City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 44.252.14.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5139
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;44.252.14.52. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021101 1800 900 604800 86400
;; Query time: 160 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 04:11:10 CST 2025
;; MSG SIZE rcvd: 105
52.14.252.44.in-addr.arpa domain name pointer ec2-44-252-14-52.us-west-2.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
52.14.252.44.in-addr.arpa name = ec2-44-252-14-52.us-west-2.compute.amazonaws.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 51.77.109.98 | attackspam | Invalid user zxincsap from 51.77.109.98 port 47180 |
2020-07-12 15:39:12 |
| 187.74.217.152 | attackbotsspam | 2020-07-12T01:41:42.4825191495-001 sshd[49903]: Invalid user djmeero from 187.74.217.152 port 41536 2020-07-12T01:41:44.2293581495-001 sshd[49903]: Failed password for invalid user djmeero from 187.74.217.152 port 41536 ssh2 2020-07-12T01:43:20.5476961495-001 sshd[49976]: Invalid user gk from 187.74.217.152 port 59382 2020-07-12T01:43:20.5515451495-001 sshd[49976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.74.217.152 2020-07-12T01:43:20.5476961495-001 sshd[49976]: Invalid user gk from 187.74.217.152 port 59382 2020-07-12T01:43:22.4155461495-001 sshd[49976]: Failed password for invalid user gk from 187.74.217.152 port 59382 ssh2 ... |
2020-07-12 15:19:27 |
| 14.18.190.5 | attackspam | 2020-07-12T12:29:13.716653billing sshd[10732]: Invalid user woo from 14.18.190.5 port 35056 2020-07-12T12:29:15.971013billing sshd[10732]: Failed password for invalid user woo from 14.18.190.5 port 35056 ssh2 2020-07-12T12:38:56.783587billing sshd[32663]: Invalid user luocongjian from 14.18.190.5 port 53724 ... |
2020-07-12 15:39:25 |
| 138.68.176.38 | attackbotsspam | Jul 12 06:37:30 XXXXXX sshd[57368]: Invalid user Piroska from 138.68.176.38 port 41360 |
2020-07-12 15:43:07 |
| 59.60.85.123 | attackspam | Unauthorized connection attempt detected from IP address 59.60.85.123 to port 23 |
2020-07-12 15:41:51 |
| 79.104.58.62 | attack | Jul 12 05:53:07 rancher-0 sshd[261638]: Invalid user masaco from 79.104.58.62 port 56270 ... |
2020-07-12 15:22:17 |
| 170.106.33.194 | attackbotsspam | (sshd) Failed SSH login from 170.106.33.194 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 12 09:52:01 s1 sshd[23507]: Invalid user admin from 170.106.33.194 port 54814 Jul 12 09:52:03 s1 sshd[23507]: Failed password for invalid user admin from 170.106.33.194 port 54814 ssh2 Jul 12 09:57:01 s1 sshd[23631]: Invalid user admin from 170.106.33.194 port 51138 Jul 12 09:57:03 s1 sshd[23631]: Failed password for invalid user admin from 170.106.33.194 port 51138 ssh2 Jul 12 10:06:06 s1 sshd[23863]: Invalid user eric from 170.106.33.194 port 41084 |
2020-07-12 15:34:05 |
| 142.93.35.169 | attackbots | Trolling for resource vulnerabilities |
2020-07-12 15:10:50 |
| 217.170.204.126 | attackbots | Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-07-12 15:13:53 |
| 51.91.157.114 | attackbots | 2020-07-12T09:14:52+02:00 Pandore sshd[13939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.157.114 ... |
2020-07-12 15:28:14 |
| 51.254.203.205 | attackspambots | Jul 12 07:09:50 marvibiene sshd[7008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.203.205 user=sys Jul 12 07:09:52 marvibiene sshd[7008]: Failed password for sys from 51.254.203.205 port 39370 ssh2 Jul 12 07:18:55 marvibiene sshd[7118]: Invalid user adminvps from 51.254.203.205 port 36778 ... |
2020-07-12 15:38:41 |
| 218.2.197.240 | attackspam | SSH Bruteforce attack |
2020-07-12 15:11:26 |
| 5.67.162.211 | attackbotsspam | DATE:2020-07-12 08:47:02, IP:5.67.162.211, PORT:ssh SSH brute force auth (docker-dc) |
2020-07-12 15:29:04 |
| 37.49.230.133 | attackbots |
|
2020-07-12 15:27:20 |
| 168.228.188.2 | attackspambots | Jul 12 09:28:38 debian-2gb-nbg1-2 kernel: \[16797498.546925\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=168.228.188.2 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=60937 PROTO=TCP SPT=57658 DPT=25270 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-07-12 15:37:09 |