City: Boardman
Region: Oregon
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.43.196.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4686
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;52.43.196.80. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025062800 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 15:12:17 CST 2025
;; MSG SIZE rcvd: 105
80.196.43.52.in-addr.arpa domain name pointer ec2-52-43-196-80.us-west-2.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
80.196.43.52.in-addr.arpa name = ec2-52-43-196-80.us-west-2.compute.amazonaws.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 140.143.122.13 | attackspam | 2020-06-11T04:45:22.696854shield sshd\[1943\]: Invalid user user from 140.143.122.13 port 54436 2020-06-11T04:45:22.700357shield sshd\[1943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.122.13 2020-06-11T04:45:24.757511shield sshd\[1943\]: Failed password for invalid user user from 140.143.122.13 port 54436 ssh2 2020-06-11T04:49:09.514172shield sshd\[3391\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.122.13 user=root 2020-06-11T04:49:11.064809shield sshd\[3391\]: Failed password for root from 140.143.122.13 port 42156 ssh2 |
2020-06-11 14:27:33 |
| 121.66.252.158 | attackspambots | DATE:2020-06-11 07:06:42, IP:121.66.252.158, PORT:ssh SSH brute force auth (docker-dc) |
2020-06-11 13:55:58 |
| 222.186.30.218 | attackspambots | Jun 11 06:50:53 rocket sshd[7300]: Failed password for root from 222.186.30.218 port 10749 ssh2 Jun 11 06:51:04 rocket sshd[7302]: Failed password for root from 222.186.30.218 port 41328 ssh2 ... |
2020-06-11 13:52:04 |
| 113.183.65.183 | attack | 20/6/10@23:56:27: FAIL: Alarm-Network address from=113.183.65.183 20/6/10@23:56:27: FAIL: Alarm-Network address from=113.183.65.183 ... |
2020-06-11 14:19:29 |
| 46.38.145.6 | attack | Jun 11 07:50:42 ncomp postfix/smtpd[8276]: warning: unknown[46.38.145.6]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 11 07:52:14 ncomp postfix/smtpd[8276]: warning: unknown[46.38.145.6]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 11 07:53:48 ncomp postfix/smtpd[8276]: warning: unknown[46.38.145.6]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2020-06-11 13:54:25 |
| 106.52.234.25 | attackbotsspam | Jun 11 11:22:12 dhoomketu sshd[650445]: Failed password for invalid user scamper from 106.52.234.25 port 43668 ssh2 Jun 11 11:23:35 dhoomketu sshd[650494]: Invalid user Administrator from 106.52.234.25 port 59132 Jun 11 11:23:35 dhoomketu sshd[650494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.234.25 Jun 11 11:23:35 dhoomketu sshd[650494]: Invalid user Administrator from 106.52.234.25 port 59132 Jun 11 11:23:37 dhoomketu sshd[650494]: Failed password for invalid user Administrator from 106.52.234.25 port 59132 ssh2 ... |
2020-06-11 14:00:07 |
| 188.68.47.63 | attackbotsspam | php vulnerability probing |
2020-06-11 14:14:32 |
