City: Boardman
Region: Oregon
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 35.71.64.0 - 35.95.255.255
CIDR: 35.71.128.0/17, 35.80.0.0/12, 35.72.0.0/13, 35.71.64.0/18
NetName: AT-88-Z
NetHandle: NET-35-71-64-0-1
Parent: NET35 (NET-35-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Amazon Technologies Inc. (AT-88-Z)
RegDate: 2019-04-15
Updated: 2024-02-01
Ref: https://rdap.arin.net/registry/ip/35.71.64.0
OrgName: Amazon Technologies Inc.
OrgId: AT-88-Z
Address: 410 Terry Ave N.
City: Seattle
StateProv: WA
PostalCode: 98109
Country: US
RegDate: 2011-12-08
Updated: 2026-04-17
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email) Without these we will be unable to identify the correct owner of the IP address at that point in time.
Ref: https://rdap.arin.net/registry/entity/AT-88-Z
OrgRoutingHandle: IPROU3-ARIN
OrgRoutingName: IP Routing
OrgRoutingPhone: +1-206-555-0000
OrgRoutingEmail: aws-routing-poc@amazon.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/IPROU3-ARIN
OrgDNSHandle: DNS1131-ARIN
OrgDNSName: DNS
OrgDNSPhone: +1-202-555-0000
OrgDNSEmail: ipmanagement+dns@amazon.com
OrgDNSRef: https://rdap.arin.net/registry/entity/DNS1131-ARIN
OrgRoutingHandle: ARMP-ARIN
OrgRoutingName: AWS RPKI Management POC
OrgRoutingPhone: +1-206-555-0000
OrgRoutingEmail: aws-rpki-routing-poc@amazon.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/ARMP-ARIN
OrgNOCHandle: AANO1-ARIN
OrgNOCName: Amazon AWS Network Operations
OrgNOCPhone: +1-206-555-0000
OrgNOCEmail: amzn-noc-contact@amazon.com
OrgNOCRef: https://rdap.arin.net/registry/entity/AANO1-ARIN
OrgAbuseHandle: AEA8-ARIN
OrgAbuseName: Amazon EC2 Abuse
OrgAbusePhone: +1-206-555-0000
OrgAbuseEmail: trustandsafety@support.aws.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/AEA8-ARIN
OrgTechHandle: ANO24-ARIN
OrgTechName: Amazon EC2 Network Operations
OrgTechPhone: +1-206-555-0000
OrgTechEmail: amzn-noc-contact@amazon.com
OrgTechRef: https://rdap.arin.net/registry/entity/ANO24-ARIN
# end
# start
NetRange: 35.80.0.0 - 35.95.255.255
CIDR: 35.80.0.0/12
NetName: AMAZON-ZPDX
NetHandle: NET-35-80-0-0-1
Parent: AT-88-Z (NET-35-71-64-0-1)
NetType: Reallocated
OriginAS:
Organization: Amazon.com, Inc. (AMAZO-47)
RegDate: 2020-09-28
Updated: 2020-09-28
Ref: https://rdap.arin.net/registry/ip/35.80.0.0
OrgName: Amazon.com, Inc.
OrgId: AMAZO-47
Address: EC2, EC2 1200 12th Ave South
City: Seattle
StateProv: WA
PostalCode: 98144
Country: US
RegDate: 2011-05-10
Updated: 2021-07-22
Ref: https://rdap.arin.net/registry/entity/AMAZO-47
OrgTechHandle: ANO24-ARIN
OrgTechName: Amazon EC2 Network Operations
OrgTechPhone: +1-206-555-0000
OrgTechEmail: amzn-noc-contact@amazon.com
OrgTechRef: https://rdap.arin.net/registry/entity/ANO24-ARIN
OrgAbuseHandle: AEA8-ARIN
OrgAbuseName: Amazon EC2 Abuse
OrgAbusePhone: +1-206-555-0000
OrgAbuseEmail: trustandsafety@support.aws.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/AEA8-ARIN
OrgRoutingHandle: IPROU3-ARIN
OrgRoutingName: IP Routing
OrgRoutingPhone: +1-206-555-0000
OrgRoutingEmail: aws-routing-poc@amazon.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/IPROU3-ARIN
OrgNOCHandle: AANO1-ARIN
OrgNOCName: Amazon AWS Network Operations
OrgNOCPhone: +1-206-555-0000
OrgNOCEmail: amzn-noc-contact@amazon.com
OrgNOCRef: https://rdap.arin.net/registry/entity/AANO1-ARIN
OrgRoutingHandle: ARMP-ARIN
OrgRoutingName: AWS RPKI Management POC
OrgRoutingPhone: +1-206-555-0000
OrgRoutingEmail: aws-rpki-routing-poc@amazon.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/ARMP-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 35.93.87.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5311
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;35.93.87.168. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026052300 1800 900 604800 86400
