City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.57.211.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22690
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;13.57.211.45. IN A
;; AUTHORITY SECTION:
. 540 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400
;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 17:14:49 CST 2022
;; MSG SIZE rcvd: 105
45.211.57.13.in-addr.arpa domain name pointer ec2-13-57-211-45.us-west-1.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
45.211.57.13.in-addr.arpa name = ec2-13-57-211-45.us-west-1.compute.amazonaws.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 176.221.104.2 | attackspam | Jul 24 10:33:34 mail postfix/postscreen[93611]: PREGREET 39 after 2.1 from [176.221.104.2]:60563: EHLO host-176-221-104-2.dynamic.mm.pl ... |
2019-07-25 07:56:29 |
| 107.173.51.220 | attackspam | (From edwardfleetwood1@gmail.com) Greetings! Have you ever thought about increasing the number of visits your website gets? Are you confident your business website gets enough exposure from potential clients who are searching online? To have your site optimized can also substantially boost how much profit you can make out of your website. I can help you achieve it! I've worked with many clients in the past six years, and they were all extremely pleased with the work I accomplished for them. I'll show you some case studies if you're curious about how this works. For now, I'm offering you a free consultation over the phone, so I can show you the data about your site's potential. Kindly write back with the best number to reach you out with and your preferred time for a call. I look forward to speaking with you soon. Best regards, Edward Fleetwood |
2019-07-25 07:56:09 |
| 103.250.166.4 | attack | Jul 24 16:34:27 TCP Attack: SRC=103.250.166.4 DST=[Masked] LEN=64 TOS=0x00 PREC=0x00 TTL=48 DF PROTO=TCP SPT=57813 DPT=80 WINDOW=457 RES=0x00 ACK URGP=0 |
2019-07-25 07:33:38 |
| 79.155.113.88 | attackbotsspam | Jul 25 00:12:05 srv-4 sshd\[28245\]: Invalid user elasticsearch from 79.155.113.88 Jul 25 00:12:05 srv-4 sshd\[28245\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.155.113.88 Jul 25 00:12:07 srv-4 sshd\[28245\]: Failed password for invalid user elasticsearch from 79.155.113.88 port 56742 ssh2 ... |
2019-07-25 07:35:49 |
| 81.22.45.150 | attackbotsspam | Jul 25 01:21:22 h2177944 kernel: \[2334539.834431\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.150 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=51016 PROTO=TCP SPT=47143 DPT=9504 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 25 01:26:48 h2177944 kernel: \[2334866.035234\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.150 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=10635 PROTO=TCP SPT=47143 DPT=9847 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 25 01:27:21 h2177944 kernel: \[2334898.820149\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.150 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=58576 PROTO=TCP SPT=47143 DPT=9043 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 25 01:36:26 h2177944 kernel: \[2335444.021789\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.150 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=15492 PROTO=TCP SPT=47143 DPT=9440 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 25 01:39:28 h2177944 kernel: \[2335625.655467\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.150 DST=85.214.117.9 LEN= |
2019-07-25 08:20:01 |
| 202.136.88.198 | attack | WordPress brute force |
2019-07-25 07:37:57 |
| 110.138.127.76 | attackspam | Unauthorized connection attempt from IP address 110.138.127.76 on Port 445(SMB) |
2019-07-25 07:54:33 |
| 188.36.112.109 | attackspam | Unauthorized connection attempt from IP address 188.36.112.109 on Port 445(SMB) |
2019-07-25 07:49:57 |
| 73.147.192.183 | attackspam | Automatic report - Port Scan Attack |
2019-07-25 08:08:25 |
| 74.82.47.45 | attackbotsspam | 3389BruteforceFW21 |
2019-07-25 08:12:56 |
| 218.92.0.131 | attackbotsspam | scan r |
2019-07-25 08:02:54 |
| 105.235.130.208 | attack | Unauthorized connection attempt from IP address 105.235.130.208 on Port 445(SMB) |
2019-07-25 07:48:12 |
| 213.183.51.134 | attackbots | Brute forcing RDP port 3389 |
2019-07-25 08:18:34 |
| 182.72.199.106 | attackbots | 2019-07-24T21:22:50.817313abusebot-7.cloudsearch.cf sshd\[21401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.199.106 user=sshd |
2019-07-25 08:13:47 |
| 66.240.205.34 | attackbots | ZeroAccess.Gen Command and Control Traffic |
2019-07-25 07:34:56 |