City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 44.251.35.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21910
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;44.251.35.66.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 03:18:46 CST 2025
;; MSG SIZE  rcvd: 10566.35.251.44.in-addr.arpa domain name pointer ec2-44-251-35-66.us-west-2.compute.amazonaws.com.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
66.35.251.44.in-addr.arpa	name = ec2-44-251-35-66.us-west-2.compute.amazonaws.com.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 120.70.103.239 | attackbots | Invalid user login from 120.70.103.239 port 60268 | 2020-06-16 18:55:18 | 
| 188.166.232.29 | attackbotsspam | Jun 16 10:33:46 debian-2gb-nbg1-2 kernel: \[14555130.151871\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=188.166.232.29 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x40 TTL=242 ID=36659 PROTO=TCP SPT=48351 DPT=10197 WINDOW=1024 RES=0x00 SYN URGP=0 | 2020-06-16 18:24:04 | 
| 223.247.140.89 | attack | Jun 16 11:15:39 vmi345603 sshd[5554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.140.89 Jun 16 11:15:41 vmi345603 sshd[5554]: Failed password for invalid user brt from 223.247.140.89 port 42690 ssh2 ... | 2020-06-16 18:34:10 | 
| 52.158.252.119 | attack | fail2ban - Attack against WordPress | 2020-06-16 18:41:06 | 
| 49.233.190.94 | attackbotsspam | Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) | 2020-06-16 18:38:18 | 
| 194.180.224.130 | attackspambots | 
 | 2020-06-16 18:20:30 | 
| 42.112.20.32 | attackspam | Report by https://patrick-binder.de ... | 2020-06-16 18:42:32 | 
| 191.53.198.2 | attackspam | T: f2b postfix aggressive 3x | 2020-06-16 18:45:37 | 
| 222.186.42.155 | attackspambots | Too many connections or unauthorized access detected from Arctic banned ip | 2020-06-16 18:18:58 | 
| 123.51.162.52 | attackspam | Jun 16 06:48:49 * sshd[20732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.51.162.52 Jun 16 06:48:51 * sshd[20732]: Failed password for invalid user gustavo from 123.51.162.52 port 58597 ssh2 | 2020-06-16 19:01:39 | 
| 193.239.101.104 | attackbotsspam | Unauthorized IMAP connection attempt | 2020-06-16 18:52:42 | 
| 212.70.149.34 | attackbotsspam | 2020-06-16 13:34:11 dovecot_login authenticator failed for \(User\) \[212.70.149.34\]: 535 Incorrect authentication data \(set_id=zh-cn@org.ua\)2020-06-16 13:34:41 dovecot_login authenticator failed for \(User\) \[212.70.149.34\]: 535 Incorrect authentication data \(set_id=rosa@org.ua\)2020-06-16 13:35:16 dovecot_login authenticator failed for \(User\) \[212.70.149.34\]: 535 Incorrect authentication data \(set_id=pje@org.ua\) ... | 2020-06-16 18:45:01 | 
| 178.217.159.175 | attackbots | Jun 16 05:49:18 vpn01 sshd[18867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.217.159.175 ... | 2020-06-16 18:24:19 | 
| 178.128.41.141 | attackbots | Invalid user tmp from 178.128.41.141 port 49396 | 2020-06-16 18:36:29 | 
| 194.26.29.53 | attack | Jun 16 12:57:38 debian-2gb-nbg1-2 kernel: \[14563761.978457\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.53 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=28834 PROTO=TCP SPT=49044 DPT=4945 WINDOW=1024 RES=0x00 SYN URGP=0 | 2020-06-16 18:57:48 |