City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.70.29.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13948
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;54.70.29.66. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 22:33:24 CST 2025
;; MSG SIZE rcvd: 104
66.29.70.54.in-addr.arpa domain name pointer ec2-54-70-29-66.us-west-2.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
66.29.70.54.in-addr.arpa name = ec2-54-70-29-66.us-west-2.compute.amazonaws.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 37.187.97.33 | attackspambots | Dec 4 03:58:47 hpm sshd\[11765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=grupa.poczytajmimako.pl user=daemon Dec 4 03:58:49 hpm sshd\[11765\]: Failed password for daemon from 37.187.97.33 port 48193 ssh2 Dec 4 04:07:29 hpm sshd\[12616\]: Invalid user bachvan from 37.187.97.33 Dec 4 04:07:29 hpm sshd\[12616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=grupa.poczytajmimako.pl Dec 4 04:07:31 hpm sshd\[12616\]: Failed password for invalid user bachvan from 37.187.97.33 port 53632 ssh2 |
2019-12-04 23:22:36 |
| 115.94.204.156 | attackspambots | Dec 4 20:48:03 areeb-Workstation sshd[28655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.94.204.156 Dec 4 20:48:04 areeb-Workstation sshd[28655]: Failed password for invalid user kermie from 115.94.204.156 port 46738 ssh2 ... |
2019-12-04 23:19:03 |
| 103.138.41.74 | attack | 2019-12-04T14:42:36.019476abusebot.cloudsearch.cf sshd\[32110\]: Invalid user petruzzella from 103.138.41.74 port 47989 |
2019-12-04 22:53:11 |
| 91.134.166.217 | attackspam | firewall-block, port(s): 1433/tcp |
2019-12-04 22:51:32 |
| 152.136.125.210 | attack | Dec 4 11:39:35 icinga sshd[29799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.125.210 Dec 4 11:39:37 icinga sshd[29799]: Failed password for invalid user avendoria from 152.136.125.210 port 51830 ssh2 Dec 4 12:17:50 icinga sshd[65479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.125.210 ... |
2019-12-04 22:59:35 |
| 39.99.169.152 | attackspam | license.php |
2019-12-04 22:57:55 |
| 106.13.52.159 | attackspambots | Dec 4 03:24:39 web1 sshd\[8547\]: Invalid user gretta from 106.13.52.159 Dec 4 03:24:39 web1 sshd\[8547\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.52.159 Dec 4 03:24:41 web1 sshd\[8547\]: Failed password for invalid user gretta from 106.13.52.159 port 45280 ssh2 Dec 4 03:32:45 web1 sshd\[9324\]: Invalid user guest from 106.13.52.159 Dec 4 03:32:45 web1 sshd\[9324\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.52.159 |
2019-12-04 22:51:49 |
| 159.89.169.137 | attackspambots | Dec 4 14:23:21 MK-Soft-Root2 sshd[21239]: Failed password for root from 159.89.169.137 port 37004 ssh2 Dec 4 14:29:44 MK-Soft-Root2 sshd[22393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.169.137 ... |
2019-12-04 23:09:07 |
| 125.64.94.221 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-12-04 23:07:40 |
| 165.22.46.4 | attackspambots | Dec 4 04:34:38 hpm sshd\[15507\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.46.4 user=root Dec 4 04:34:40 hpm sshd\[15507\]: Failed password for root from 165.22.46.4 port 41201 ssh2 Dec 4 04:39:50 hpm sshd\[16134\]: Invalid user zerega from 165.22.46.4 Dec 4 04:39:50 hpm sshd\[16134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.46.4 Dec 4 04:39:52 hpm sshd\[16134\]: Failed password for invalid user zerega from 165.22.46.4 port 44759 ssh2 |
2019-12-04 22:42:51 |
| 129.204.219.180 | attackspambots | 2019-12-04T11:49:27.280924abusebot-7.cloudsearch.cf sshd\[12571\]: Invalid user host from 129.204.219.180 port 33352 |
2019-12-04 23:21:18 |
| 103.137.6.226 | attackspam | IP was detected trying to Brute-Force SSH, FTP, Web Apps or Hacking. |
2019-12-04 22:54:10 |
| 138.68.99.46 | attackspam | Dec 4 15:30:05 cvbnet sshd[13642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.99.46 Dec 4 15:30:07 cvbnet sshd[13642]: Failed password for invalid user catering from 138.68.99.46 port 36090 ssh2 ... |
2019-12-04 23:23:01 |
| 51.91.122.140 | attackspam | Dec 4 13:13:38 raspberrypi sshd\[8728\]: Failed password for root from 51.91.122.140 port 43660 ssh2Dec 4 13:21:45 raspberrypi sshd\[8885\]: Failed password for backup from 51.91.122.140 port 37700 ssh2Dec 4 13:26:59 raspberrypi sshd\[8945\]: Invalid user mjes_news from 51.91.122.140 ... |
2019-12-04 23:15:36 |
| 50.63.166.50 | attack | WordPress wp-login brute force :: 50.63.166.50 0.136 - [04/Dec/2019:13:06:56 0000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 1805 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1" |
2019-12-04 23:11:10 |