城市(city): Winnipeg
省份(region): Manitoba
国家(country): Canada
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.193.252.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3072
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;140.193.252.40. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 13:38:00 CST 2025
;; MSG SIZE rcvd: 107
40.252.193.140.in-addr.arpa domain name pointer wifi-wpa-cw-140-193-252-40.wifi.umanitoba.ca.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
40.252.193.140.in-addr.arpa name = wifi-wpa-cw-140-193-252-40.wifi.umanitoba.ca.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 61.133.232.251 | attackbotsspam | "fail2ban match" |
2020-08-26 06:35:55 |
| 121.123.148.220 | attack | firewall-block, port(s): 25814/tcp |
2020-08-26 06:25:23 |
| 152.136.152.45 | attack | Aug 26 00:24:56 [host] sshd[4774]: Invalid user cs Aug 26 00:24:56 [host] sshd[4774]: pam_unix(sshd:a Aug 26 00:24:58 [host] sshd[4774]: Failed password |
2020-08-26 06:33:25 |
| 51.178.51.36 | attack | Aug 25 21:47:30 Invalid user deployer from 51.178.51.36 port 39998 |
2020-08-26 06:41:39 |
| 180.76.242.204 | attackbotsspam | Aug 25 22:00:03 ns3164893 sshd[9882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.242.204 Aug 25 22:00:05 ns3164893 sshd[9882]: Failed password for invalid user jenkins from 180.76.242.204 port 47364 ssh2 ... |
2020-08-26 06:37:01 |
| 141.98.81.42 | attack | Aug 23 06:42:34 main sshd[22471]: Failed password for invalid user admin from 141.98.81.42 port 32895 ssh2 Aug 23 06:42:53 main sshd[22491]: Failed password for invalid user test from 141.98.81.42 port 35779 ssh2 Aug 24 04:39:00 main sshd[12348]: Failed password for invalid user guest from 141.98.81.42 port 34779 ssh2 Aug 25 03:09:39 main sshd[26170]: Failed password for invalid user admin from 141.98.81.42 port 43487 ssh2 Aug 25 03:09:59 main sshd[26184]: Failed password for invalid user test from 141.98.81.42 port 38637 ssh2 |
2020-08-26 06:31:21 |
| 120.92.33.68 | attack | Aug 25 21:56:18 rush sshd[18577]: Failed password for root from 120.92.33.68 port 54706 ssh2 Aug 25 22:00:37 rush sshd[18789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.33.68 Aug 25 22:00:39 rush sshd[18789]: Failed password for invalid user ec2-user from 120.92.33.68 port 40524 ssh2 ... |
2020-08-26 06:09:33 |
| 51.75.242.129 | attackspambots | ET CINS Active Threat Intelligence Poor Reputation IP group 37 - port: 32173 proto: tcp cat: Misc Attackbytes: 60 |
2020-08-26 06:41:50 |
| 37.202.100.193 | attackspambots | Auto Detect Rule! proto TCP (SYN), 37.202.100.193:45700->gjan.info:23, len 40 |
2020-08-26 06:15:56 |
| 116.139.4.131 | attack | Auto Detect Rule! proto TCP (SYN), 116.139.4.131:36235->gjan.info:23, len 40 |
2020-08-26 06:25:38 |
| 171.244.140.174 | attackbots | prod6 ... |
2020-08-26 06:24:42 |
| 185.232.30.130 | attackspambots | SmallBizIT.US 9 packets to tcp(3388,3391,3392,3393,3399,13389,23389,33389,33899) |
2020-08-26 06:14:49 |
| 144.34.172.241 | attackspam | Aug 25 20:46:46 scw-focused-cartwright sshd[32608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.34.172.241 Aug 25 20:46:48 scw-focused-cartwright sshd[32608]: Failed password for invalid user albatros from 144.34.172.241 port 47906 ssh2 |
2020-08-26 06:07:16 |
| 185.220.102.4 | attack | SSH brutforce |
2020-08-26 06:27:19 |
| 141.98.81.15 | attackbotsspam | Aug 23 06:42:50 main sshd[22489]: Failed password for invalid user operator from 141.98.81.15 port 50850 ssh2 Aug 23 06:43:09 main sshd[22502]: Failed password for invalid user support from 141.98.81.15 port 54206 ssh2 Aug 23 06:43:31 main sshd[22516]: Failed password for invalid user 1234 from 141.98.81.15 port 58300 ssh2 Aug 24 04:39:17 main sshd[12412]: Failed password for invalid user user from 141.98.81.15 port 58708 ssh2 Aug 25 03:09:56 main sshd[26182]: Failed password for invalid user operator from 141.98.81.15 port 37818 ssh2 Aug 25 03:10:17 main sshd[26195]: Failed password for invalid user support from 141.98.81.15 port 41182 ssh2 Aug 25 03:10:39 main sshd[26208]: Failed password for invalid user 1234 from 141.98.81.15 port 45266 ssh2 |
2020-08-26 06:40:23 |