City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.200.183.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41484
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;52.200.183.142. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012902 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 12:44:59 CST 2025
;; MSG SIZE rcvd: 107
142.183.200.52.in-addr.arpa domain name pointer ec2-52-200-183-142.compute-1.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
142.183.200.52.in-addr.arpa name = ec2-52-200-183-142.compute-1.amazonaws.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 182.61.149.192 | attackbots | Port scan denied |
2020-06-23 15:04:47 |
| 113.189.42.241 | attackbotsspam | 06/23/2020-02:23:27.615079 113.189.42.241 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2020-06-23 15:06:47 |
| 118.24.54.178 | attackspam | SSH invalid-user multiple login try |
2020-06-23 14:48:07 |
| 42.236.10.91 | attackbotsspam | Automated report (2020-06-23T12:58:37+08:00). Scraper detected at this address. |
2020-06-23 14:58:39 |
| 45.4.5.221 | attackbots | $f2bV_matches |
2020-06-23 15:11:33 |
| 104.238.222.52 | attackspam | 06/23/2020-02:36:48.398360 104.238.222.52 Protocol: 17 ET SCAN Sipvicious Scan |
2020-06-23 14:48:59 |
| 45.79.122.36 | attackspambots | Port scan denied |
2020-06-23 14:52:21 |
| 187.12.181.106 | attack | $f2bV_matches |
2020-06-23 14:56:05 |
| 202.118.8.52 | attackbotsspam | " " |
2020-06-23 14:41:03 |
| 202.158.123.42 | attack | SSH brute-force: detected 12 distinct username(s) / 16 distinct password(s) within a 24-hour window. |
2020-06-23 15:01:11 |
| 51.254.156.114 | attack | Unauthorized access or intrusion attempt detected from Thor banned IP |
2020-06-23 15:20:08 |
| 45.10.55.68 | attack | SpamScore above: 10.0 |
2020-06-23 14:52:50 |
| 35.234.136.100 | attack | $f2bV_matches |
2020-06-23 14:40:48 |
| 38.102.173.20 | attack | Jun 23 03:00:49 NPSTNNYC01T sshd[31986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.102.173.20 Jun 23 03:00:50 NPSTNNYC01T sshd[31986]: Failed password for invalid user efm from 38.102.173.20 port 38930 ssh2 Jun 23 03:05:11 NPSTNNYC01T sshd[325]: Failed password for root from 38.102.173.20 port 29268 ssh2 ... |
2020-06-23 15:05:50 |
| 129.204.3.65 | attackspambots | This client attempted to login to an administrator account on a Website, or abused from another resource. |
2020-06-23 15:07:33 |