城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 40.165.242.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12441
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;40.165.242.21. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025062800 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 23:20:58 CST 2025
;; MSG SIZE rcvd: 106
Host 21.242.165.40.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 21.242.165.40.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 212.64.71.254 | attackspam | SSH Brute Force |
2020-08-29 02:44:15 |
| 68.183.90.130 | attackbots | Aug 28 18:33:29 ovpn sshd\[16305\]: Invalid user user from 68.183.90.130 Aug 28 18:33:29 ovpn sshd\[16305\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.90.130 Aug 28 18:33:32 ovpn sshd\[16305\]: Failed password for invalid user user from 68.183.90.130 port 54418 ssh2 Aug 28 18:42:06 ovpn sshd\[18409\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.90.130 user=root Aug 28 18:42:08 ovpn sshd\[18409\]: Failed password for root from 68.183.90.130 port 60274 ssh2 |
2020-08-29 02:32:09 |
| 93.190.51.122 | attackspam | 2020-08-28 12:24:53.204680-0500 localhost smtpd[59740]: NOQUEUE: reject: RCPT from unknown[93.190.51.122]: 554 5.7.1 Service unavailable; Client host [93.190.51.122] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/93.190.51.122 / https://www.spamhaus.org/sbl/query/SBLCSS; from= |
2020-08-29 02:46:28 |
| 194.180.224.130 | attackspambots | Aug 28 18:32:09 124388 sshd[23646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.180.224.130 user=root Aug 28 18:32:11 124388 sshd[23646]: Failed password for root from 194.180.224.130 port 48168 ssh2 Aug 28 18:32:09 124388 sshd[23645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.180.224.130 Aug 28 18:32:07 124388 sshd[23645]: Invalid user admin from 194.180.224.130 port 48172 Aug 28 18:32:11 124388 sshd[23645]: Failed password for invalid user admin from 194.180.224.130 port 48172 ssh2 |
2020-08-29 02:32:51 |
| 138.68.178.64 | attack | Aug 28 18:16:47 scw-focused-cartwright sshd[10733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.178.64 Aug 28 18:16:49 scw-focused-cartwright sshd[10733]: Failed password for invalid user huawei from 138.68.178.64 port 51162 ssh2 |
2020-08-29 02:25:01 |
| 190.63.172.146 | attack | Unauthorized connection attempt from IP address 190.63.172.146 on Port 445(SMB) |
2020-08-29 02:44:52 |
| 165.22.239.44 | attackbots | Invalid user gerrit from 165.22.239.44 port 52510 |
2020-08-29 02:24:40 |
| 222.92.139.158 | attack | Aug 28 20:04:53 [host] sshd[5340]: Invalid user tz Aug 28 20:04:53 [host] sshd[5340]: pam_unix(sshd:a Aug 28 20:04:59 [host] sshd[5340]: Failed password |
2020-08-29 02:37:05 |
| 51.68.251.202 | attackbots | 2020-08-28T11:19:46.711437sorsha.thespaminator.com sshd[543]: Invalid user jds from 51.68.251.202 port 52692 2020-08-28T11:19:48.921130sorsha.thespaminator.com sshd[543]: Failed password for invalid user jds from 51.68.251.202 port 52692 ssh2 ... |
2020-08-29 02:21:53 |
| 154.117.186.237 | attack | Unauthorized connection attempt from IP address 154.117.186.237 on port 3389 |
2020-08-29 02:43:27 |
| 41.35.241.132 | attackspambots | Unauthorized connection attempt from IP address 41.35.241.132 on Port 445(SMB) |
2020-08-29 02:54:06 |
| 84.42.226.22 | attack | 2020-08-28 06:57:12.090030-0500 localhost smtpd[33939]: NOQUEUE: reject: RCPT from static-84-42-226-22.net.upcbroadband.cz[84.42.226.22]: 554 5.7.1 Service unavailable; Client host [84.42.226.22] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/84.42.226.22; from= |
2020-08-29 02:49:18 |
| 189.240.225.205 | attackbots | 2020-08-28T19:30:42.390074mail.broermann.family sshd[9237]: Invalid user aaaaa from 189.240.225.205 port 37212 2020-08-28T19:30:42.394506mail.broermann.family sshd[9237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.240.225.205 2020-08-28T19:30:42.390074mail.broermann.family sshd[9237]: Invalid user aaaaa from 189.240.225.205 port 37212 2020-08-28T19:30:43.920991mail.broermann.family sshd[9237]: Failed password for invalid user aaaaa from 189.240.225.205 port 37212 ssh2 2020-08-28T19:34:19.304367mail.broermann.family sshd[9360]: Invalid user cs from 189.240.225.205 port 44342 ... |
2020-08-29 02:16:45 |
| 162.144.62.164 | attack | 2020-08-28 12:35:05.534219-0500 localhost smtpd[59978]: NOQUEUE: reject: RCPT from unknown[162.144.62.164]: 450 4.7.25 Client host rejected: cannot find your hostname, [162.144.62.164]; from= |
2020-08-29 02:51:53 |
| 181.126.83.125 | attack | Aug 28 14:16:41 abendstille sshd\[1977\]: Invalid user user1 from 181.126.83.125 Aug 28 14:16:41 abendstille sshd\[1977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.126.83.125 Aug 28 14:16:44 abendstille sshd\[1977\]: Failed password for invalid user user1 from 181.126.83.125 port 57108 ssh2 Aug 28 14:20:56 abendstille sshd\[6150\]: Invalid user teamspeak from 181.126.83.125 Aug 28 14:20:56 abendstille sshd\[6150\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.126.83.125 ... |
2020-08-29 02:29:34 |