;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 23 18:00:55 CST 2026
;; MSG SIZE rcvd: 105
168.87.93.35.in-addr.arpa domain name pointer ec2-35-93-87-168.us-west-2.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
168.87.93.35.in-addr.arpa name = ec2-35-93-87-168.us-west-2.compute.amazonaws.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 222.186.15.158 | attackspam | Mar 6 17:19:37 MK-Soft-Root1 sshd[24749]: Failed password for root from 222.186.15.158 port 17496 ssh2 Mar 6 17:19:39 MK-Soft-Root1 sshd[24749]: Failed password for root from 222.186.15.158 port 17496 ssh2 ... |
2020-03-07 00:38:11 |
| 171.233.58.24 | attack | Unauthorized connection attempt from IP address 171.233.58.24 on Port 445(SMB) |
2020-03-07 00:58:54 |
| 181.110.240.194 | attackbots | Mar 6 17:56:28 server sshd[1458434]: Failed password for root from 181.110.240.194 port 44404 ssh2 Mar 6 17:58:37 server sshd[1462063]: Failed password for invalid user gaochangfeng from 181.110.240.194 port 44448 ssh2 Mar 6 18:00:51 server sshd[1466359]: Failed password for invalid user jessie from 181.110.240.194 port 44492 ssh2 |
2020-03-07 01:10:50 |
| 145.239.198.218 | attackbotsspam | Mar 6 17:01:27 server sshd\[27314\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.ip-145-239-198.eu user=apache Mar 6 17:01:29 server sshd\[27314\]: Failed password for apache from 145.239.198.218 port 51518 ssh2 Mar 6 17:19:35 server sshd\[30390\]: Invalid user teste from 145.239.198.218 Mar 6 17:19:35 server sshd\[30390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.ip-145-239-198.eu Mar 6 17:19:37 server sshd\[30390\]: Failed password for invalid user teste from 145.239.198.218 port 54654 ssh2 ... |
2020-03-07 00:55:46 |
| 87.103.135.220 | attackspam | Unauthorized connection attempt from IP address 87.103.135.220 on Port 445(SMB) |
2020-03-07 01:17:08 |
| 183.150.32.182 | attack | suspicious action Fri, 06 Mar 2020 10:30:58 -0300 |
2020-03-07 01:23:34 |
| 80.82.77.212 | attack | 80.82.77.212 was recorded 18 times by 12 hosts attempting to connect to the following ports: 1900,1723. Incident counter (4h, 24h, all-time): 18, 50, 5250 |
2020-03-07 00:53:31 |
| 186.52.106.106 | attack | Unauthorized connection attempt from IP address 186.52.106.106 on Port 445(SMB) |
2020-03-07 01:28:22 |
| 42.115.18.179 | attack | Email rejected due to spam filtering |
2020-03-07 00:57:48 |
| 24.85.24.98 | attack | 06.03.2020 14:30:56 - RDP Login Fail Detected by https://www.elinox.de/RDP-Wächter |
2020-03-07 01:26:14 |
| 37.150.255.72 | attack | Email rejected due to spam filtering |
2020-03-07 01:17:32 |
| 194.44.216.162 | attackbotsspam | Unauthorized connection attempt from IP address 194.44.216.162 on Port 445(SMB) |
2020-03-07 01:09:47 |
| 157.55.39.255 | attack | Automatic report - Banned IP Access |
2020-03-07 01:24:03 |
| 93.181.47.3 | attack | Scan detected and blocked 2020.03.06 14:31:15 |
2020-03-07 00:53:04 |
| 163.172.16.54 | attackbotsspam | [Fri Mar 06 20:31:19.863048 2020] [:error] [pid 26828:tid 139872827418368] [client 163.172.16.54:63688] [client 163.172.16.54] ModSecurity: Access denied with code 403 (phase 1). Match of "within %{tx.allowed_http_versions}" against "REQUEST_PROTOCOL" required. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "972"] [id "920430"] [msg "HTTP protocol version is not allowed by policy"] [data "HTTP/1.0"] [severity "CRITICAL"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/POLICY/PROTOCOL_NOT_ALLOWED"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A6"] [tag "PCI/6.5.10"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/"] [unique_id "XmJQp9HfRl4WnnTHLwwUMAAAAUs"]
... |
2020-03-07 00:47:02 |