City: Ashburn
Region: Virginia
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.90.93.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35712
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;52.90.93.136. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025090201 1800 900 604800 86400
;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 03 04:01:25 CST 2025
;; MSG SIZE rcvd: 105
136.93.90.52.in-addr.arpa domain name pointer ec2-52-90-93-136.compute-1.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
136.93.90.52.in-addr.arpa name = ec2-52-90-93-136.compute-1.amazonaws.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 5.42.226.10 | attackspam | 2019-07-23T05:56:25.288967abusebot-6.cloudsearch.cf sshd\[876\]: Invalid user ze from 5.42.226.10 port 52470 |
2019-07-23 14:17:13 |
| 182.93.48.21 | attackspambots | Invalid user admin from 182.93.48.21 port 52372 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.93.48.21 Failed password for invalid user admin from 182.93.48.21 port 52372 ssh2 Invalid user guest from 182.93.48.21 port 47122 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.93.48.21 |
2019-07-23 14:13:43 |
| 51.254.141.18 | attackbots | Jul 23 01:16:23 plusreed sshd[7781]: Invalid user rf from 51.254.141.18 ... |
2019-07-23 13:26:55 |
| 51.38.33.178 | attackbotsspam | Jan 19 01:43:38 vtv3 sshd\[566\]: Invalid user finance from 51.38.33.178 port 55064 Jan 19 01:43:38 vtv3 sshd\[566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.33.178 Jan 19 01:43:40 vtv3 sshd\[566\]: Failed password for invalid user finance from 51.38.33.178 port 55064 ssh2 Jan 19 01:47:13 vtv3 sshd\[2184\]: Invalid user user from 51.38.33.178 port 40780 Jan 19 01:47:13 vtv3 sshd\[2184\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.33.178 Feb 12 08:24:49 vtv3 sshd\[24472\]: Invalid user sal from 51.38.33.178 port 39641 Feb 12 08:24:49 vtv3 sshd\[24472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.33.178 Feb 12 08:24:51 vtv3 sshd\[24472\]: Failed password for invalid user sal from 51.38.33.178 port 39641 ssh2 Feb 12 08:29:36 vtv3 sshd\[25831\]: Invalid user openvpn from 51.38.33.178 port 34638 Feb 12 08:29:36 vtv3 sshd\[25831\]: pam_unix\(sshd:auth\) |
2019-07-23 13:40:51 |
| 45.55.206.241 | attackbots | Jul 23 08:29:08 server sshd\[9761\]: Invalid user dao from 45.55.206.241 port 60210 Jul 23 08:29:08 server sshd\[9761\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.206.241 Jul 23 08:29:10 server sshd\[9761\]: Failed password for invalid user dao from 45.55.206.241 port 60210 ssh2 Jul 23 08:33:38 server sshd\[24917\]: Invalid user minecraft from 45.55.206.241 port 58991 Jul 23 08:33:38 server sshd\[24917\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.206.241 |
2019-07-23 13:43:02 |
| 95.24.21.26 | attackspambots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-20 19:18:16,206 INFO [shellcode_manager] (95.24.21.26) no match, writing hexdump (f0a589487e9fbb946bc3289f5913aa46 :2395525) - MS17010 (EternalBlue) |
2019-07-23 14:24:14 |
| 83.110.245.93 | attack | Telnet Server BruteForce Attack |
2019-07-23 14:10:29 |
| 203.121.116.11 | attackspambots | Jul 23 08:06:38 OPSO sshd\[549\]: Invalid user sbin from 203.121.116.11 port 59416 Jul 23 08:06:38 OPSO sshd\[549\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.121.116.11 Jul 23 08:06:40 OPSO sshd\[549\]: Failed password for invalid user sbin from 203.121.116.11 port 59416 ssh2 Jul 23 08:12:23 OPSO sshd\[1132\]: Invalid user info3 from 203.121.116.11 port 57468 Jul 23 08:12:23 OPSO sshd\[1132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.121.116.11 |
2019-07-23 14:25:46 |
| 207.46.13.86 | attackspam | Automatic report - Banned IP Access |
2019-07-23 14:11:01 |
| 188.84.189.235 | attackspambots | Jul 23 05:15:12 ip-172-31-62-245 sshd\[22029\]: Invalid user apitest from 188.84.189.235\ Jul 23 05:15:13 ip-172-31-62-245 sshd\[22029\]: Failed password for invalid user apitest from 188.84.189.235 port 57258 ssh2\ Jul 23 05:19:42 ip-172-31-62-245 sshd\[22075\]: Invalid user hadoop from 188.84.189.235\ Jul 23 05:19:44 ip-172-31-62-245 sshd\[22075\]: Failed password for invalid user hadoop from 188.84.189.235 port 51772 ssh2\ Jul 23 05:24:18 ip-172-31-62-245 sshd\[22127\]: Invalid user elsearch from 188.84.189.235\ |
2019-07-23 14:24:46 |
| 86.98.26.60 | attackbotsspam | Multiple SSH auth failures recorded by fail2ban |
2019-07-23 14:12:06 |
| 191.53.196.244 | attackspam | failed_logins |
2019-07-23 14:03:53 |
| 45.55.46.23 | attackspambots | Caught in portsentry honeypot |
2019-07-23 14:02:54 |
| 134.73.161.4 | attackbotsspam | Jul 23 01:24:57 ms-srv sshd[22892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.73.161.4 user=nobody Jul 23 01:24:59 ms-srv sshd[22892]: Failed password for invalid user nobody from 134.73.161.4 port 37566 ssh2 |
2019-07-23 13:44:09 |
| 144.202.86.203 | attackspambots | Scanning and Vuln Attempts |
2019-07-23 13:53:18 |