City: Boardman
Region: Oregon
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.39.222.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16707
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;52.39.222.72. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019071400 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jul 14 18:23:24 CST 2019
;; MSG SIZE rcvd: 116
72.222.39.52.in-addr.arpa domain name pointer ec2-52-39-222-72.us-west-2.compute.amazonaws.com.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
72.222.39.52.in-addr.arpa name = ec2-52-39-222-72.us-west-2.compute.amazonaws.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
124.160.83.138 | attackspambots | port |
2020-03-13 03:37:06 |
49.88.112.63 | attack | 2019-12-09T05:04:51.616Z CLOSE host=49.88.112.63 port=17433 fd=4 time=20.015 bytes=7 ... |
2020-03-13 03:20:31 |
49.151.24.132 | attackbots | 2019-10-31T11:58:54.404Z CLOSE host=49.151.24.132 port=53616 fd=4 time=20.011 bytes=23 ... |
2020-03-13 03:35:47 |
49.88.112.61 | attack | 2020-01-10T12:33:39.022Z CLOSE host=49.88.112.61 port=46091 fd=4 time=20.020 bytes=26 ... |
2020-03-13 03:21:28 |
201.149.20.162 | attack | Mar 12 09:46:02 Tower sshd[21790]: Connection from 201.149.20.162 port 62936 on 192.168.10.220 port 22 rdomain "" Mar 12 09:46:03 Tower sshd[21790]: Invalid user cpanellogin from 201.149.20.162 port 62936 Mar 12 09:46:03 Tower sshd[21790]: error: Could not get shadow information for NOUSER Mar 12 09:46:03 Tower sshd[21790]: Failed password for invalid user cpanellogin from 201.149.20.162 port 62936 ssh2 Mar 12 09:46:03 Tower sshd[21790]: Received disconnect from 201.149.20.162 port 62936:11: Bye Bye [preauth] Mar 12 09:46:03 Tower sshd[21790]: Disconnected from invalid user cpanellogin 201.149.20.162 port 62936 [preauth] |
2020-03-13 03:44:05 |
52.172.206.77 | attackbots | Invalid user files from 52.172.206.77 port 38532 |
2020-03-13 03:34:16 |
5.39.29.252 | attackspambots | Invalid user xulei from 5.39.29.252 port 42370 |
2020-03-13 03:42:01 |
50.116.123.127 | attack | 2020-02-20T15:19:54.459Z CLOSE host=50.116.123.127 port=50606 fd=5 time=20.004 bytes=31 ... |
2020-03-13 03:11:38 |
209.85.220.69 | attackspambots | Received: from mail-sor-f69.google.com (mail-sor-f69.google.com. [209.85.220.69]) by mx.google.com with SMTPS id q1sor5408914plr.16.2020.03.12.00.40.11 for |
2020-03-13 03:18:57 |
49.88.112.59 | attackspambots | 2019-12-09T04:24:37.173Z CLOSE host=49.88.112.59 port=54122 fd=4 time=20.005 bytes=24 ... |
2020-03-13 03:21:58 |
5.189.191.206 | attackspam | 2019-10-31T10:00:53.048Z CLOSE host=5.189.191.206 port=61933 fd=4 time=40.040 bytes=72 ... |
2020-03-13 03:16:24 |
47.93.36.223 | attack | 2020-02-17T14:42:34.684Z CLOSE host=47.93.36.223 port=7176 fd=4 time=20.005 bytes=15 ... |
2020-03-13 03:40:01 |
220.202.15.68 | attackspam | suspicious action Thu, 12 Mar 2020 09:28:43 -0300 |
2020-03-13 03:33:26 |
3.227.58.236 | attackspam | [portscan] Port scan |
2020-03-13 03:47:42 |
219.140.198.51 | attackbotsspam | Mar 12 16:22:58 localhost sshd\[14836\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.140.198.51 user=root Mar 12 16:22:59 localhost sshd\[14836\]: Failed password for root from 219.140.198.51 port 41924 ssh2 Mar 12 16:28:32 localhost sshd\[16796\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.140.198.51 user=root |
2020-03-13 03:23:39 |