To make this easier to debug I am going to use only command line arguments and use the parameters as specified on your website:
https://cp.zoneedit.com/support/dynamic/clients/ez-ipupdate/
Here is exactly what I am running and the responses I'm getting:
admin@ip-172-31-16-214:~$ sudo ez-ipupdate -S easydns-partner -z zoneedit -s api.cp.zoneedit.com -g /dyn/ez-ipupdate.php -u jmawhorter:************* -h vpnserver.mawhorter.org -a 35.161.163.251
ez-ipupdate Version 3.0.11b8
Copyright (C) 1998-2001 Angus Mackay
connected to api.cp.zoneedit.com (64.68.198.48) on port 80
error recv()ing reply: Connection reset by peer
strange server response, are you connecting to the right server?
admin@ip-172-31-16-214:~$ sudo ez-ipupdate -S easydns-partner -z zoneedit -s api.cp.zoneedit.com -g /dyn/ez-ipupdate.php -u jmawhorter:************* -h vpnserver.mawhorter.org -a 35.161.163.251
ez-ipupdate Version 3.0.11b8
Copyright (C) 1998-2001 Angus Mackay
connected to api.cp.zoneedit.com (64.68.198.48) on port 80
error recv()ing reply: Connection reset by peer
strange server response, are you connecting to the right server?
admin@ip-172-31-16-214:~$ sudo ez-ipupdate -S easydns-partner -z zoneedit -s api.cp.zoneedit.com -g /dyn/ez-ipupdate.php -u jmawhorter:************* -h vpnserver.mawhorter.org -a 35.161.163.251
ez-ipupdate Version 3.0.11b8
Copyright (C) 1998-2001 Angus Mackay
connected to api.cp.zoneedit.com (64.68.198.48) on port 80
unknown return code: 500
server response: Internal Server Error
As before, I'm staring out the AUTH token but I've confirmed it is exactly what is in the control panel.
Here is a tcpdump of the last interaction:
admin@ip-172-31-16-214:~$ sudo tcpdump -vv host api.cp.zoneedit.com
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
20:23:56.699123 IP (tos 0x0, ttl 64, id 41832, offset 0, flags [DF], proto TCP (6), length 60)
ip-172-31-16-214.us-west-2.compute.internal.38446 > api.easyzone.ca.http: Flags
, cksum 0xc398 (incorrect -> 0xfe6c), seq 751627950, win 26883, options [mss 8961,sackOK,TS val 1527238 ecr 0,nop,wscale 9], length 0
20:23:57.696564 IP (tos 0x0, ttl 64, id 41833, offset 0, flags [DF], proto TCP (6), length 60)
ip-172-31-16-214.us-west-2.compute.internal.38446 > api.easyzone.ca.http: Flags , cksum 0xc398 (incorrect -> 0xfd72), seq 751627950, win 26883, options [mss 8961,sackOK,TS val 1527488 ecr 0,nop,wscale 9], length 0
20:23:59.700548 IP (tos 0x0, ttl 64, id 41834, offset 0, flags [DF], proto TCP (6), length 60)
ip-172-31-16-214.us-west-2.compute.internal.38446 > api.easyzone.ca.http: Flags , cksum 0xc398 (incorrect -> 0xfb7d), seq 751627950, win 26883, options [mss 8961,sackOK,TS val 1527989 ecr 0,nop,wscale 9], length 0
20:23:59.765592 IP (tos 0x0, ttl 42, id 0, offset 0, flags [DF], proto TCP (6), length 60)
api.easyzone.ca.http > ip-172-31-16-214.us-west-2.compute.internal.38446: Flags [S.], cksum 0x3ba7 (correct), seq 4008540365, ack 751627951, win 14480, options [mss 1460,sackOK,TS val 1573210120 ecr 1527989,nop,wscale 6], length 0
20:23:59.765614 IP (tos 0x0, ttl 64, id 41835, offset 0, flags [DF], proto TCP (6), length 52)
