City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 44.245.0.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3374
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;44.245.0.22. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025030100 1800 900 604800 86400
;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 15:20:46 CST 2025
;; MSG SIZE rcvd: 104
22.0.245.44.in-addr.arpa domain name pointer ec2-44-245-0-22.us-west-2.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
22.0.245.44.in-addr.arpa name = ec2-44-245-0-22.us-west-2.compute.amazonaws.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 139.5.71.29 | attackbotsspam | Unauthorized connection attempt detected from IP address 139.5.71.29 to port 445 |
2020-01-02 19:17:14 |
| 103.247.39.130 | attack | Unauthorized connection attempt detected from IP address 103.247.39.130 to port 8080 |
2020-01-02 19:23:10 |
| 223.206.227.149 | attackbots | Attempt to attack host OS, exploiting network vulnerabilities, on 02-01-2020 06:25:14. |
2020-01-02 19:00:57 |
| 106.13.37.203 | attackspambots | Automatic report - Banned IP Access |
2020-01-02 18:54:59 |
| 101.251.70.85 | attackspam | Unauthorized connection attempt detected from IP address 101.251.70.85 to port 23 |
2020-01-02 19:23:34 |
| 185.175.93.15 | attackbots | 01/02/2020-11:31:56.003212 185.175.93.15 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-01-02 19:01:18 |
| 37.49.230.104 | attackbotsspam | Host Scan |
2020-01-02 18:53:52 |
| 27.2.98.225 | attackspambots | Unauthorized connection attempt detected from IP address 27.2.98.225 to port 5555 |
2020-01-02 19:29:12 |
| 51.15.156.14 | attackspam | Host Scan |
2020-01-02 19:00:43 |
| 195.181.243.115 | attack | 2020-01-02T09:51:10.972117homeassistant sshd[32040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.181.243.115 user=news 2020-01-02T09:51:13.248585homeassistant sshd[32040]: Failed password for news from 195.181.243.115 port 34446 ssh2 ... |
2020-01-02 19:05:31 |
| 47.103.36.53 | attackspambots | Unauthorized connection attempt detected from IP address 47.103.36.53 to port 23 |
2020-01-02 19:26:13 |
| 58.58.125.51 | attackspambots | Unauthorized connection attempt detected from IP address 58.58.125.51 to port 445 |
2020-01-02 19:25:06 |
| 203.205.52.208 | attack | 1577955452 - 01/02/2020 09:57:32 Host: 203.205.52.208/203.205.52.208 Port: 445 TCP Blocked |
2020-01-02 19:13:19 |
| 14.236.126.50 | attackbots | Attempt to attack host OS, exploiting network vulnerabilities, on 02-01-2020 06:25:12. |
2020-01-02 19:09:54 |
| 113.128.219.205 | attack | Unauthorized connection attempt detected from IP address 113.128.219.205 to port 445 |
2020-01-02 19:06:05 |