City: unknown
Region: unknown
Country: Singapore
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.254.212.120
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30602
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;54.254.212.120. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024120900 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 09 18:14:13 CST 2024
;; MSG SIZE rcvd: 107
120.212.254.54.in-addr.arpa domain name pointer ec2-54-254-212-120.ap-southeast-1.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
120.212.254.54.in-addr.arpa name = ec2-54-254-212-120.ap-southeast-1.compute.amazonaws.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 146.185.25.184 | attackspambots | 11443/tcp 2443/tcp 993/tcp... [2019-06-30/08-11]32pkt,14pt.(tcp),1pt.(udp) |
2019-08-12 08:51:43 |
| 165.16.37.165 | attack | 8080/tcp [2019-08-11]1pkt |
2019-08-12 08:54:26 |
| 222.186.52.155 | attack | 2019-08-11 UTC: 2x - |
2019-08-12 09:00:58 |
| 50.62.176.172 | attack | fail2ban honeypot |
2019-08-12 08:51:21 |
| 113.161.1.111 | attackbots | ssh failed login |
2019-08-12 08:56:19 |
| 187.28.50.230 | attackbotsspam | Aug 11 16:13:39 cac1d2 sshd\[13323\]: Invalid user zabbix from 187.28.50.230 port 44510 Aug 11 16:13:40 cac1d2 sshd\[13323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.28.50.230 Aug 11 16:13:41 cac1d2 sshd\[13323\]: Failed password for invalid user zabbix from 187.28.50.230 port 44510 ssh2 ... |
2019-08-12 08:50:18 |
| 217.61.20.44 | attack | Honeypot attack, port: 81, PTR: host44-20-61-217.static.arubacloud.com. |
2019-08-12 08:53:51 |
| 198.71.228.33 | attackspam | fail2ban honeypot |
2019-08-12 09:08:47 |
| 82.208.149.161 | attackspam | Automatic report - Port Scan Attack |
2019-08-12 08:36:59 |
| 113.92.159.53 | attackspambots | Aug 11 21:16:31 *** sshd[28265]: User root from 113.92.159.53 not allowed because not listed in AllowUsers |
2019-08-12 08:38:42 |
| 69.226.244.247 | attack | attack my web |
2019-08-12 08:55:14 |
| 37.183.12.191 | attack | port scan and connect, tcp 23 (telnet) |
2019-08-12 09:13:49 |
| 153.149.156.35 | attackbotsspam | Unauthorised access (Aug 11) SRC=153.149.156.35 LEN=40 TOS=0x10 PREC=0x40 TTL=242 ID=55460 TCP DPT=445 WINDOW=1024 SYN |
2019-08-12 08:44:58 |
| 134.119.216.167 | attack | Unauthorized access detected from banned ip |
2019-08-12 08:50:46 |
| 112.85.42.189 | attackspam | 2019-08-12T00:30:22.100200abusebot-4.cloudsearch.cf sshd\[23774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.189 user=root |
2019-08-12 08:47:19 |