City: Columbus
Region: Ohio
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 3.145.249.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8089
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;3.145.249.52. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 11:18:44 CST 2025
;; MSG SIZE rcvd: 105
52.249.145.3.in-addr.arpa domain name pointer ec2-3-145-249-52.us-east-2.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
52.249.145.3.in-addr.arpa name = ec2-3-145-249-52.us-east-2.compute.amazonaws.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 207.46.13.87 | attackspambots | Automatic report - Banned IP Access |
2019-07-15 20:09:20 |
| 104.236.81.204 | attack | Jul 15 08:40:18 Tower sshd[14424]: Connection from 104.236.81.204 port 36522 on 192.168.10.220 port 22 Jul 15 08:40:18 Tower sshd[14424]: Invalid user yumiko from 104.236.81.204 port 36522 Jul 15 08:40:18 Tower sshd[14424]: error: Could not get shadow information for NOUSER Jul 15 08:40:18 Tower sshd[14424]: Failed password for invalid user yumiko from 104.236.81.204 port 36522 ssh2 Jul 15 08:40:18 Tower sshd[14424]: Received disconnect from 104.236.81.204 port 36522:11: Normal Shutdown, Thank you for playing [preauth] Jul 15 08:40:18 Tower sshd[14424]: Disconnected from invalid user yumiko 104.236.81.204 port 36522 [preauth] |
2019-07-15 20:56:13 |
| 142.234.203.41 | attackspam | Unauthorized access detected from banned ip |
2019-07-15 20:48:38 |
| 106.75.45.180 | attackbotsspam | Jul 15 03:15:31 aat-srv002 sshd[5175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.45.180 Jul 15 03:15:33 aat-srv002 sshd[5175]: Failed password for invalid user sw from 106.75.45.180 port 58129 ssh2 Jul 15 03:19:24 aat-srv002 sshd[5264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.45.180 Jul 15 03:19:26 aat-srv002 sshd[5264]: Failed password for invalid user proftpd from 106.75.45.180 port 47111 ssh2 ... |
2019-07-15 20:26:34 |
| 54.68.0.65 | attackspam | 2019-07-15T12:22:27.765457lon01.zurich-datacenter.net sshd\[29492\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-54-68-0-65.us-west-2.compute.amazonaws.com user=redis 2019-07-15T12:22:30.481784lon01.zurich-datacenter.net sshd\[29492\]: Failed password for redis from 54.68.0.65 port 39383 ssh2 2019-07-15T12:22:32.192042lon01.zurich-datacenter.net sshd\[29492\]: Failed password for redis from 54.68.0.65 port 39383 ssh2 2019-07-15T12:22:34.177712lon01.zurich-datacenter.net sshd\[29492\]: Failed password for redis from 54.68.0.65 port 39383 ssh2 2019-07-15T12:22:37.108071lon01.zurich-datacenter.net sshd\[29492\]: Failed password for redis from 54.68.0.65 port 39383 ssh2 ... |
2019-07-15 20:16:43 |
| 110.39.48.250 | attackbotsspam | Jul 15 08:12:09 h2421860 postfix/postscreen[14888]: CONNECT from [110.39.48.250]:7945 to [85.214.119.52]:25 Jul 15 08:12:09 h2421860 postfix/dnsblog[14891]: addr 110.39.48.250 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2 Jul 15 08:12:09 h2421860 postfix/dnsblog[14892]: addr 110.39.48.250 listed by domain zen.spamhaus.org as 127.0.0.11 Jul 15 08:12:09 h2421860 postfix/dnsblog[14892]: addr 110.39.48.250 listed by domain zen.spamhaus.org as 127.0.0.4 Jul 15 08:12:09 h2421860 postfix/dnsblog[14896]: addr 110.39.48.250 listed by domain Unknown.trblspam.com as 185.53.179.7 Jul 15 08:12:09 h2421860 postfix/dnsblog[14893]: addr 110.39.48.250 listed by domain b.barracudacentral.org as 127.0.0.2 Jul 15 08:12:09 h2421860 postfix/dnsblog[14891]: addr 110.39.48.250 listed by domain bl.spameatingmonkey.net as 127.0.0.2 Jul 15 08:12:15 h2421860 postfix/postscreen[14888]: DNSBL rank 8 for [110.39.48.250]:7945 Jul x@x Jul 15 08:12:16 h2421860 postfix/postscreen[14888]: HANGUP after........ ------------------------------- |
2019-07-15 20:40:10 |
| 180.76.110.14 | attack | Jul 15 10:01:06 microserver sshd[46452]: Invalid user grace from 180.76.110.14 port 35040 Jul 15 10:01:06 microserver sshd[46452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.110.14 Jul 15 10:01:08 microserver sshd[46452]: Failed password for invalid user grace from 180.76.110.14 port 35040 ssh2 Jul 15 10:05:16 microserver sshd[47101]: Invalid user node from 180.76.110.14 port 41918 Jul 15 10:05:16 microserver sshd[47101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.110.14 Jul 15 10:17:43 microserver sshd[48556]: Invalid user testuser1 from 180.76.110.14 port 34292 Jul 15 10:17:43 microserver sshd[48556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.110.14 Jul 15 10:17:44 microserver sshd[48556]: Failed password for invalid user testuser1 from 180.76.110.14 port 34292 ssh2 Jul 15 10:21:45 microserver sshd[49179]: Invalid user etri from 180.76.110.14 port 41166 |
