City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 44.218.59.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56277
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;44.218.59.66. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025121600 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 16 13:51:23 CST 2025
;; MSG SIZE rcvd: 105
66.59.218.44.in-addr.arpa domain name pointer ec2-44-218-59-66.compute-1.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
66.59.218.44.in-addr.arpa name = ec2-44-218-59-66.compute-1.amazonaws.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 46.38.145.4 | attackspambots | Apr 9 19:58:06 mail postfix/smtpd\[31324\]: warning: unknown\[46.38.145.4\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Apr 9 20:28:27 mail postfix/smtpd\[32290\]: warning: unknown\[46.38.145.4\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Apr 9 20:28:57 mail postfix/smtpd\[32289\]: warning: unknown\[46.38.145.4\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Apr 9 20:29:27 mail postfix/smtpd\[32290\]: warning: unknown\[46.38.145.4\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ |
2020-04-10 03:12:23 |
| 50.115.176.2 | attackspambots | SMTP brute force ... |
2020-04-10 02:56:23 |
| 134.209.100.146 | attack | Automatic report - SSH Brute-Force Attack |
2020-04-10 02:51:36 |
| 91.108.155.43 | attackbotsspam | Apr 9 14:57:54 ns382633 sshd\[27401\]: Invalid user chimistry from 91.108.155.43 port 37564 Apr 9 14:57:54 ns382633 sshd\[27401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.108.155.43 Apr 9 14:57:55 ns382633 sshd\[27401\]: Failed password for invalid user chimistry from 91.108.155.43 port 37564 ssh2 Apr 9 15:06:14 ns382633 sshd\[29504\]: Invalid user postgres from 91.108.155.43 port 39624 Apr 9 15:06:14 ns382633 sshd\[29504\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.108.155.43 |
2020-04-10 03:00:36 |
| 101.50.52.131 | attackspam | Apr 9 12:59:39 hermescis postfix/smtpd[7315]: NOQUEUE: reject: RCPT from fch-101-050-052-131.fch.ne.jp[101.50.52.131]: 550 5.1.1 |
2020-04-10 02:46:47 |
| 134.17.94.55 | attackspam | web-1 [ssh] SSH Attack |
2020-04-10 03:09:40 |
| 154.213.21.167 | attackspam | detected by Fail2Ban |
2020-04-10 03:07:44 |
| 134.175.54.154 | attackbotsspam | Apr 9 17:44:25 localhost sshd[7547]: Invalid user odroid from 134.175.54.154 port 36705 Apr 9 17:44:25 localhost sshd[7547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.54.154 Apr 9 17:44:25 localhost sshd[7547]: Invalid user odroid from 134.175.54.154 port 36705 Apr 9 17:44:27 localhost sshd[7547]: Failed password for invalid user odroid from 134.175.54.154 port 36705 ssh2 Apr 9 17:48:31 localhost sshd[8025]: Invalid user testuser from 134.175.54.154 port 33928 ... |
2020-04-10 02:58:15 |
| 41.193.122.77 | attackspambots | Apr 9 18:15:18 vserver sshd\[31993\]: Invalid user pi from 41.193.122.77Apr 9 18:15:18 vserver sshd\[31995\]: Invalid user pi from 41.193.122.77Apr 9 18:15:20 vserver sshd\[31995\]: Failed password for invalid user pi from 41.193.122.77 port 47966 ssh2Apr 9 18:15:20 vserver sshd\[31993\]: Failed password for invalid user pi from 41.193.122.77 port 47958 ssh2 ... |
2020-04-10 03:04:21 |
| 212.81.57.181 | attack | Apr 9 14:58:32 |
2020-04-10 03:17:36 |
| 93.153.92.91 | attackspambots | Unauthorized connection attempt detected from IP address 93.153.92.91 to port 23 |
2020-04-10 02:47:16 |
| 222.186.52.86 | attackspam | Apr 9 14:55:02 ny01 sshd[1410]: Failed password for root from 222.186.52.86 port 26447 ssh2 Apr 9 14:57:18 ny01 sshd[2449]: Failed password for root from 222.186.52.86 port 10771 ssh2 |
2020-04-10 03:04:52 |
| 34.73.237.110 | attackspambots | xmlrpc attack |
2020-04-10 03:21:17 |
| 106.124.131.214 | attack | 2020-04-09T19:14:00.680101centos sshd[17144]: Invalid user deploy from 106.124.131.214 port 42907 2020-04-09T19:14:02.313510centos sshd[17144]: Failed password for invalid user deploy from 106.124.131.214 port 42907 ssh2 2020-04-09T19:18:26.800786centos sshd[17459]: Invalid user guest from 106.124.131.214 port 36172 ... |
2020-04-10 03:11:40 |
| 218.21.240.24 | attackspambots | web-1 [ssh] SSH Attack |
2020-04-10 03:22:11 |