ip-172-31-16-214.us-west-2.compute.internal.38446 > api.easyzone.ca.http: Flags [.], cksum 0xc390 (incorrect -> 0xa2bd), seq 1, ack 1, win 53, options [nop,nop,TS val 1528005 ecr 1573210120], length 0
20:23:59.765737 IP (tos 0x0, ttl 64, id 41836, offset 0, flags [DF], proto TCP (6), length 89)
ip-172-31-16-214.us-west-2.compute.internal.38446 > api.easyzone.ca.http: Flags [P.], cksum 0xc3b5 (incorrect -> 0xf6e1), seq 1:38, ack 1, win 53, options [nop,nop,TS val 1528005 ecr 1573210120], length 37
20:24:00.028524 IP (tos 0x0, ttl 64, id 41837, offset 0, flags [DF], proto TCP (6), length 306)
ip-172-31-16-214.us-west-2.compute.internal.38446 > api.easyzone.ca.http: Flags [P.], cksum 0xc48e (incorrect -> 0x2b82), seq 38:292, ack 1, win 53, options [nop,nop,TS val 1528071 ecr 1573210120], length 254
20:24:00.093611 IP (tos 0x0, ttl 42, id 12436, offset 0, flags [DF], proto TCP (6), length 64)
api.easyzone.ca.http > ip-172-31-16-214.us-west-2.compute.internal.38446: Flags [.], cksum 0x3366 (correct), seq 1, ack 1, win 227, options [nop,nop,TS val 1573210202 ecr 1528005,nop,nop,sack 1 {38:292}], length 0
20:24:00.112524 IP (tos 0x0, ttl 64, id 41838, offset 0, flags [DF], proto TCP (6), length 89)
ip-172-31-16-214.us-west-2.compute.internal.38446 > api.easyzone.ca.http: Flags [P.], cksum 0xc3b5 (incorrect -> 0xf638), seq 1:38, ack 1, win 53, options [nop,nop,TS val 1528092 ecr 1573210202], length 37
20:24:00.178009 IP (tos 0x0, ttl 42, id 12437, offset 0, flags [DF], proto TCP (6), length 52)
api.easyzone.ca.http > ip-172-31-16-214.us-west-2.compute.internal.38446: Flags [.], cksum 0xa02e (correct), seq 1, ack 292, win 227, options [nop,nop,TS val 1573210223 ecr 1528092], length 0
20:24:02.239239 IP (tos 0x0, ttl 42, id 12438, offset 0, flags [DF], proto TCP (6), length 558)
api.easyzone.ca.http > ip-172-31-16-214.us-west-2.compute.internal.38446: Flags [P.], cksum 0xa928 (correct), seq 1:507, ack 292, win 227, options [nop,nop,TS val 1573210738 ecr 1528092], length 506
20:24:02.239268 IP (tos 0x0, ttl 64, id 41839, offset 0, flags [DF], proto TCP (6), length 52)
ip-172-31-16-214.us-west-2.compute.internal.38446 > api.easyzone.ca.http: Flags [.], cksum 0xc390 (incorrect -> 0x9aca), seq 292, ack 507, win 55, options [nop,nop,TS val 1528623 ecr 1573210738], length 0
20:24:02.239709 IP (tos 0x0, ttl 42, id 12439, offset 0, flags [DF], proto TCP (6), length 52)
api.easyzone.ca.http > ip-172-31-16-214.us-west-2.compute.internal.38446: Flags [F.], cksum 0x9c30 (correct), seq 507, ack 292, win 227, options [nop,nop,TS val 1573210738 ecr 1528092], length 0
20:24:02.239735 IP (tos 0x0, ttl 64, id 41840, offset 0, flags [DF], proto TCP (6), length 52)
ip-172-31-16-214.us-west-2.compute.internal.38446 > api.easyzone.ca.http: Flags [F.], cksum 0xc390 (incorrect -> 0x9ac8), seq 292, ack 508, win 55, options [nop,nop,TS val 1528623 ecr 1573210738], length 0
20:24:02.304786 IP (tos 0x0, ttl 42, id 12440, offset 0, flags [DF], proto TCP (6), length 52)
api.easyzone.ca.http > ip-172-31-16-214.us-west-2.compute.internal.38446: Flags [.], cksum 0x9a0c (correct), seq 508, ack 293, win 227, options [nop,nop,TS val 1573210754 ecr 1528623], length 0
^C
15 packets captured
20 packets received by filter
0 packets dropped by kernel