City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.164.11.243
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26139
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;54.164.11.243. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 16:29:01 CST 2025
;; MSG SIZE rcvd: 106
243.11.164.54.in-addr.arpa domain name pointer ec2-54-164-11-243.compute-1.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
243.11.164.54.in-addr.arpa name = ec2-54-164-11-243.compute-1.amazonaws.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
192.241.249.53 | attackspam | $f2bV_matches |
2020-05-10 23:14:40 |
195.54.166.26 | attackspam | May 10 16:45:51 debian-2gb-nbg1-2 kernel: \[11380822.433461\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=195.54.166.26 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=32485 PROTO=TCP SPT=49133 DPT=2830 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-05-10 23:22:11 |
121.46.244.194 | attackspam | May 10 14:25:39 legacy sshd[23163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.46.244.194 May 10 14:25:41 legacy sshd[23163]: Failed password for invalid user cam from 121.46.244.194 port 30634 ssh2 May 10 14:29:46 legacy sshd[23377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.46.244.194 ... |
2020-05-10 22:51:48 |
104.248.126.170 | attackbotsspam | May 10 15:06:51 legacy sshd[25039]: Failed password for root from 104.248.126.170 port 40790 ssh2 May 10 15:10:37 legacy sshd[25192]: Failed password for root from 104.248.126.170 port 48874 ssh2 May 10 15:14:11 legacy sshd[25322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.126.170 ... |
2020-05-10 23:03:33 |
51.75.31.33 | attackbots | srv02 SSH BruteForce Attacks 22 .. |
2020-05-10 23:28:00 |
82.177.122.105 | attack | (smtpauth) Failed SMTP AUTH login from 82.177.122.105 (PL/Poland/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-05-10 16:42:50 plain authenticator failed for ([82.177.122.105]) [82.177.122.105]: 535 Incorrect authentication data (set_id=m.kamran) |
2020-05-10 23:18:21 |
118.70.216.153 | attack | Unauthorized connection attempt detected from IP address 118.70.216.153 to port 22 [T] |
2020-05-10 22:58:45 |
84.51.110.100 | attackbotsspam | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-05-10 23:05:02 |
141.98.9.160 | attackbots | SSH Brute-Force attacks |
2020-05-10 22:51:22 |
222.186.169.194 | attackspambots | May 10 10:54:45 NPSTNNYC01T sshd[17307]: Failed password for root from 222.186.169.194 port 51496 ssh2 May 10 10:55:00 NPSTNNYC01T sshd[17307]: error: maximum authentication attempts exceeded for root from 222.186.169.194 port 51496 ssh2 [preauth] May 10 10:55:06 NPSTNNYC01T sshd[17331]: Failed password for root from 222.186.169.194 port 4644 ssh2 ... |
2020-05-10 23:02:40 |
223.247.219.165 | attack | May 10 12:09:22 124388 sshd[20236]: Failed password for root from 223.247.219.165 port 44109 ssh2 May 10 12:13:12 124388 sshd[20248]: Invalid user testuser from 223.247.219.165 port 41398 May 10 12:13:12 124388 sshd[20248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.219.165 May 10 12:13:12 124388 sshd[20248]: Invalid user testuser from 223.247.219.165 port 41398 May 10 12:13:14 124388 sshd[20248]: Failed password for invalid user testuser from 223.247.219.165 port 41398 ssh2 |
2020-05-10 23:09:51 |
152.136.39.46 | attackspambots | May 10 15:00:54 vpn01 sshd[7873]: Failed password for root from 152.136.39.46 port 60802 ssh2 ... |
2020-05-10 22:52:34 |
185.176.27.14 | attack | May 10 17:03:57 debian-2gb-nbg1-2 kernel: \[11381908.670395\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.14 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=57678 PROTO=TCP SPT=56023 DPT=22224 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-05-10 23:07:04 |
192.241.213.147 | attackbotsspam | 192.241.213.147 - - \[10/May/2020:14:12:59 +0200\] "POST /wp-login.php HTTP/1.1" 200 9952 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 192.241.213.147 - - \[10/May/2020:14:13:15 +0200\] "POST /wp-login.php HTTP/1.1" 200 9787 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" ... |
2020-05-10 23:08:27 |
114.33.90.5 | attackbotsspam | Port probing on unauthorized port 85 |
2020-05-10 22:48:38 |