City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.5.91.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29460
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;52.5.91.55. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 00:14:06 CST 2025
;; MSG SIZE rcvd: 103
55.91.5.52.in-addr.arpa domain name pointer ec2-52-5-91-55.compute-1.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
55.91.5.52.in-addr.arpa name = ec2-52-5-91-55.compute-1.amazonaws.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 198.167.138.124 | attackspam | Jan 26 19:48:37 MK-Soft-Root2 sshd[28463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.167.138.124 Jan 26 19:48:39 MK-Soft-Root2 sshd[28463]: Failed password for invalid user xxx from 198.167.138.124 port 57955 ssh2 ... |
2020-01-27 02:58:19 |
| 124.205.224.179 | attackspambots | Jan 26 21:06:30 server sshd\[11557\]: Invalid user hydra from 124.205.224.179 Jan 26 21:06:30 server sshd\[11557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.205.224.179 Jan 26 21:06:32 server sshd\[11557\]: Failed password for invalid user hydra from 124.205.224.179 port 51414 ssh2 Jan 26 21:24:50 server sshd\[15962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.205.224.179 user=root Jan 26 21:24:51 server sshd\[15962\]: Failed password for root from 124.205.224.179 port 33716 ssh2 ... |
2020-01-27 02:54:46 |
| 52.71.95.144 | attackbotsspam | "GET / HTTP/1.1" 301 178 "-" "Cloud mapping experiment. Contact research@pdrlabs.net" |
2020-01-27 02:53:16 |
| 103.78.254.9 | attackspam | TCP Port: 25 invalid blocked abuseat-org also spamcop and zen-spamhaus (527) |
2020-01-27 03:26:36 |
| 73.6.13.91 | attackbotsspam | Jan 27 02:02:07 webhost01 sshd[6310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.6.13.91 Jan 27 02:02:09 webhost01 sshd[6310]: Failed password for invalid user postgres from 73.6.13.91 port 48783 ssh2 ... |
2020-01-27 03:03:24 |
| 139.59.14.210 | attackbotsspam | Jan 26 19:30:51 lnxweb61 sshd[8142]: Failed password for root from 139.59.14.210 port 37550 ssh2 Jan 26 19:32:47 lnxweb61 sshd[9563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.14.210 Jan 26 19:32:48 lnxweb61 sshd[9563]: Failed password for invalid user user from 139.59.14.210 port 47548 ssh2 |
2020-01-27 03:08:25 |
| 83.97.20.33 | attackbotsspam | Unauthorized connection attempt detected from IP address 83.97.20.33 to port 8089 [J] |
2020-01-27 02:51:12 |
| 125.124.87.82 | attack | Unauthorized connection attempt detected from IP address 125.124.87.82 to port 8545 [T] |
2020-01-27 03:19:04 |
| 78.141.198.196 | attackspambots | Jan 25 10:24:01 kmh-wsh-001-nbg03 sshd[7689]: Invalid user ftpuser1 from 78.141.198.196 port 34806 Jan 25 10:24:01 kmh-wsh-001-nbg03 sshd[7689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.141.198.196 Jan 25 10:24:03 kmh-wsh-001-nbg03 sshd[7689]: Failed password for invalid user ftpuser1 from 78.141.198.196 port 34806 ssh2 Jan 25 10:24:03 kmh-wsh-001-nbg03 sshd[7689]: Received disconnect from 78.141.198.196 port 34806:11: Bye Bye [preauth] Jan 25 10:24:03 kmh-wsh-001-nbg03 sshd[7689]: Disconnected from 78.141.198.196 port 34806 [preauth] Jan 25 10:45:40 kmh-wsh-001-nbg03 sshd[10050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.141.198.196 user=r.r Jan 25 10:45:42 kmh-wsh-001-nbg03 sshd[10050]: Failed password for r.r from 78.141.198.196 port 43404 ssh2 Jan 25 10:45:42 kmh-wsh-001-nbg03 sshd[10050]: Received disconnect from 78.141.198.196 port 43404:11: Bye Bye [preauth] Jan 25........ ------------------------------- |
2020-01-27 02:50:20 |
| 114.237.49.137 | attack | Unauthorized connection attempt detected from IP address 114.237.49.137 to port 6656 [T] |
2020-01-27 03:23:58 |
| 49.232.15.79 | attack | 49.232.15.79 - - [26/Jan/2020:21:13:52 +0300] "GET /TP/public/index.php HTTP/1.1" 404 476 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.0;en-US; rv:1.9.2) Gecko/20100115 Firefox/3.6)" 49.232.15.79 - - [26/Jan/2020:21:13:53 +0300] "GET /TP/index.php HTTP/1.1" 404 469 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.0;en-US; rv:1.9.2) Gecko/20100115 Firefox/3.6)" 49.232.15.79 - - [26/Jan/2020:21:13:53 +0300] "GET /thinkphp/html/public/index.php HTTP/1.1" 404 487 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.0;en-US; rv:1.9.2) Gecko/20100115 Firefox/3.6)" 49.232.15.79 - - [26/Jan/2020:21:13:54 +0300] "GET /html/public/index.php HTTP/1.1" 404 478 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.0;en-US; rv:1.9.2) Gecko/20100115 Firefox/3.6)" 49.232.15.79 - - [26/Jan/2020:21:13:56 +0300] "GET /public/index.php HTTP/1.1" 404 473 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.0;en-US; rv:1.9.2) Gecko/20100115 Firefox/3.6)" 49.232.15.79 - - [26/Jan/2020:21:13:56 +0300] "GET /TP/html/public/index.php HTTP/1.1" 404 481 "-" "Mozilla |
2020-01-27 02:56:33 |
| 111.122.181.250 | attackspam | Unauthorized connection attempt detected from IP address 111.122.181.250 to port 22 [T] |
2020-01-27 03:26:16 |
| 195.154.57.1 | attackbotsspam | 195.154.57.1 was recorded 5 times by 5 hosts attempting to connect to the following ports: 5060. Incident counter (4h, 24h, all-time): 5, 9, 33 |
2020-01-27 02:50:53 |
| 113.120.37.248 | attackspambots | Unauthorized connection attempt detected from IP address 113.120.37.248 to port 6656 [T] |
2020-01-27 03:25:08 |
| 167.172.118.117 | attackspambots | Unauthorized connection attempt detected from IP address 167.172.118.117 to port 2220 [J] |
2020-01-27 02:53:40 |