| 92.255.110.146 | attackbotsspam | 2020-06-11T04:25:38.449483abusebot-6.cloudsearch.cf sshd[26361]: Invalid user oracle from 92.255.110.146 port 42470 2020-06-11T04:25:38.456009abusebot-6.cloudsearch.cf sshd[26361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=usr-92-255-110-146.clgp.ru 2020-06-11T04:25:38.449483abusebot-6.cloudsearch.cf sshd[26361]: Invalid user oracle from 92.255.110.146 port 42470 2020-06-11T04:25:40.305060abusebot-6.cloudsearch.cf sshd[26361]: Failed password for invalid user oracle from 92.255.110.146 port 42470 ssh2 2020-06-11T04:27:43.351194abusebot-6.cloudsearch.cf sshd[26571]: Invalid user xbyang from 92.255.110.146 port 51340 2020-06-11T04:27:43.365058abusebot-6.cloudsearch.cf sshd[26571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=usr-92-255-110-146.clgp.ru 2020-06-11T04:27:43.351194abusebot-6.cloudsearch.cf sshd[26571]: Invalid user xbyang from 92.255.110.146 port 51340 2020-06-11T04:27:45.041496abusebot- ... |
2020-06-11 14:18:00 |
| 46.38.145.249 | attackspambots | Jun 11 06:05:15 mail postfix/smtpd[70032]: warning: unknown[46.38.145.249]: SASL LOGIN authentication failed: generic failure Jun 11 06:05:35 mail postfix/smtpd[70032]: warning: unknown[46.38.145.249]: SASL LOGIN authentication failed: generic failure Jun 11 06:06:49 mail postfix/smtpd[70946]: warning: unknown[46.38.145.249]: SASL LOGIN authentication failed: generic failure ... |
2020-06-11 14:08:23 |
| 27.150.22.44 | attackspambots | 2020-06-11 03:34:06,569 fail2ban.actions [937]: NOTICE [sshd] Ban 27.150.22.44 2020-06-11 04:08:47,899 fail2ban.actions [937]: NOTICE [sshd] Ban 27.150.22.44 2020-06-11 04:45:09,209 fail2ban.actions [937]: NOTICE [sshd] Ban 27.150.22.44 2020-06-11 05:20:45,341 fail2ban.actions [937]: NOTICE [sshd] Ban 27.150.22.44 2020-06-11 05:56:31,225 fail2ban.actions [937]: NOTICE [sshd] Ban 27.150.22.44 ... |
2020-06-11 14:15:51 |
| 177.125.164.225 | attackspam | Jun 11 01:10:43 ny01 sshd[20161]: Failed password for root from 177.125.164.225 port 52836 ssh2 Jun 11 01:14:50 ny01 sshd[20696]: Failed password for root from 177.125.164.225 port 53312 ssh2 |
2020-06-11 14:26:10 |
| 116.196.94.211 | attackbots | k+ssh-bruteforce |
2020-06-11 14:29:40 |
| 1.192.94.61 | attackbots | Jun 11 07:49:11 eventyay sshd[2756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.192.94.61 Jun 11 07:49:13 eventyay sshd[2756]: Failed password for invalid user admin from 1.192.94.61 port 60596 ssh2 Jun 11 07:53:35 eventyay sshd[2800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.192.94.61 ... |
2020-06-11 13:56:56 |
| 178.128.15.57 | attackspam | Jun 11 08:17:55 hosting sshd[6136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.15.57 user=root Jun 11 08:17:57 hosting sshd[6136]: Failed password for root from 178.128.15.57 port 45956 ssh2 ... |
2020-06-11 14:09:56 |
| 157.230.45.31 | attackbots | 2020-06-11T05:01:25.144283abusebot-2.cloudsearch.cf sshd[29437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.45.31 user=root 2020-06-11T05:01:27.070855abusebot-2.cloudsearch.cf sshd[29437]: Failed password for root from 157.230.45.31 port 46110 ssh2 2020-06-11T05:05:00.674400abusebot-2.cloudsearch.cf sshd[29541]: Invalid user ruth from 157.230.45.31 port 47720 2020-06-11T05:05:00.682824abusebot-2.cloudsearch.cf sshd[29541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.45.31 2020-06-11T05:05:00.674400abusebot-2.cloudsearch.cf sshd[29541]: Invalid user ruth from 157.230.45.31 port 47720 2020-06-11T05:05:02.794609abusebot-2.cloudsearch.cf sshd[29541]: Failed password for invalid user ruth from 157.230.45.31 port 47720 ssh2 2020-06-11T05:08:31.784418abusebot-2.cloudsearch.cf sshd[29548]: Invalid user admin from 157.230.45.31 port 49332 ... |
2020-06-11 14:23:13 |