City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 3.20.139.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14978
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;3.20.139.157. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022401 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 13:10:48 CST 2025
;; MSG SIZE rcvd: 105
157.139.20.3.in-addr.arpa domain name pointer ec2-3-20-139-157.us-east-2.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
157.139.20.3.in-addr.arpa name = ec2-3-20-139-157.us-east-2.compute.amazonaws.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 222.121.246.165 | attackbots | Unauthorized connection attempt detected from IP address 222.121.246.165 to port 23 |
2020-05-15 17:54:33 |
| 58.221.84.90 | attackspambots | Triggered by Fail2Ban at Ares web server |
2020-05-15 17:52:56 |
| 212.166.68.146 | attack | 2020-05-14T21:50:13.037442linuxbox-skyline sshd[7074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.166.68.146 user=root 2020-05-14T21:50:14.685544linuxbox-skyline sshd[7074]: Failed password for root from 212.166.68.146 port 51346 ssh2 ... |
2020-05-15 18:06:38 |
| 153.37.192.4 | attack | DATE:2020-05-15 06:13:58, IP:153.37.192.4, PORT:ssh SSH brute force auth (docker-dc) |
2020-05-15 17:34:44 |
| 35.227.108.34 | attackbots | leo_www |
2020-05-15 18:18:14 |
| 107.182.182.88 | attack | SSH Brute Force |
2020-05-15 17:58:48 |
| 123.160.173.124 | attackbotsspam | China's GFW probe |
2020-05-15 17:33:10 |
| 118.24.99.161 | attackbotsspam | Invalid user solr from 118.24.99.161 port 46316 |
2020-05-15 17:53:43 |
| 68.183.25.127 | attackspam | May 15 07:04:42 dns1 sshd[10161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.25.127 May 15 07:04:44 dns1 sshd[10161]: Failed password for invalid user adilio from 68.183.25.127 port 40740 ssh2 May 15 07:08:07 dns1 sshd[10290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.25.127 |
2020-05-15 18:14:35 |
| 222.186.175.215 | attackspambots | May 15 11:44:24 ns381471 sshd[8007]: Failed password for root from 222.186.175.215 port 17540 ssh2 May 15 11:44:36 ns381471 sshd[8007]: error: maximum authentication attempts exceeded for root from 222.186.175.215 port 17540 ssh2 [preauth] |
2020-05-15 17:45:58 |
| 221.13.12.222 | attackspam | China's GFW probe |
2020-05-15 17:35:44 |
| 47.107.85.50 | attackspam | $f2bV_matches |
2020-05-15 17:38:47 |
| 218.78.73.117 | attack | May 15 18:50:16 web1 sshd[3402]: Invalid user user from 218.78.73.117 port 48646 May 15 18:50:16 web1 sshd[3402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.73.117 May 15 18:50:16 web1 sshd[3402]: Invalid user user from 218.78.73.117 port 48646 May 15 18:50:18 web1 sshd[3402]: Failed password for invalid user user from 218.78.73.117 port 48646 ssh2 May 15 19:21:51 web1 sshd[11484]: Invalid user ts from 218.78.73.117 port 58316 May 15 19:21:51 web1 sshd[11484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.73.117 May 15 19:21:51 web1 sshd[11484]: Invalid user ts from 218.78.73.117 port 58316 May 15 19:21:53 web1 sshd[11484]: Failed password for invalid user ts from 218.78.73.117 port 58316 ssh2 May 15 19:26:01 web1 sshd[12543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.73.117 user=root May 15 19:26:03 web1 sshd[12543]: Failed password ... |
2020-05-15 17:57:00 |
| 211.145.49.253 | attackbotsspam | Invalid user gorges from 211.145.49.253 port 15227 |
2020-05-15 17:44:38 |
| 169.55.215.156 | attackspambots | Invalid user testadmin from 169.55.215.156 port 49669 |
2020-05-15 17:56:01 |