City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 44.214.2.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25185
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;44.214.2.103. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013001 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 10:16:41 CST 2025
;; MSG SIZE rcvd: 105
103.2.214.44.in-addr.arpa domain name pointer ec2-44-214-2-103.compute-1.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
103.2.214.44.in-addr.arpa name = ec2-44-214-2-103.compute-1.amazonaws.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 113.200.121.186 | attackbots | Unauthorized connection attempt detected from IP address 113.200.121.186 to port 5003 [T] |
2020-05-01 23:30:00 |
| 45.11.99.227 | attackbotsspam | From bounce01@melhorplanoaqui.live Fri May 01 08:48:35 2020 Received: from melhormx5.melhorplanoaqui.live ([45.11.99.227]:46270) |
2020-05-01 23:35:41 |
| 162.243.136.231 | attackbotsspam | 465/tcp 8087/tcp [2020-04-29/30]2pkt |
2020-05-01 23:53:49 |
| 87.18.209.135 | attackbots | Unauthorized connection attempt detected from IP address 87.18.209.135 to port 5555 |
2020-05-01 23:11:39 |
| 84.17.51.113 | attackbotsspam | Misuse of website Webmail facility with dubious links. Coronus spammer. |
2020-05-01 23:54:27 |
| 49.247.214.61 | attackbots | May 1 17:50:14 ift sshd\[58305\]: Failed password for root from 49.247.214.61 port 58248 ssh2May 1 17:52:03 ift sshd\[58463\]: Invalid user purnima from 49.247.214.61May 1 17:52:05 ift sshd\[58463\]: Failed password for invalid user purnima from 49.247.214.61 port 53888 ssh2May 1 17:53:05 ift sshd\[58489\]: Failed password for root from 49.247.214.61 port 40902 ssh2May 1 17:54:06 ift sshd\[58598\]: Invalid user user4 from 49.247.214.61 ... |
2020-05-01 23:19:30 |
| 162.243.141.12 | attackspam | firewall-block, port(s): 8080/tcp |
2020-05-01 23:52:13 |
| 190.182.179.15 | attack | Dovecot Invalid User Login Attempt. |
2020-05-01 23:39:05 |
| 162.243.142.140 | attackbots | 26/tcp 5060/udp 9200/tcp... [2020-04-29/30]4pkt,3pt.(tcp),1pt.(udp) |
2020-05-01 23:36:33 |
| 220.164.226.211 | attackspam | Icarus honeypot on github |
2020-05-01 23:24:24 |
| 134.175.187.78 | attack | May 1 13:54:23 sxvn sshd[536252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.187.78 |
2020-05-01 23:21:14 |
| 203.112.73.170 | attack | $f2bV_matches |
2020-05-01 23:49:35 |
| 80.211.9.126 | attack | [Aegis] @ 2020-01-03 07:23:53 0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack |
2020-05-01 23:50:51 |
| 188.166.211.194 | attackbots | May 1 15:21:57 ns392434 sshd[16152]: Invalid user pak from 188.166.211.194 port 47579 May 1 15:21:57 ns392434 sshd[16152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.211.194 May 1 15:21:57 ns392434 sshd[16152]: Invalid user pak from 188.166.211.194 port 47579 May 1 15:21:58 ns392434 sshd[16152]: Failed password for invalid user pak from 188.166.211.194 port 47579 ssh2 May 1 15:28:55 ns392434 sshd[16359]: Invalid user system from 188.166.211.194 port 55392 May 1 15:28:55 ns392434 sshd[16359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.211.194 May 1 15:28:55 ns392434 sshd[16359]: Invalid user system from 188.166.211.194 port 55392 May 1 15:28:57 ns392434 sshd[16359]: Failed password for invalid user system from 188.166.211.194 port 55392 ssh2 May 1 15:35:09 ns392434 sshd[16463]: Invalid user test from 188.166.211.194 port 59894 |
2020-05-01 23:20:52 |
| 62.234.114.92 | attackspambots | May 1 16:06:27 server sshd[3726]: Failed password for invalid user me from 62.234.114.92 port 34988 ssh2 May 1 16:09:25 server sshd[3998]: Failed password for invalid user paintball from 62.234.114.92 port 39150 ssh2 May 1 16:12:17 server sshd[4288]: Failed password for root from 62.234.114.92 port 43248 ssh2 |
2020-05-01 23:42:15 |