城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 40.140.109.190
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17744
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;40.140.109.190. IN A
;; AUTHORITY SECTION:
. 441 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022600 1800 900 604800 86400
;; Query time: 129 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 00:17:28 CST 2022
;; MSG SIZE rcvd: 107
190.109.140.40.in-addr.arpa domain name pointer h190.109.140.40.ip.windstream.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
190.109.140.40.in-addr.arpa name = h190.109.140.40.ip.windstream.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 124.156.116.72 | attackspam | Nov 10 17:05:06 MK-Soft-VM6 sshd[7630]: Failed password for root from 124.156.116.72 port 33030 ssh2 ... |
2019-11-11 01:05:42 |
| 177.92.144.90 | attack | Nov 10 18:26:07 andromeda sshd\[50913\]: Invalid user guest from 177.92.144.90 port 46437 Nov 10 18:26:07 andromeda sshd\[50913\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.92.144.90 Nov 10 18:26:10 andromeda sshd\[50913\]: Failed password for invalid user guest from 177.92.144.90 port 46437 ssh2 |
2019-11-11 01:35:31 |
| 168.232.197.5 | attack | Nov 10 11:09:02 Tower sshd[21039]: Connection from 168.232.197.5 port 56808 on 192.168.10.220 port 22 Nov 10 11:09:03 Tower sshd[21039]: Invalid user supriya from 168.232.197.5 port 56808 Nov 10 11:09:03 Tower sshd[21039]: error: Could not get shadow information for NOUSER Nov 10 11:09:03 Tower sshd[21039]: Failed password for invalid user supriya from 168.232.197.5 port 56808 ssh2 Nov 10 11:09:04 Tower sshd[21039]: Received disconnect from 168.232.197.5 port 56808:11: Bye Bye [preauth] Nov 10 11:09:04 Tower sshd[21039]: Disconnected from invalid user supriya 168.232.197.5 port 56808 [preauth] |
2019-11-11 01:09:31 |
| 51.38.51.108 | attackspam | Nov 10 17:50:15 SilenceServices sshd[21605]: Failed password for root from 51.38.51.108 port 49946 ssh2 Nov 10 17:54:00 SilenceServices sshd[25759]: Failed password for root from 51.38.51.108 port 35012 ssh2 |
2019-11-11 01:00:53 |
| 190.210.42.209 | attack | Nov 10 16:48:40 Ubuntu-1404-trusty-64-minimal sshd\[6346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.210.42.209 user=root Nov 10 16:48:42 Ubuntu-1404-trusty-64-minimal sshd\[6346\]: Failed password for root from 190.210.42.209 port 3479 ssh2 Nov 10 17:04:49 Ubuntu-1404-trusty-64-minimal sshd\[23445\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.210.42.209 user=root Nov 10 17:04:51 Ubuntu-1404-trusty-64-minimal sshd\[23445\]: Failed password for root from 190.210.42.209 port 55013 ssh2 Nov 10 17:09:19 Ubuntu-1404-trusty-64-minimal sshd\[25305\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.210.42.209 user=root |
2019-11-11 01:11:05 |
| 51.79.69.137 | attackbotsspam | Nov 10 17:09:41 dedicated sshd[6710]: Invalid user powerapp from 51.79.69.137 port 41446 |
2019-11-11 00:56:57 |
| 96.44.133.110 | attackspambots | (imapd) Failed IMAP login from 96.44.133.110 (US/United States/96.44.133.110.static.quadranet.com): 1 in the last 3600 secs |
2019-11-11 01:36:22 |
| 45.143.220.40 | attackbots | TCP Port Scanning |
2019-11-11 01:15:24 |