2019-07-15 20:20:19 |
| 80.82.77.33 | attackspam | 15.07.2019 11:56:29 Connection to port 12345 blocked by firewall |
2019-07-15 20:17:42 |
| 185.87.187.187 | attack | pfaffenroth-photographie.de 185.87.187.187 \[15/Jul/2019:08:21:01 +0200\] "POST /wp-login.php HTTP/1.1" 200 8449 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" pfaffenroth-photographie.de 185.87.187.187 \[15/Jul/2019:08:21:01 +0200\] "POST /wp-login.php HTTP/1.1" 200 8449 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-07-15 20:56:59 |
| 206.189.93.184 | attackspambots | Invalid user telma from 206.189.93.184 port 41118 |
2019-07-15 20:43:21 |
| 77.117.79.96 | attackspambots | Jul 15 07:13:16 xb3 sshd[9673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.117.79.96.wireless.dyn.drei.com Jul 15 07:13:19 xb3 sshd[9673]: Failed password for invalid user svnadmin from 77.117.79.96 port 40354 ssh2 Jul 15 07:13:19 xb3 sshd[9673]: Received disconnect from 77.117.79.96: 11: Bye Bye [preauth] Jul 15 07:15:11 xb3 sshd[26914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.117.79.96.wireless.dyn.drei.com Jul 15 07:15:13 xb3 sshd[26914]: Failed password for invalid user sj from 77.117.79.96 port 51762 ssh2 Jul 15 07:15:13 xb3 sshd[26914]: Received disconnect from 77.117.79.96: 11: Bye Bye [preauth] Jul 15 07:16:48 xb3 sshd[6356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.117.79.96.wireless.dyn.drei.com Jul 15 07:16:50 xb3 sshd[6356]: Failed password for invalid user sara from 77.117.79.96 port 34144 ssh2 Jul 15 07:16:50 ........ ------------------------------- |
2019-07-15 20:11:10 |
| 185.176.26.104 | attack | Jul 15 10:55:32 box kernel: [1295557.058735] [UFW BLOCK] IN=eth0 OUT= MAC=[munged] SRC=185.176.26.104 DST=[munged] LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=58268 PROTO=TCP SPT=59029 DPT=33043 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 15 11:50:00 box kernel: [1298824.948457] [UFW BLOCK] IN=eth0 OUT= MAC=[munged] SRC=185.176.26.104 DST=[munged] LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=11732 PROTO=TCP SPT=59029 DPT=34953 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 15 13:48:46 box kernel: [1305950.745667] [UFW BLOCK] IN=eth0 OUT= MAC=[munged] SRC=185.176.26.104 DST=[munged] LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=61124 PROTO=TCP SPT=59029 DPT=32403 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 15 14:02:13 box kernel: [1306758.554469] [UFW BLOCK] IN=eth0 OUT= MAC=[munged] SRC=185.176.26.104 DST=[munged] LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=41935 PROTO=TCP SPT=59029 DPT=3817 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 15 14:22:47 box kernel: [1307991.720040] [UFW BLOCK] IN=eth0 OUT= MAC=[munged] SRC=185.176.26.104 DST=[munged] LEN=40 TOS=0x00 PREC=0x00 |
2019-07-15 21:07:04 |
| 103.35.198.220 | attack | 2019-07-15T08:23:18.489129abusebot.cloudsearch.cf sshd\[17341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.35.198.220 user=root |
2019-07-15 20:15:22 |
| 5.196.70.107 | attackspam | Failed password for invalid user jader from 5.196.70.107 port 54898 ssh2 Invalid user user from 5.196.70.107 port 51050 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.70.107 Failed password for invalid user user from 5.196.70.107 port 51050 ssh2 Invalid user vinay from 5.196.70.107 port 46240 |
2019-07-15 20:14:30 |
| 14.186.155.207 | attackbots | Jul 15 08:11:46 shared06 sshd[18320]: Invalid user admin from 14.186.155.207 Jul 15 08:11:46 shared06 sshd[18320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.186.155.207 Jul 15 08:11:48 shared06 sshd[18320]: Failed password for invalid user admin from 14.186.155.207 port 33851 ssh2 Jul 15 08:11:48 shared06 sshd[18320]: Connection closed by 14.186.155.207 port 33851 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=14.186.155.207 |
2019-07-15 20:35:46 |