City: Ashburn
Region: Virginia
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.213.80.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35968
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;18.213.80.116. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025032100 1800 900 604800 86400
;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 21 20:07:58 CST 2025
;; MSG SIZE rcvd: 106
116.80.213.18.in-addr.arpa domain name pointer ec2-18-213-80-116.compute-1.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
116.80.213.18.in-addr.arpa name = ec2-18-213-80-116.compute-1.amazonaws.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
116.15.147.72 | attack | 2019-11-20 05:53:19 H=bb116-15-147-72.singnet.com.sg [116.15.147.72]:14463 I=[10.100.18.22]:25 F= |
2019-11-20 20:02:45 |
104.131.89.163 | attack | Nov 20 11:46:56 markkoudstaal sshd[15682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.89.163 Nov 20 11:46:58 markkoudstaal sshd[15682]: Failed password for invalid user admimm from 104.131.89.163 port 49742 ssh2 Nov 20 11:50:44 markkoudstaal sshd[16016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.89.163 |
2019-11-20 20:11:40 |
213.230.84.161 | attack | Nov 20 07:16:34 mxgate1 postfix/postscreen[23364]: CONNECT from [213.230.84.161]:2081 to [176.31.12.44]:25 Nov 20 07:16:34 mxgate1 postfix/dnsblog[23368]: addr 213.230.84.161 listed by domain cbl.abuseat.org as 127.0.0.2 Nov 20 07:16:34 mxgate1 postfix/dnsblog[23367]: addr 213.230.84.161 listed by domain zen.spamhaus.org as 127.0.0.11 Nov 20 07:16:34 mxgate1 postfix/dnsblog[23367]: addr 213.230.84.161 listed by domain zen.spamhaus.org as 127.0.0.4 Nov 20 07:16:34 mxgate1 postfix/dnsblog[23366]: addr 213.230.84.161 listed by domain b.barracudacentral.org as 127.0.0.2 Nov 20 07:16:34 mxgate1 postfix/postscreen[23364]: PREGREET 23 after 0.13 from [213.230.84.161]:2081: EHLO [213.230.84.161] Nov 20 07:16:34 mxgate1 postfix/postscreen[23364]: DNSBL rank 4 for [213.230.84.161]:2081 Nov x@x Nov 20 07:16:40 mxgate1 postfix/postscreen[23364]: HANGUP after 6 from [213.230.84.161]:2081 in tests after SMTP handshake Nov 20 07:16:40 mxgate1 postfix/postscreen[23364]: DISCONNECT [21........ ------------------------------- |
2019-11-20 19:55:06 |
123.134.159.186 | attackspambots | badbot |
2019-11-20 19:30:04 |
219.91.254.52 | attackspambots | Unauthorised access (Nov 20) SRC=219.91.254.52 LEN=48 PREC=0x20 TTL=50 ID=3675 DF TCP DPT=445 WINDOW=8192 SYN |
2019-11-20 20:06:36 |
31.208.20.81 | attack | port scan/probe/communication attempt; port 23 |
2019-11-20 19:40:03 |
121.157.82.170 | attack | Automatic report - Banned IP Access |
2019-11-20 19:48:07 |
124.243.198.190 | attackspam | Nov 20 07:23:52 mail sshd\[16027\]: Invalid user cacti from 124.243.198.190 Nov 20 07:23:52 mail sshd\[16027\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.243.198.190 Nov 20 07:23:53 mail sshd\[16027\]: Failed password for invalid user cacti from 124.243.198.190 port 52618 ssh2 ... |
2019-11-20 19:34:40 |
79.135.245.89 | attackspam | SSH invalid-user multiple login attempts |
2019-11-20 19:52:49 |
171.229.86.227 | attackbots | smtpd Brute Force |
2019-11-20 19:49:09 |
106.60.18.160 | attack | badbot |
2019-11-20 19:42:22 |
51.79.105.64 | attackbotsspam | Nov 20 07:13:15 mxgate1 postfix/postscreen[23364]: CONNECT from [51.79.105.64]:51657 to [176.31.12.44]:25 Nov 20 07:13:15 mxgate1 postfix/dnsblog[23367]: addr 51.79.105.64 listed by domain zen.spamhaus.org as 127.0.0.3 Nov 20 07:13:21 mxgate1 postfix/postscreen[23364]: DNSBL rank 2 for [51.79.105.64]:51657 Nov 20 07:13:21 mxgate1 postfix/tlsproxy[23387]: CONNECT from [51.79.105.64]:51657 Nov x@x Nov 20 07:13:22 mxgate1 postfix/postscreen[23364]: DISCONNECT [51.79.105.64]:51657 Nov 20 07:13:22 mxgate1 postfix/tlsproxy[23387]: DISCONNECT [51.79.105.64]:51657 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=51.79.105.64 |
2019-11-20 19:37:45 |
113.231.45.108 | attackspam | badbot |
2019-11-20 19:40:58 |
222.186.173.154 | attackbotsspam | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.154 user=root Failed password for root from 222.186.173.154 port 58588 ssh2 Failed password for root from 222.186.173.154 port 58588 ssh2 Failed password for root from 222.186.173.154 port 58588 ssh2 Failed password for root from 222.186.173.154 port 58588 ssh2 |
2019-11-20 20:04:34 |
213.32.65.111 | attack | Nov 19 23:09:44 web9 sshd\[21722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.65.111 user=root Nov 19 23:09:46 web9 sshd\[21722\]: Failed password for root from 213.32.65.111 port 58182 ssh2 Nov 19 23:13:19 web9 sshd\[22188\]: Invalid user jawana from 213.32.65.111 Nov 19 23:13:19 web9 sshd\[22188\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.65.111 Nov 19 23:13:21 web9 sshd\[22188\]: Failed password for invalid user jawana from 213.32.65.111 port 43234 ssh2 |
2019-11-20 20:01:41 |