City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.91.168.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34012
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;52.91.168.207. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 18:36:48 CST 2025
;; MSG SIZE rcvd: 106
207.168.91.52.in-addr.arpa domain name pointer ec2-52-91-168-207.compute-1.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
207.168.91.52.in-addr.arpa name = ec2-52-91-168-207.compute-1.amazonaws.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
109.229.139.22 | attackspam | 1589881555 - 05/19/2020 11:45:55 Host: 109.229.139.22/109.229.139.22 Port: 445 TCP Blocked |
2020-05-20 01:58:15 |
46.102.153.243 | attack | POP3 bruteforce |
2020-05-20 01:37:17 |
222.186.30.167 | attackspam | Unauthorized connection attempt detected from IP address 222.186.30.167 to port 22 [T] |
2020-05-20 01:38:00 |
122.114.30.17 | attack | Lines containing failures of 122.114.30.17 May 18 21:16:42 own sshd[20100]: Invalid user wjt from 122.114.30.17 port 35824 May 18 21:16:42 own sshd[20100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.30.17 May 18 21:16:43 own sshd[20100]: Failed password for invalid user wjt from 122.114.30.17 port 35824 ssh2 May 18 21:16:44 own sshd[20100]: Received disconnect from 122.114.30.17 port 35824:11: Bye Bye [preauth] May 18 21:16:44 own sshd[20100]: Disconnected from invalid user wjt 122.114.30.17 port 35824 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=122.114.30.17 |
2020-05-20 02:08:08 |
83.24.157.188 | attackspam | May 18 12:03:06 master sshd[14801]: Failed password for invalid user zzu from 83.24.157.188 port 33180 ssh2 May 18 12:14:28 master sshd[14941]: Failed password for invalid user uik from 83.24.157.188 port 45298 ssh2 May 18 12:21:56 master sshd[14961]: Failed password for invalid user yle from 83.24.157.188 port 53270 ssh2 May 18 12:28:57 master sshd[14966]: Failed password for invalid user vwe from 83.24.157.188 port 33032 ssh2 May 18 12:36:04 master sshd[14985]: Failed password for invalid user ydu from 83.24.157.188 port 41014 ssh2 May 18 12:43:11 master sshd[14988]: Failed password for invalid user ibn from 83.24.157.188 port 49008 ssh2 May 18 12:49:59 master sshd[15009]: Failed password for invalid user fbp from 83.24.157.188 port 56984 ssh2 |
2020-05-20 01:56:20 |
222.41.193.211 | attack | no |
2020-05-20 01:47:05 |
42.114.121.128 | attackbotsspam | 1589881561 - 05/19/2020 11:46:01 Host: 42.114.121.128/42.114.121.128 Port: 445 TCP Blocked |
2020-05-20 01:56:34 |
171.244.184.106 | attackspam | 1589881536 - 05/19/2020 11:45:36 Host: 171.244.184.106/171.244.184.106 Port: 445 TCP Blocked |
2020-05-20 01:59:48 |
129.211.45.88 | attackspambots | SSH Brute-Force attacks |
2020-05-20 01:45:38 |
103.243.252.244 | attack | May 19 07:25:11 auw2 sshd\[28766\]: Invalid user zxr from 103.243.252.244 May 19 07:25:11 auw2 sshd\[28766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.243.252.244 May 19 07:25:13 auw2 sshd\[28766\]: Failed password for invalid user zxr from 103.243.252.244 port 59310 ssh2 May 19 07:29:34 auw2 sshd\[29071\]: Invalid user pnt from 103.243.252.244 May 19 07:29:34 auw2 sshd\[29071\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.243.252.244 |
2020-05-20 02:04:06 |
185.153.196.230 | attackbots | May 19 19:38:55 ift sshd\[54418\]: Invalid user 0 from 185.153.196.230May 19 19:38:58 ift sshd\[54418\]: Failed password for invalid user 0 from 185.153.196.230 port 16113 ssh2May 19 19:39:02 ift sshd\[54467\]: Invalid user 22 from 185.153.196.230May 19 19:39:04 ift sshd\[54467\]: Failed password for invalid user 22 from 185.153.196.230 port 11290 ssh2May 19 19:39:08 ift sshd\[54467\]: Failed password for invalid user 22 from 185.153.196.230 port 11290 ssh2 ... |
2020-05-20 01:41:41 |
111.229.242.156 | attackbots | 2020-05-19T16:00:18.717123server.espacesoutien.com sshd[23804]: Invalid user eya from 111.229.242.156 port 43688 2020-05-19T16:00:18.734060server.espacesoutien.com sshd[23804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.242.156 2020-05-19T16:00:18.717123server.espacesoutien.com sshd[23804]: Invalid user eya from 111.229.242.156 port 43688 2020-05-19T16:00:20.237187server.espacesoutien.com sshd[23804]: Failed password for invalid user eya from 111.229.242.156 port 43688 ssh2 ... |
2020-05-20 01:45:56 |
14.18.109.9 | attackbotsspam | no |
2020-05-20 01:35:43 |
167.114.3.105 | attackbotsspam | May 19 11:44:13 piServer sshd[9588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.3.105 May 19 11:44:14 piServer sshd[9588]: Failed password for invalid user qvb from 167.114.3.105 port 44594 ssh2 May 19 11:46:45 piServer sshd[9792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.3.105 ... |
2020-05-20 01:46:28 |
50.234.173.102 | attackspambots | $f2bV_matches |
2020-05-20 02:06:03 |