City: Boardman
Region: Oregon
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.89.186.181
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54720
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;52.89.186.181.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022602 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 10:53:24 CST 2025
;; MSG SIZE  rcvd: 106
        181.186.89.52.in-addr.arpa domain name pointer ec2-52-89-186-181.us-west-2.compute.amazonaws.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
181.186.89.52.in-addr.arpa	name = ec2-52-89-186-181.us-west-2.compute.amazonaws.com.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 118.81.170.189 | attackspam | Telnet Server BruteForce Attack  | 
                    2019-07-16 23:36:24 | 
| 103.206.70.119 | attack | Jul 16 13:10:49 mail postfix/smtpd\[16285\]: NOQUEUE: reject: RCPT from enm.wekoyuk.com\[103.206.70.119\]: 554 5.7.1 Service unavailable\; Client host \[103.206.70.119\] blocked using zen.spamhaus.org\; https://www.spamhaus.org/sbl/query/SBL304334 / https://www.spamhaus.org/sbl/query/SBLCSS\; from=\  | 
                    2019-07-16 22:49:22 | 
| 95.188.70.4 | attackspam | Telnet Server BruteForce Attack  | 
                    2019-07-16 23:30:35 | 
| 162.243.136.230 | attack | Jul 16 14:33:02 XXX sshd[37137]: Invalid user shania from 162.243.136.230 port 48532  | 
                    2019-07-16 23:20:09 | 
| 111.200.217.90 | attackspambots | Jul 16 17:18:22 localhost sshd\[4340\]: Invalid user brenda from 111.200.217.90 port 55144 Jul 16 17:18:22 localhost sshd\[4340\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.200.217.90 Jul 16 17:18:23 localhost sshd\[4340\]: Failed password for invalid user brenda from 111.200.217.90 port 55144 ssh2  | 
                    2019-07-16 23:26:04 | 
| 46.101.163.220 | attackspam | Jul 16 17:26:08 server01 sshd\[26406\]: Invalid user zumbusch from 46.101.163.220 Jul 16 17:26:08 server01 sshd\[26406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.163.220 Jul 16 17:26:09 server01 sshd\[26406\]: Failed password for invalid user zumbusch from 46.101.163.220 port 46241 ssh2 ...  | 
                    2019-07-16 22:37:30 | 
| 61.147.61.218 | attack | abuse-sasl  | 
                    2019-07-16 22:35:30 | 
| 5.55.248.188 | attackspambots | Telnet Server BruteForce Attack  | 
                    2019-07-16 23:19:48 | 
| 82.64.139.161 | attackspam | detected by Fail2Ban  | 
                    2019-07-16 23:17:39 | 
| 77.247.110.219 | attackbotsspam | Automatic report - Banned IP Access  | 
                    2019-07-16 22:56:35 | 
| 112.85.42.189 | attack | Jul 16 16:27:26 core01 sshd\[16870\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.189 user=root Jul 16 16:27:28 core01 sshd\[16870\]: Failed password for root from 112.85.42.189 port 35602 ssh2 ...  | 
                    2019-07-16 22:30:10 | 
| 89.248.169.12 | attackspambots | Tue 16 08:20:35 8083/tcp  | 
                    2019-07-16 23:37:53 | 
| 61.143.39.175 | attackbots | abuse-sasl  | 
                    2019-07-16 23:31:10 | 
| 124.166.240.130 | attack | Port scan: Attack repeated for 24 hours  | 
                    2019-07-16 22:48:51 | 
| 61.147.61.228 | attack | abuse-sasl  | 
                    2019-07-16 22:32:07 |