City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.86.34.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52820
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;52.86.34.29. IN A
;; AUTHORITY SECTION:
. 523 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022011001 1800 900 604800 86400
;; Query time: 135 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 01:33:19 CST 2022
;; MSG SIZE rcvd: 104
29.34.86.52.in-addr.arpa domain name pointer ec2-52-86-34-29.compute-1.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
29.34.86.52.in-addr.arpa name = ec2-52-86-34-29.compute-1.amazonaws.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 113.242.230.37 | attack | 5353/udp [2020-03-31]1pkt |
2020-03-31 21:47:36 |
| 140.143.250.121 | attackbots | Mar 31 17:30:16 gw1 sshd[25080]: Failed password for root from 140.143.250.121 port 51944 ssh2 ... |
2020-03-31 21:36:15 |
| 197.47.29.190 | attack | 23/tcp [2020-03-31]1pkt |
2020-03-31 21:57:13 |
| 187.202.128.110 | attackspambots | Honeypot attack, port: 445, PTR: dsl-187-202-128-110-dyn.prod-infinitum.com.mx. |
2020-03-31 21:55:44 |
| 190.72.20.173 | attack | Honeypot attack, port: 445, PTR: 190-72-20-173.dyn.dsl.cantv.net. |
2020-03-31 21:35:44 |
| 178.62.33.138 | attack | Mar 31 03:02:52 web1 sshd\[13720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.33.138 user=root Mar 31 03:02:53 web1 sshd\[13720\]: Failed password for root from 178.62.33.138 port 37512 ssh2 Mar 31 03:06:16 web1 sshd\[14087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.33.138 user=root Mar 31 03:06:18 web1 sshd\[14087\]: Failed password for root from 178.62.33.138 port 39474 ssh2 Mar 31 03:09:53 web1 sshd\[14552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.33.138 user=root |
2020-03-31 21:39:33 |
| 176.53.12.3 | attack | 445/tcp [2020-03-31]1pkt |
2020-03-31 21:50:06 |
| 190.104.39.51 | attackbots | Automatic report - Port Scan Attack |
2020-03-31 21:44:59 |
| 178.176.167.169 | attackspam | 445/tcp [2020-03-31]1pkt |
2020-03-31 21:39:03 |
| 185.220.100.244 | attackbotsspam | Mar 31 14:34:07 srv-ubuntu-dev3 sshd[57208]: Invalid user guest from 185.220.100.244 Mar 31 14:34:07 srv-ubuntu-dev3 sshd[57208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.100.244 Mar 31 14:34:07 srv-ubuntu-dev3 sshd[57208]: Invalid user guest from 185.220.100.244 Mar 31 14:34:10 srv-ubuntu-dev3 sshd[57208]: Failed password for invalid user guest from 185.220.100.244 port 21248 ssh2 Mar 31 14:34:07 srv-ubuntu-dev3 sshd[57208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.100.244 Mar 31 14:34:07 srv-ubuntu-dev3 sshd[57208]: Invalid user guest from 185.220.100.244 Mar 31 14:34:10 srv-ubuntu-dev3 sshd[57208]: Failed password for invalid user guest from 185.220.100.244 port 21248 ssh2 Mar 31 14:34:13 srv-ubuntu-dev3 sshd[57208]: Failed password for invalid user guest from 185.220.100.244 port 21248 ssh2 Mar 31 14:34:07 srv-ubuntu-dev3 sshd[57208]: pam_unix(sshd:auth): authentication fai ... |
2020-03-31 21:48:24 |
| 81.182.244.112 | attackspam | 4567/tcp [2020-03-31]1pkt |
2020-03-31 21:24:10 |
| 139.59.254.93 | attackbotsspam | Mar 31 15:00:34 ewelt sshd[5861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.254.93 user=root Mar 31 15:00:36 ewelt sshd[5861]: Failed password for root from 139.59.254.93 port 44839 ssh2 Mar 31 15:05:04 ewelt sshd[6158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.254.93 user=root Mar 31 15:05:06 ewelt sshd[6158]: Failed password for root from 139.59.254.93 port 55261 ssh2 ... |
2020-03-31 21:19:26 |
| 42.51.223.71 | attackspam | 3306/tcp [2020-03-31]1pkt |
2020-03-31 21:49:08 |
| 139.228.17.224 | attackspam | 139/tcp [2020-03-31]1pkt |
2020-03-31 21:18:58 |
| 194.135.122.82 | attack | 445/tcp [2020-03-31]1pkt |
2020-03-31 21:35:20 |