City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.42.197.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62799
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;52.42.197.168. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400
;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 13:41:52 CST 2025
;; MSG SIZE rcvd: 106
168.197.42.52.in-addr.arpa domain name pointer ec2-52-42-197-168.us-west-2.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
168.197.42.52.in-addr.arpa name = ec2-52-42-197-168.us-west-2.compute.amazonaws.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
36.80.57.19 | attackbotsspam | 445/tcp [2019-07-02]1pkt |
2019-07-02 19:42:32 |
178.212.129.158 | attack | 23/tcp [2019-07-02]1pkt |
2019-07-02 19:34:58 |
191.242.76.169 | attack | Jul 2 03:41:55 web1 postfix/smtpd[16581]: warning: unknown[191.242.76.169]: SASL PLAIN authentication failed: authentication failure ... |
2019-07-02 20:02:11 |
191.53.223.23 | attack | failed_logins |
2019-07-02 19:25:20 |
85.246.171.235 | attackbotsspam | 445/tcp [2019-07-02]1pkt |
2019-07-02 19:51:00 |
164.132.197.108 | attack | Jan 3 08:31:44 motanud sshd\[18638\]: Invalid user user from 164.132.197.108 port 33744 Jan 3 08:31:44 motanud sshd\[18638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.197.108 Jan 3 08:31:46 motanud sshd\[18638\]: Failed password for invalid user user from 164.132.197.108 port 33744 ssh2 |
2019-07-02 20:09:22 |
175.203.95.49 | attackbotsspam | Jul 2 12:28:30 MK-Soft-Root1 sshd\[16361\]: Invalid user rk from 175.203.95.49 port 46390 Jul 2 12:28:30 MK-Soft-Root1 sshd\[16361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.203.95.49 Jul 2 12:28:33 MK-Soft-Root1 sshd\[16361\]: Failed password for invalid user rk from 175.203.95.49 port 46390 ssh2 ... |
2019-07-02 19:30:45 |
123.188.210.13 | attackbotsspam | [portscan] tcp/23 [TELNET] *(RWIN=33706)(07021037) |
2019-07-02 19:59:59 |
34.77.171.195 | attack | 22/tcp [2019-07-02]1pkt |
2019-07-02 19:24:47 |
125.166.127.153 | attackspambots | Unauthorised access (Jul 2) SRC=125.166.127.153 LEN=48 TTL=248 ID=21449 DF TCP DPT=445 WINDOW=8192 SYN |
2019-07-02 19:56:44 |
159.65.144.233 | attackbotsspam | IP attempted unauthorised action |
2019-07-02 19:27:31 |
14.188.179.211 | attackspam | Trying to deliver email spam, but blocked by RBL |
2019-07-02 19:39:48 |
120.4.4.233 | attack | 2323/tcp [2019-07-02]1pkt |
2019-07-02 20:03:47 |
2.32.107.178 | attack | SSH Bruteforce |
2019-07-02 19:37:49 |
96.114.71.146 | attackbotsspam | SSH Bruteforce |
2019-07-02 19:37:00 |