城市(city): Lubbock
省份(region): Texas
国家(country): United States
运营商(isp): RTC Communications LLC
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 40.128.0.0 - 40.133.31.255
CIDR: 40.128.0.0/14, 40.132.0.0/16, 40.133.0.0/19
NetName: WINDSTREAM-COMM
NetHandle: NET-40-128-0-0-1
Parent: NET40 (NET-40-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Windstream Communications LLC (WINDS-6)
RegDate: 2012-11-13
Updated: 2025-07-07
Comment: Geofeed https://geofeed.windstream.com/GEO_Data.csv
Ref: https://rdap.arin.net/registry/ip/40.128.0.0
OrgName: Windstream Communications LLC
OrgId: WINDS-6
Address: 4005 North Rodney Parham Rd
City: Little Rock
StateProv: AR
PostalCode: 72212
Country: US
RegDate: 2006-08-10
Updated: 2025-07-08
Comment: Geofeed https://geofeed.windstream.com/GEO_Data.csv
Ref: https://rdap.arin.net/registry/entity/WINDS-6
OrgRoutingHandle: WINDS-ARIN
OrgRoutingName: Windstream Communications Inc
OrgRoutingPhone: +1-888-292-3827
OrgRoutingEmail: Windstream.IP.Admin@windstream.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/WINDS-ARIN
OrgAbuseHandle: WINDS1-ARIN
OrgAbuseName: Windstream Abuse
OrgAbusePhone: +1-800-347-1991
OrgAbuseEmail: abuse@windstream.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/WINDS1-ARIN
OrgTechHandle: WINDS-ARIN
OrgTechName: Windstream Communications Inc
OrgTechPhone: +1-888-292-3827
OrgTechEmail: Windstream.IP.Admin@windstream.com
OrgTechRef: https://rdap.arin.net/registry/entity/WINDS-ARIN
# end
# start
NetRange: 40.131.160.0 - 40.131.175.255
CIDR: 40.131.160.0/20
NetName: 40-131-160-0
NetHandle: NET-40-131-160-0-1
Parent: WINDSTREAM-COMM (NET-40-128-0-0-1)
NetType: Reassigned
OriginAS:
Customer: WINDSTREAM COMMUNICATIONS LLC (C10900641)
RegDate: 2024-07-16
Updated: 2024-10-31
Comment: Geofeed https://geofeed.windstream.com/GEO_Data.csv
Ref: https://rdap.arin.net/registry/ip/40.131.160.0
CustName: WINDSTREAM COMMUNICATIONS LLC
Address: WINDSTREAM CONSUMER
City: LUBBOCK
StateProv: TX
PostalCode: 79401
Country: US
RegDate: 2024-07-16
Updated: 2024-07-16
Ref: https://rdap.arin.net/registry/entity/C10900641
OrgRoutingHandle: WINDS-ARIN
OrgRoutingName: Windstream Communications Inc
OrgRoutingPhone: +1-888-292-3827
OrgRoutingEmail: Windstream.IP.Admin@windstream.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/WINDS-ARIN
OrgAbuseHandle: WINDS1-ARIN
OrgAbuseName: Windstream Abuse
OrgAbusePhone: +1-800-347-1991
OrgAbuseEmail: abuse@windstream.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/WINDS1-ARIN
OrgTechHandle: WINDS-ARIN
OrgTechName: Windstream Communications Inc
OrgTechPhone: +1-888-292-3827
OrgTechEmail: Windstream.IP.Admin@windstream.com
OrgTechRef: https://rdap.arin.net/registry/entity/WINDS-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 40.131.164.226
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20159
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;40.131.164.226. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032401 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 25 11:51:45 CST 2026
;; MSG SIZE rcvd: 107
226.164.131.40.in-addr.arpa domain name pointer h226.164.131.40.dynamic.ip.windstream.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
226.164.131.40.in-addr.arpa name = h226.164.131.40.dynamic.ip.windstream.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 189.130.210.124 | attack | Honeypot attack, port: 445, PTR: dsl-189-130-210-124-dyn.prod-infinitum.com.mx. |
2019-10-23 03:33:38 |
| 217.69.168.232 | attackspam | Unauthorised access (Oct 22) SRC=217.69.168.232 LEN=40 TTL=247 ID=708 TCP DPT=445 WINDOW=1024 SYN |
