City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.44.6.102
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22705
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;52.44.6.102. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 16:35:21 CST 2025
;; MSG SIZE rcvd: 104
102.6.44.52.in-addr.arpa domain name pointer ec2-52-44-6-102.compute-1.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
102.6.44.52.in-addr.arpa name = ec2-52-44-6-102.compute-1.amazonaws.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
118.70.190.105 | attack | Unauthorized connection attempt from IP address 118.70.190.105 on Port 445(SMB) |
2019-12-06 07:59:00 |
89.222.181.100 | attack | [portscan] Port scan |
2019-12-06 07:38:22 |
186.90.161.219 | attack | Unauthorized connection attempt from IP address 186.90.161.219 on Port 139(NETBIOS) |
2019-12-06 07:38:55 |
115.88.201.58 | attackspam | Brute-force attempt banned |
2019-12-06 08:18:36 |
113.125.60.208 | attackspambots | fail2ban |
2019-12-06 07:57:24 |
188.254.0.183 | attack | Dec 6 00:47:21 nextcloud sshd\[25935\]: Invalid user shamita from 188.254.0.183 Dec 6 00:47:21 nextcloud sshd\[25935\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.183 Dec 6 00:47:23 nextcloud sshd\[25935\]: Failed password for invalid user shamita from 188.254.0.183 port 59166 ssh2 ... |
2019-12-06 07:49:59 |
217.181.150.98 | attackbotsspam | Unauthorized connection attempt from IP address 217.181.150.98 on Port 445(SMB) |
2019-12-06 08:13:23 |
117.242.37.74 | attackspam | Unauthorized connection attempt from IP address 117.242.37.74 on Port 445(SMB) |
2019-12-06 07:47:40 |
14.155.220.235 | attack | Unauthorized connection attempt from IP address 14.155.220.235 on Port 445(SMB) |
2019-12-06 08:02:45 |
27.128.224.5 | attackbots | Dec 5 21:54:59 MK-Soft-VM7 sshd[27192]: Failed password for root from 27.128.224.5 port 47070 ssh2 Dec 5 22:01:41 MK-Soft-VM7 sshd[27256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.224.5 ... |
2019-12-06 07:51:06 |
219.159.192.169 | attack | 554/tcp [2019-12-05]1pkt |
2019-12-06 08:10:56 |
88.148.46.104 | attack | Automatic report - Port Scan Attack |
2019-12-06 08:13:55 |
103.113.105.11 | attackbots | Fail2Ban - SSH Bruteforce Attempt |
2019-12-06 07:57:40 |
188.131.179.87 | attack | SSH-BruteForce |
2019-12-06 07:53:13 |
137.74.167.250 | attackspambots | Dec 6 00:15:18 legacy sshd[8730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.167.250 Dec 6 00:15:20 legacy sshd[8730]: Failed password for invalid user roskelley from 137.74.167.250 port 51597 ssh2 Dec 6 00:20:37 legacy sshd[8920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.167.250 ... |
2019-12-06 07:53:38 |