City: Tokyo
Region: Tokyo
Country: Japan
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.64.128.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12515
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;54.64.128.149. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025041201 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 13 08:00:14 CST 2025
;; MSG SIZE rcvd: 106
149.128.64.54.in-addr.arpa domain name pointer ec2-54-64-128-149.ap-northeast-1.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
149.128.64.54.in-addr.arpa name = ec2-54-64-128-149.ap-northeast-1.compute.amazonaws.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
112.133.251.41 | attackspambots | Email rejected due to spam filtering |
2020-02-25 04:00:11 |
188.119.103.39 | attackspam | 188.119.103.39 has been banned for [spam] ... |
2020-02-25 03:37:48 |
14.98.141.194 | attackbotsspam | Unauthorized connection attempt detected from IP address 14.98.141.194 to port 445 |
2020-02-25 04:06:00 |
46.152.137.220 | attack | Email rejected due to spam filtering |
2020-02-25 03:49:39 |
198.204.230.70 | attackspam | Chat Spam |
2020-02-25 04:08:23 |
37.59.47.80 | attackspambots | Automatic report - XMLRPC Attack |
2020-02-25 03:53:17 |
216.208.169.200 | attackspambots | Automatic report - Port Scan Attack |
2020-02-25 03:38:55 |
106.58.210.27 | attack | Feb 24 14:14:12 web01.agentur-b-2.de postfix/smtpd[7329]: warning: unknown[106.58.210.27]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Feb 24 14:14:20 web01.agentur-b-2.de postfix/smtpd[9627]: warning: unknown[106.58.210.27]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Feb 24 14:14:32 web01.agentur-b-2.de postfix/smtpd[9613]: warning: unknown[106.58.210.27]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2020-02-25 03:47:20 |
177.11.41.201 | attackspam | Port 22 Scan, PTR: None |
2020-02-25 04:09:06 |
100.24.59.183 | attack | Feb 24 16:23:16 ArkNodeAT sshd\[11167\]: Invalid user h-i-s from 100.24.59.183 Feb 24 16:23:16 ArkNodeAT sshd\[11167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=100.24.59.183 Feb 24 16:23:18 ArkNodeAT sshd\[11167\]: Failed password for invalid user h-i-s from 100.24.59.183 port 43476 ssh2 |
2020-02-25 03:35:57 |
221.144.61.3 | attack | Feb 24 13:27:26 stark sshd[17029]: Invalid user typhon from 221.144.61.3 Feb 24 13:31:19 stark sshd[17056]: Invalid user ftpuser from 221.144.61.3 Feb 24 13:35:11 stark sshd[17106]: Invalid user typhon from 221.144.61.3 Feb 24 13:38:57 stark sshd[17160]: Invalid user ubuntu from 221.144.61.3 |
2020-02-25 04:02:09 |
14.251.20.6 | attack | 1582550567 - 02/24/2020 14:22:47 Host: 14.251.20.6/14.251.20.6 Port: 445 TCP Blocked |
2020-02-25 04:04:42 |
183.134.104.172 | attackspam | Unauthorised access (Feb 24) SRC=183.134.104.172 LEN=52 TTL=117 ID=9658 DF TCP DPT=21 WINDOW=8192 SYN |
2020-02-25 03:12:39 |
54.39.10.56 | attackspam | Automatic report - SSH Brute-Force Attack |
2020-02-25 04:01:08 |
78.183.110.161 | attackspambots | Automatic report - Port Scan Attack |
2020-02-25 03:54:32 |