2019-10-23 03:22:42 |
| 176.215.112.82 | attackbotsspam | Chat Spam |
2019-10-23 03:18:26 |
| 131.100.213.174 | attack | Unauthorised access (Oct 22) SRC=131.100.213.174 LEN=52 TOS=0x10 PREC=0x40 TTL=112 ID=30206 DF TCP DPT=445 WINDOW=8192 SYN |
2019-10-23 03:07:47 |
| 84.19.26.93 | attackbotsspam | Honeypot attack, port: 445, PTR: casperjs.tldserver.de. |
2019-10-23 03:06:43 |
| 58.254.132.156 | attackbots | Oct 22 21:44:12 server sshd\[16110\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.254.132.156 user=root Oct 22 21:44:14 server sshd\[16110\]: Failed password for root from 58.254.132.156 port 55154 ssh2 Oct 22 21:51:03 server sshd\[18025\]: Invalid user volmer from 58.254.132.156 Oct 22 21:51:03 server sshd\[18025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.254.132.156 Oct 22 21:51:05 server sshd\[18025\]: Failed password for invalid user volmer from 58.254.132.156 port 55159 ssh2 ... |
2019-10-23 03:27:08 |
| 198.143.179.155 | attack | Invalid user applmgr from 198.143.179.155 port 58522 |
2019-10-23 03:20:15 |
| 23.129.64.161 | attack | Oct 22 21:02:37 vpn01 sshd[18451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.161 Oct 22 21:02:39 vpn01 sshd[18451]: Failed password for invalid user aerodynamik from 23.129.64.161 port 29188 ssh2 ... |
2019-10-23 03:25:26 |
| 92.119.160.80 | attackbotsspam | Multiport scan : 20 ports scanned 5943 5953 5959 5961 5976 5981 5984 5994 5997 6003 6005 6006 6008 6018 8370 8378 8384 8390 8392 8394 |
2019-10-23 02:56:23 |
| 45.243.53.111 | attackspam | Honeypot attack, port: 445, PTR: PTR record not found |
2019-10-23 03:25:07 |
| 83.171.107.216 | attackspam | 2019-10-22T12:38:55.8112501495-001 sshd\[8459\]: Failed password for invalid user serv_fun from 83.171.107.216 port 55930 ssh2 2019-10-22T13:41:59.0593311495-001 sshd\[11216\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ppp.83-171-107-216.pppoe.avangarddsl.ru user=root 2019-10-22T13:42:01.0781361495-001 sshd\[11216\]: Failed password for root from 83.171.107.216 port 27844 ssh2 2019-10-22T13:46:03.0317161495-001 sshd\[11370\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ppp.83-171-107-216.pppoe.avangarddsl.ru user=root 2019-10-22T13:46:04.7355141495-001 sshd\[11370\]: Failed password for root from 83.171.107.216 port 46252 ssh2 2019-10-22T13:49:58.2409631495-001 sshd\[11581\]: Invalid user Administrator from 83.171.107.216 port 64655 2019-10-22T13:49:58.2493731495-001 sshd\[11581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ppp.83-171-107-216 ... |
2019-10-23 03:14:45 |
| 125.161.105.116 | attackbots | Unauthorized IMAP connection attempt |
2019-10-23 03:15:16 |
| 36.80.10.189 | attackbotsspam | Oct 22 11:11:34 xtremcommunity sshd\[781650\]: Invalid user cn from 36.80.10.189 port 44072 Oct 22 11:11:34 xtremcommunity sshd\[781650\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.80.10.189 Oct 22 11:11:36 xtremcommunity sshd\[781650\]: Failed password for invalid user cn from 36.80.10.189 port 44072 ssh2 Oct 22 11:16:59 xtremcommunity sshd\[781803\]: Invalid user 1233 from 36.80.10.189 port 50476 Oct 22 11:16:59 xtremcommunity sshd\[781803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.80.10.189 ... |
2019-10-23 02:57:33 |
| 45.33.14.194 | attackspambots | Oct 22 14:05:41 nxxxxxxx sshd[11517]: refused connect from 45.33.14.194 (45.= 33.14.194) ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=45.33.14.194 |
2019-10-23 03:09:02 |
| 113.251.61.61 | attack | Automatic report - FTP Brute Force |
2019-10-23 02:59:20 |