City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.158.45.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64052
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;18.158.45.54. IN A
;; AUTHORITY SECTION:
. 123 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400
;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 18:49:07 CST 2022
;; MSG SIZE rcvd: 105
54.45.158.18.in-addr.arpa domain name pointer ec2-18-158-45-54.eu-central-1.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
54.45.158.18.in-addr.arpa name = ec2-18-158-45-54.eu-central-1.compute.amazonaws.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
183.82.2.22 | attackspambots | Unauthorized connection attempt from IP address 183.82.2.22 on Port 445(SMB) |
2019-09-07 21:55:36 |
142.93.122.185 | attackspam | 2019-09-07T11:55:57.645987abusebot-6.cloudsearch.cf sshd\[28128\]: Invalid user user2 from 142.93.122.185 port 51348 |
2019-09-07 21:39:35 |
139.59.128.97 | attackbotsspam | Sep 7 02:24:03 hpm sshd\[27460\]: Invalid user mc from 139.59.128.97 Sep 7 02:24:03 hpm sshd\[27460\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=labs2.armadilloamarillo.com Sep 7 02:24:05 hpm sshd\[27460\]: Failed password for invalid user mc from 139.59.128.97 port 47032 ssh2 Sep 7 02:28:11 hpm sshd\[27793\]: Invalid user rstudio from 139.59.128.97 Sep 7 02:28:11 hpm sshd\[27793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=labs2.armadilloamarillo.com |
2019-09-07 21:56:04 |
54.37.154.254 | attack | Sep 7 15:50:29 pkdns2 sshd\[40730\]: Invalid user administrator from 54.37.154.254Sep 7 15:50:31 pkdns2 sshd\[40730\]: Failed password for invalid user administrator from 54.37.154.254 port 53682 ssh2Sep 7 15:54:32 pkdns2 sshd\[40885\]: Invalid user smbuser from 54.37.154.254Sep 7 15:54:34 pkdns2 sshd\[40885\]: Failed password for invalid user smbuser from 54.37.154.254 port 47592 ssh2Sep 7 15:58:39 pkdns2 sshd\[41067\]: Invalid user teamspeak from 54.37.154.254Sep 7 15:58:41 pkdns2 sshd\[41067\]: Failed password for invalid user teamspeak from 54.37.154.254 port 41498 ssh2 ... |
2019-09-07 21:28:38 |
37.49.231.130 | attack | 09/07/2019-09:03:02.498318 37.49.231.130 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-09-07 21:15:56 |
218.92.0.143 | attack | Sep 7 05:49:08 aat-srv002 sshd[6996]: Failed password for root from 218.92.0.143 port 8146 ssh2 Sep 7 05:49:22 aat-srv002 sshd[6996]: Failed password for root from 218.92.0.143 port 8146 ssh2 Sep 7 05:49:22 aat-srv002 sshd[6996]: error: maximum authentication attempts exceeded for root from 218.92.0.143 port 8146 ssh2 [preauth] Sep 7 05:49:26 aat-srv002 sshd[7006]: Failed password for root from 218.92.0.143 port 20952 ssh2 ... |
2019-09-07 21:23:52 |
212.44.65.22 | attack | Sep 7 03:12:01 lcprod sshd\[27099\]: Invalid user minecraft from 212.44.65.22 Sep 7 03:12:01 lcprod sshd\[27099\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip65-22.gazinter.net Sep 7 03:12:03 lcprod sshd\[27099\]: Failed password for invalid user minecraft from 212.44.65.22 port 62980 ssh2 Sep 7 03:16:50 lcprod sshd\[27825\]: Invalid user node from 212.44.65.22 Sep 7 03:16:50 lcprod sshd\[27825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip65-22.gazinter.net |
2019-09-07 21:35:12 |
202.187.52.64 | attackspam | Sep 7 19:42:15 our-server-hostname postfix/smtpd[28447]: connect from unknown[202.187.52.64] Sep 7 19:42:17 our-server-hostname sqlgrey: grey: new: 202.187.52.64(202.187.52.64), x@x -> x@x Sep 7 19:42:17 our-server-hostname postfix/policy-spf[30543]: : Policy action=550 Please see hxxp://www.openspf.org/Why?s=mfrom;id=klimta%40apex.net.au;ip=202.187.52.64;r=mx1.cbr.spam-filtering-appliance Sep x@x Sep 7 19:42:18 our-server-hostname postfix/smtpd[28447]: lost connection after DATA from unknown[202.187.52.64] Sep 7 19:42:18 our-server-hostname postfix/smtpd[28447]: disconnect from unknown[202.187.52.64] Sep 7 19:43:10 our-server-hostname postfix/smtpd[28447]: connect from unknown[202.187.52.64] Sep 7 19:43:10 our-server-hostname sqlgrey: grey: early reconnect: 202.187.52.64(202.187.52.64), x@x -> x@x Sep 7 19:43:10 our-server-hostname postfix/policy-spf[30543]: : Policy action=550 Please see hxxp://www.openspf.org/Why?s=mfrom;id=klimta%40apex.net.au;ip=202.187.52........ ------------------------------- |
2019-09-07 21:19:18 |
80.211.114.236 | attackbots | Sep 7 13:14:21 hcbbdb sshd\[8396\]: Invalid user wp-user from 80.211.114.236 Sep 7 13:14:21 hcbbdb sshd\[8396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.114.236 Sep 7 13:14:23 hcbbdb sshd\[8396\]: Failed password for invalid user wp-user from 80.211.114.236 port 58124 ssh2 Sep 7 13:18:59 hcbbdb sshd\[8881\]: Invalid user teamspeak from 80.211.114.236 Sep 7 13:18:59 hcbbdb sshd\[8881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.114.236 |
2019-09-07 21:27:40 |
194.44.243.186 | attack | Sep 7 04:48:57 mail postfix/postscreen[116062]: PREGREET 26 after 0.79 from [194.44.243.186]:49177: EHLO littleitalytours.it ... |
2019-09-07 21:36:31 |
93.51.214.202 | attackspam | Unauthorized connection attempt from IP address 93.51.214.202 on Port 445(SMB) |
2019-09-07 21:17:38 |
1.60.119.245 | attack | ssh failed login |
2019-09-07 21:47:58 |
104.244.77.122 | attack | CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found |
2019-09-07 21:42:22 |
134.209.35.183 | attackbotsspam | Sep 7 15:39:42 localhost sshd\[17412\]: Invalid user qwerty from 134.209.35.183 port 50121 Sep 7 15:39:42 localhost sshd\[17412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.35.183 Sep 7 15:39:44 localhost sshd\[17412\]: Failed password for invalid user qwerty from 134.209.35.183 port 50121 ssh2 |
2019-09-07 21:40:34 |
54.37.68.191 | attackspam | 2019-09-07T13:01:02.340335abusebot-2.cloudsearch.cf sshd\[30467\]: Invalid user minecraft from 54.37.68.191 port 39082 |
2019-09-07 21:20:08 |