City: Ashburn
Region: Virginia
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
NetRange: 18.32.0.0 - 18.255.255.255
CIDR: 18.128.0.0/9, 18.64.0.0/10, 18.32.0.0/11
NetName: AT-88-Z
NetHandle: NET-18-32-0-0-1
Parent: NET18 (NET-18-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Amazon Technologies Inc. (AT-88-Z)
RegDate: 2019-10-07
Updated: 2021-02-10
Ref: https://rdap.arin.net/registry/ip/18.32.0.0
OrgName: Amazon Technologies Inc.
OrgId: AT-88-Z
Address: 410 Terry Ave N.
City: Seattle
StateProv: WA
PostalCode: 98109
Country: US
RegDate: 2011-12-08
Updated: 2024-01-24
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email) Without these we will be unable to identify the correct owner of the IP address at that point in time.
Ref: https://rdap.arin.net/registry/entity/AT-88-Z
OrgNOCHandle: AANO1-ARIN
OrgNOCName: Amazon AWS Network Operations
OrgNOCPhone: +1-206-555-0000
OrgNOCEmail: amzn-noc-contact@amazon.com
OrgNOCRef: https://rdap.arin.net/registry/entity/AANO1-ARIN
OrgRoutingHandle: IPROU3-ARIN
OrgRoutingName: IP Routing
OrgRoutingPhone: +1-206-555-0000
OrgRoutingEmail: aws-routing-poc@amazon.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/IPROU3-ARIN
OrgAbuseHandle: AEA8-ARIN
OrgAbuseName: Amazon EC2 Abuse
OrgAbusePhone: +1-206-555-0000
OrgAbuseEmail: trustandsafety@support.aws.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/AEA8-ARIN
OrgTechHandle: ANO24-ARIN
OrgTechName: Amazon EC2 Network Operations
OrgTechPhone: +1-206-555-0000
OrgTechEmail: amzn-noc-contact@amazon.com
OrgTechRef: https://rdap.arin.net/registry/entity/ANO24-ARIN
OrgRoutingHandle: ARMP-ARIN
OrgRoutingName: AWS RPKI Management POC
OrgRoutingPhone: +1-206-555-0000
OrgRoutingEmail: aws-rpki-routing-poc@amazon.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/ARMP-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.212.48.96
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50597
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;18.212.48.96. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025102400 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 24 17:31:45 CST 2025
;; MSG SIZE rcvd: 105
96.48.212.18.in-addr.arpa domain name pointer ec2-18-212-48-96.compute-1.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
96.48.212.18.in-addr.arpa name = ec2-18-212-48-96.compute-1.amazonaws.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 217.182.71.54 | attackbotsspam | Sep 16 13:41:00 OPSO sshd\[22847\]: Invalid user suzanne from 217.182.71.54 port 44144 Sep 16 13:41:00 OPSO sshd\[22847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.71.54 Sep 16 13:41:03 OPSO sshd\[22847\]: Failed password for invalid user suzanne from 217.182.71.54 port 44144 ssh2 Sep 16 13:45:00 OPSO sshd\[23357\]: Invalid user adrc from 217.182.71.54 port 39357 Sep 16 13:45:00 OPSO sshd\[23357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.71.54 |
2019-09-17 01:35:59 |
| 120.52.96.216 | attack | *Port Scan* detected from 120.52.96.216 (CN/China/-). 4 hits in the last 225 seconds |
2019-09-17 01:50:40 |
| 185.234.219.70 | attack | Sep 16 10:20:37 herz-der-gamer postfix/smtpd[1423]: warning: unknown[185.234.219.70]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-09-17 01:04:43 |
| 175.200.176.224 | attack | $f2bV_matches |
2019-09-17 01:02:46 |
| 132.148.18.214 | attack | Automatic report - Banned IP Access |
2019-09-17 01:38:30 |
| 197.248.16.118 | attack | Sep 16 18:55:53 pornomens sshd\[29686\]: Invalid user tosi from 197.248.16.118 port 34584 Sep 16 18:55:53 pornomens sshd\[29686\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.248.16.118 Sep 16 18:55:56 pornomens sshd\[29686\]: Failed password for invalid user tosi from 197.248.16.118 port 34584 ssh2 ... |
2019-09-17 01:23:56 |
| 81.22.45.242 | attackspam | 09/16/2019-07:22:51.900698 81.22.45.242 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-09-17 01:12:12 |
| 189.181.199.161 | attackbotsspam | detected by Fail2Ban |
2019-09-17 01:08:17 |
| 31.133.78.128 | attackspam | SMB Server BruteForce Attack |
2019-09-17 01:46:30 |
| 51.75.19.175 | attack | Sep 16 10:42:25 thevastnessof sshd[27933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.19.175 ... |
2019-09-17 01:44:01 |
| 211.232.116.147 | attackbotsspam | Unauthorized IMAP connection attempt |
2019-09-17 01:23:25 |
| 178.128.74.234 | attackbots | Sep 16 11:16:45 web8 sshd\[2928\]: Invalid user ax400 from 178.128.74.234 Sep 16 11:16:45 web8 sshd\[2928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.74.234 Sep 16 11:16:48 web8 sshd\[2928\]: Failed password for invalid user ax400 from 178.128.74.234 port 47360 ssh2 Sep 16 11:21:08 web8 sshd\[4924\]: Invalid user oa from 178.128.74.234 Sep 16 11:21:08 web8 sshd\[4924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.74.234 |
2019-09-17 01:48:33 |
| 120.142.161.81 | attackspam | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/120.142.161.81/ KR - 1H : (65) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : KR NAME ASN : ASN10036 IP : 120.142.161.81 CIDR : 120.142.160.0/21 PREFIX COUNT : 519 UNIQUE IP COUNT : 856064 WYKRYTE ATAKI Z ASN10036 : 1H - 1 3H - 1 6H - 1 12H - 1 24H - 2 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN - data recovery |
2019-09-17 01:01:29 |
| 158.222.165.33 | attackbotsspam | DATE:2019-09-16 10:20:54, IP:158.222.165.33, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc) |
2019-09-17 00:51:01 |
| 222.186.30.59 | attack | Sep 16 18:51:53 minden010 sshd[19362]: Failed password for root from 222.186.30.59 port 13297 ssh2 Sep 16 18:51:55 minden010 sshd[19362]: Failed password for root from 222.186.30.59 port 13297 ssh2 Sep 16 18:52:44 minden010 sshd[19653]: Failed password for root from 222.186.30.59 port 51554 ssh2 ... |
2019-09-17 01:29:58 |