv3 sshd\[30078\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.35.139.72 Jul 19 08:02:36 vtv3 sshd\[30078\]: Failed password for invalid user reg from 185.35.139.72 port 36768 ssh2 Jul 19 08:10:43 vtv3 sshd\[1683\]: Invalid user elizabeth from 185.35.139.72 port 45348 Jul 19 08:10:43 vtv3 sshd\[1683\]: pam_unix\(ss |
2019-07-19 15:16:19 |
| 45.55.224.209 | attackspambots | Jul 19 09:47:14 eventyay sshd[22788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.224.209 Jul 19 09:47:16 eventyay sshd[22788]: Failed password for invalid user jenns from 45.55.224.209 port 59365 ssh2 Jul 19 09:51:52 eventyay sshd[24043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.224.209 ... |
2019-07-19 15:53:48 |
| 116.196.83.181 | attackspam | 2019-07-19T07:37:34.165898abusebot-5.cloudsearch.cf sshd\[11718\]: Invalid user cathy from 116.196.83.181 port 53554 |
2019-07-19 15:49:13 |
| 200.60.91.42 | attackspam | Jul 19 08:01:12 localhost sshd\[38749\]: Invalid user gustav from 200.60.91.42 port 45840 Jul 19 08:01:12 localhost sshd\[38749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.60.91.42 ... |
2019-07-19 15:15:50 |
| 178.116.159.202 | attackspambots | Jul 19 08:50:54 MK-Soft-Root1 sshd\[17054\]: Invalid user appserver from 178.116.159.202 port 34630 Jul 19 08:50:54 MK-Soft-Root1 sshd\[17054\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.116.159.202 Jul 19 08:50:57 MK-Soft-Root1 sshd\[17054\]: Failed password for invalid user appserver from 178.116.159.202 port 34630 ssh2 ... |
2019-07-19 15:16:48 |
| 213.32.17.90 | attack | 2019-07-19T07:05:07.538086hub.schaetter.us sshd\[32364\]: Invalid user steam from 213.32.17.90 2019-07-19T07:05:07.581592hub.schaetter.us sshd\[32364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.ip-213-32-17.eu 2019-07-19T07:05:09.535232hub.schaetter.us sshd\[32364\]: Failed password for invalid user steam from 213.32.17.90 port 43540 ssh2 2019-07-19T07:09:40.806096hub.schaetter.us sshd\[32408\]: Invalid user mitchell from 213.32.17.90 2019-07-19T07:09:40.854059hub.schaetter.us sshd\[32408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.ip-213-32-17.eu ... |
2019-07-19 15:57:56 |
| 122.3.87.216 | attackbotsspam | 122.3.87.216 - - [19/Jul/2019:08:01:29 +0200] "GET /wp-login.php HTTP/1.1" 302 576 ... |
2019-07-19 15:26:02 |
| 61.147.103.184 | attackbotsspam | CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found |
2019-07-19 15:51:33 |
| 206.189.131.213 | attackspambots | 19.07.2019 07:17:19 SSH access blocked by firewall |
2019-07-19 15:58:15 |