| 192.99.166.243 | attack | Nov 9 21:30:20 rb06 sshd[25911]: Failed password for r.r from 192.99.166.243 port 56770 ssh2 Nov 9 21:30:20 rb06 sshd[25911]: Received disconnect from 192.99.166.243: 11: Bye Bye [preauth] Nov 9 21:37:44 rb06 sshd[10986]: Failed password for invalid user unt from 192.99.166.243 port 33256 ssh2 Nov 9 21:37:44 rb06 sshd[10986]: Received disconnect from 192.99.166.243: 11: Bye Bye [preauth] Nov 9 21:41:22 rb06 sshd[12369]: Failed password for r.r from 192.99.166.243 port 46338 ssh2 Nov 9 21:41:22 rb06 sshd[12369]: Received disconnect from 192.99.166.243: 11: Bye Bye [preauth] Nov 9 21:44:51 rb06 sshd[21416]: Failed password for r.r from 192.99.166.243 port 59414 ssh2 Nov 9 21:44:51 rb06 sshd[21416]: Received disconnect from 192.99.166.243: 11: Bye Bye [preauth] Nov 9 21:48:31 rb06 sshd[22106]: Failed password for invalid user sg from 192.99.166.243 port 44264 ssh2 Nov 9 21:48:31 rb06 sshd[22106]: Received disconnect from 192.99.166.243: 11: Bye Bye [preauth] Nov ........ ------------------------------- |
2019-11-11 01:29:12 |
| 222.186.180.223 | attack | Nov 10 18:15:30 minden010 sshd[21572]: Failed password for root from 222.186.180.223 port 58742 ssh2 Nov 10 18:15:34 minden010 sshd[21572]: Failed password for root from 222.186.180.223 port 58742 ssh2 Nov 10 18:15:39 minden010 sshd[21572]: Failed password for root from 222.186.180.223 port 58742 ssh2 Nov 10 18:15:42 minden010 sshd[21572]: Failed password for root from 222.186.180.223 port 58742 ssh2 ... |
2019-11-11 01:21:33 |
| 222.186.175.217 | attackspam | Nov 10 18:13:36 MK-Soft-Root2 sshd[24273]: Failed password for root from 222.186.175.217 port 53890 ssh2 Nov 10 18:13:40 MK-Soft-Root2 sshd[24273]: Failed password for root from 222.186.175.217 port 53890 ssh2 ... |
2019-11-11 01:24:29 |
| 104.236.226.93 | attack | Nov 9 15:36:08 eola sshd[29541]: Invalid user password from 104.236.226.93 port 58610 Nov 9 15:36:08 eola sshd[29541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.226.93 Nov 9 15:36:10 eola sshd[29541]: Failed password for invalid user password from 104.236.226.93 port 58610 ssh2 Nov 9 15:36:10 eola sshd[29541]: Received disconnect from 104.236.226.93 port 58610:11: Bye Bye [preauth] Nov 9 15:36:10 eola sshd[29541]: Disconnected from 104.236.226.93 port 58610 [preauth] Nov 9 15:43:49 eola sshd[30233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.226.93 user=r.r Nov 9 15:43:51 eola sshd[30233]: Failed password for r.r from 104.236.226.93 port 36322 ssh2 Nov 9 15:43:51 eola sshd[30233]: Received disconnect from 104.236.226.93 port 36322:11: Bye Bye [preauth] Nov 9 15:43:51 eola sshd[30233]: Disconnected from 104.236.226.93 port 36322 [preauth] ........ --------------------------------------------- |
2019-11-11 01:10:13 |
| 126.49.120.76 | attackbots | Unauthorised access (Nov 10) SRC=126.49.120.76 LEN=40 PREC=0x20 TTL=42 ID=32667 TCP DPT=8080 WINDOW=63349 SYN Unauthorised access (Nov 10) SRC=126.49.120.76 LEN=40 PREC=0x20 TTL=42 ID=214 TCP DPT=8080 WINDOW=63349 SYN Unauthorised access (Nov 8) SRC=126.49.120.76 LEN=40 PREC=0x20 TTL=42 ID=54172 TCP DPT=8080 WINDOW=63349 SYN Unauthorised access (Nov 5) SRC=126.49.120.76 LEN=40 PREC=0x20 TTL=42 ID=20949 TCP DPT=8080 WINDOW=63349 SYN |
2019-11-11 00:57:58 |
| 58.20.129.76 | attackspam | 2019-11-10T16:44:14.980964abusebot-6.cloudsearch.cf sshd\[13963\]: Invalid user aerospacemodeler from 58.20.129.76 port 46820 |
2019-11-11 01:11:24 |
| 222.186.175.147 | attack | Nov 10 18:26:14 h2177944 sshd\[30690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.147 user=root Nov 10 18:26:16 h2177944 sshd\[30690\]: Failed password for root from 222.186.175.147 port 47076 ssh2 Nov 10 18:26:20 h2177944 sshd\[30690\]: Failed password for root from 222.186.175.147 port 47076 ssh2 Nov 10 18:26:23 h2177944 sshd\[30690\]: Failed password for root from 222.186.175.147 port 47076 ssh2 ... |
2019-11-11 01:30:27 |