City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.69.4.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6308
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;54.69.4.130. IN A
;; AUTHORITY SECTION:
. 567 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 16:26:49 CST 2022
;; MSG SIZE rcvd: 104
130.4.69.54.in-addr.arpa domain name pointer ec2-54-69-4-130.us-west-2.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
130.4.69.54.in-addr.arpa name = ec2-54-69-4-130.us-west-2.compute.amazonaws.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
122.155.212.244 | attackspam | 23921/tcp 24783/tcp 3118/tcp... [2020-06-21/07-21]86pkt,34pt.(tcp) |
2020-07-22 01:30:50 |
40.79.56.50 | attackspam | Unauthorized connection attempt detected from IP address 40.79.56.50 to port 1433 |
2020-07-22 01:00:48 |
34.76.17.151 | attackbots | Unauthorized connection attempt detected from IP address 34.76.17.151 to port 2121 [T] |
2020-07-22 01:01:27 |
66.42.42.168 | attackspam | Unauthorized connection attempt detected from IP address 66.42.42.168 to port 80 [T] |
2020-07-22 01:37:00 |
52.185.190.253 | attackspam | Unauthorized connection attempt detected from IP address 52.185.190.253 to port 1433 [T] |
2020-07-22 01:15:49 |
222.186.15.115 | attackbotsspam | Jul 21 19:22:48 vpn01 sshd[7553]: Failed password for root from 222.186.15.115 port 30926 ssh2 ... |
2020-07-22 01:24:43 |
43.226.45.232 | attack | Unauthorized connection attempt detected from IP address 43.226.45.232 to port 445 [T] |
2020-07-22 01:00:18 |
52.246.248.80 | attackbotsspam | Unauthorized connection attempt detected from IP address 52.246.248.80 to port 1433 |
2020-07-22 01:15:18 |
52.33.43.238 | attack | Unauthorized connection attempt detected from IP address 52.33.43.238 to port 8545 |
2020-07-22 01:39:00 |
52.155.126.225 | attack | Unauthorized connection attempt detected from IP address 52.155.126.225 to port 1433 [T] |
2020-07-22 01:16:19 |
89.248.168.176 | attackspambots | ET DROP Dshield Block Listed Source group 1 - port: 8182 proto: tcp cat: Misc Attackbytes: 60 |
2020-07-22 01:35:18 |
93.116.119.127 | attackbotsspam | Unauthorized connection attempt detected from IP address 93.116.119.127 to port 445 [T] |
2020-07-22 01:33:59 |
89.22.152.24 | attackbotsspam | Unauthorized connection attempt detected from IP address 89.22.152.24 to port 81 [T] |
2020-07-22 01:14:28 |
52.188.144.247 | attackbots | Unauthorized connection attempt detected from IP address 52.188.144.247 to port 1433 |
2020-07-22 00:57:37 |
104.46.35.191 | attackbotsspam | Unauthorized connection attempt detected from IP address 104.46.35.191 to port 1433 [T] |
2020-07-22 01:32:43 |