City: Boardman
Region: Oregon
Country: United States
Internet Service Provider: Amazon Technologies Inc.
Hostname: unknown
Organization: unknown
Usage Type: Data Center/Web Hosting/Transit
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.34.58.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39422
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;52.34.58.147. IN A
;; AUTHORITY SECTION:
. 351 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020070103 1800 900 604800 86400
;; Query time: 114 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jul 02 07:56:57 CST 2020
;; MSG SIZE rcvd: 116
147.58.34.52.in-addr.arpa domain name pointer ec2-52-34-58-147.us-west-2.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
147.58.34.52.in-addr.arpa name = ec2-52-34-58-147.us-west-2.compute.amazonaws.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 42.157.129.158 | attackspambots | Aug 10 08:55:57 www sshd\[46350\]: Invalid user justin from 42.157.129.158 Aug 10 08:55:57 www sshd\[46350\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.157.129.158 Aug 10 08:55:59 www sshd\[46350\]: Failed password for invalid user justin from 42.157.129.158 port 39270 ssh2 ... |
2019-08-10 14:20:03 |
| 171.229.76.15 | attack | " " |
2019-08-10 14:40:33 |
| 58.82.216.167 | attackspambots | Aug 10 04:39:20 nextcloud sshd\[13583\]: Invalid user app from 58.82.216.167 Aug 10 04:39:20 nextcloud sshd\[13583\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.82.216.167 Aug 10 04:39:22 nextcloud sshd\[13583\]: Failed password for invalid user app from 58.82.216.167 port 49142 ssh2 ... |
2019-08-10 14:11:11 |
| 92.118.37.97 | attackbotsspam | Aug 10 04:40:14 TCP Attack: SRC=92.118.37.97 DST=[Masked] LEN=40 TOS=0x08 PREC=0x20 TTL=246 PROTO=TCP SPT=46183 DPT=30066 WINDOW=1024 RES=0x00 SYN URGP=0 |
2019-08-10 14:19:29 |
| 200.146.232.97 | attackspam | Aug 10 08:47:21 srv-4 sshd\[3600\]: Invalid user alex from 200.146.232.97 Aug 10 08:47:21 srv-4 sshd\[3600\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.146.232.97 Aug 10 08:47:23 srv-4 sshd\[3600\]: Failed password for invalid user alex from 200.146.232.97 port 42118 ssh2 ... |
2019-08-10 14:42:57 |
| 36.66.69.33 | attackbots | Aug 10 02:00:34 plusreed sshd[31413]: Invalid user ning from 36.66.69.33 ... |
2019-08-10 14:08:36 |
| 151.80.162.216 | attackbots | Aug 10 05:50:03 postfix/smtpd: warning: unknown[151.80.162.216]: SASL LOGIN authentication failed |
2019-08-10 13:58:42 |
| 203.159.249.215 | attackspam | (sshd) Failed SSH login from 203.159.249.215 (-): 5 in the last 3600 secs |
2019-08-10 14:44:40 |
| 2.228.40.235 | attack | Aug 10 06:28:30 mail sshd\[4145\]: Failed password for root from 2.228.40.235 port 18008 ssh2 Aug 10 06:46:45 mail sshd\[4318\]: Invalid user testftp from 2.228.40.235 port 42197 Aug 10 06:46:45 mail sshd\[4318\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.228.40.235 ... |
2019-08-10 13:52:07 |
| 218.92.0.200 | attackbotsspam | Aug 10 06:16:03 MK-Soft-VM4 sshd\[8517\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.200 user=root Aug 10 06:16:05 MK-Soft-VM4 sshd\[8517\]: Failed password for root from 218.92.0.200 port 16596 ssh2 Aug 10 06:16:08 MK-Soft-VM4 sshd\[8517\]: Failed password for root from 218.92.0.200 port 16596 ssh2 ... |
2019-08-10 14:33:48 |
| 84.253.140.10 | attackspambots | 2019-08-10T05:52:30.137131abusebot-8.cloudsearch.cf sshd\[19787\]: Invalid user benladen from 84.253.140.10 port 56888 |
2019-08-10 14:16:12 |
| 121.128.153.234 | attackbotsspam | Fail2Ban - FTP Abuse Attempt |
2019-08-10 14:37:10 |
| 151.80.140.166 | attackspambots | Aug 10 08:09:08 srv-4 sshd\[450\]: Invalid user farid from 151.80.140.166 Aug 10 08:09:08 srv-4 sshd\[450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.140.166 Aug 10 08:09:10 srv-4 sshd\[450\]: Failed password for invalid user farid from 151.80.140.166 port 60680 ssh2 ... |
2019-08-10 14:43:44 |
| 143.208.186.95 | attack | failed_logins |
2019-08-10 14:24:13 |
| 117.96.235.39 | attackspambots | Telnetd brute force attack detected by fail2ban |
2019-08-10 14:36:29 |