City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.242.138.162
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6443
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;54.242.138.162. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 11:38:45 CST 2025
;; MSG SIZE rcvd: 107
162.138.242.54.in-addr.arpa domain name pointer ec2-54-242-138-162.compute-1.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
162.138.242.54.in-addr.arpa name = ec2-54-242-138-162.compute-1.amazonaws.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 177.21.133.81 | attackspam | Automatic report - Port Scan Attack |
2019-11-25 05:53:13 |
| 79.26.190.126 | attackspam | Nov 24 15:37:30 mxgate1 postfix/postscreen[32548]: CONNECT from [79.26.190.126]:64385 to [176.31.12.44]:25 Nov 24 15:37:30 mxgate1 postfix/dnsblog[32552]: addr 79.26.190.126 listed by domain cbl.abuseat.org as 127.0.0.2 Nov 24 15:37:30 mxgate1 postfix/dnsblog[32549]: addr 79.26.190.126 listed by domain zen.spamhaus.org as 127.0.0.4 Nov 24 15:37:30 mxgate1 postfix/dnsblog[32549]: addr 79.26.190.126 listed by domain zen.spamhaus.org as 127.0.0.10 Nov 24 15:37:30 mxgate1 postfix/dnsblog[32551]: addr 79.26.190.126 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2 Nov 24 15:37:30 mxgate1 postfix/dnsblog[32573]: addr 79.26.190.126 listed by domain b.barracudacentral.org as 127.0.0.2 Nov 24 15:37:36 mxgate1 postfix/postscreen[32548]: DNSBL rank 5 for [79.26.190.126]:64385 Nov x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=79.26.190.126 |
2019-11-25 06:06:11 |
| 222.186.175.155 | attack | 2019-11-22 07:17:58 -> 2019-11-24 10:14:12 : 88 login attempts (222.186.175.155) |
2019-11-25 06:09:38 |
| 104.248.163.158 | attackspambots | Masscan |
2019-11-25 05:52:05 |
| 185.181.8.244 | attack | Unauthorized SSH login attempts |
2019-11-25 06:03:10 |
| 40.73.65.160 | attack | Nov 24 09:44:51 plusreed sshd[4249]: Invalid user webmaster from 40.73.65.160 ... |
2019-11-25 06:11:10 |
| 111.12.90.43 | attackbots | Nov 24 16:29:40 lnxweb62 sshd[29185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.12.90.43 Nov 24 16:29:40 lnxweb62 sshd[29185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.12.90.43 |
2019-11-25 06:05:25 |
| 149.56.131.73 | attack | Nov 24 10:56:19 hpm sshd\[17849\]: Invalid user konet123 from 149.56.131.73 Nov 24 10:56:19 hpm sshd\[17849\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.ip-149-56-131.net Nov 24 10:56:21 hpm sshd\[17849\]: Failed password for invalid user konet123 from 149.56.131.73 port 48332 ssh2 Nov 24 11:02:32 hpm sshd\[18348\]: Invalid user ragaa from 149.56.131.73 Nov 24 11:02:32 hpm sshd\[18348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.ip-149-56-131.net |
2019-11-25 06:12:36 |
| 170.155.2.131 | attackspam | Unauthorized connection attempt from IP address 170.155.2.131 on Port 445(SMB) |
2019-11-25 05:36:39 |
| 105.247.120.22 | attack | Unauthorized connection attempt from IP address 105.247.120.22 on Port 445(SMB) |
2019-11-25 05:59:32 |
| 177.156.63.5 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 24-11-2019 14:45:24. |
2019-11-25 05:43:22 |
| 148.70.223.29 | attack | 2019-11-24T21:46:40.951025abusebot-5.cloudsearch.cf sshd\[20372\]: Invalid user scarangello from 148.70.223.29 port 41840 |
2019-11-25 06:11:41 |
| 185.164.72.248 | attack | proto=tcp . spt=48596 . dpt=3389 . src=185.164.72.248 . dst=xx.xx.4.1 . (Found on Alienvault Nov 24) (511) |
2019-11-25 05:58:45 |
| 14.231.207.23 | attackspambots | Unauthorized connection attempt from IP address 14.231.207.23 on Port 445(SMB) |
2019-11-25 05:49:06 |
| 113.125.119.83 | attack | Unauthorized SSH login attempts |
2019-11-25 06:13:24 |