City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.42.30.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31722
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;125.42.30.40. IN A
;; AUTHORITY SECTION:
. 95 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400
;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 19:32:48 CST 2022
;; MSG SIZE rcvd: 105
40.30.42.125.in-addr.arpa domain name pointer hn.kd.ny.adsl.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
40.30.42.125.in-addr.arpa name = hn.kd.ny.adsl.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 2600:3c03::f03c:91ff:fe59:f51 | attackspambots | This IP address was blacklisted for the following reason: /de/jobs/ @ 2019-09-13T08:36:53+02:00. |
2019-09-14 01:14:17 |
| 114.143.158.30 | attack | Sep 13 12:43:10 plusreed sshd[6159]: Invalid user test from 114.143.158.30 ... |
2019-09-14 00:44:28 |
| 72.11.168.29 | attackspam | Automatic report - Banned IP Access |
2019-09-14 01:10:29 |
| 121.12.151.250 | attackspam | Invalid user mes from 121.12.151.250 port 53066 |
2019-09-14 01:51:25 |
| 51.38.186.207 | attackspambots | Sep 13 17:54:40 microserver sshd[6808]: Invalid user 1q2w3e4r from 51.38.186.207 port 55522 Sep 13 17:54:40 microserver sshd[6808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.207 Sep 13 17:54:42 microserver sshd[6808]: Failed password for invalid user 1q2w3e4r from 51.38.186.207 port 55522 ssh2 Sep 13 17:58:48 microserver sshd[7398]: Invalid user passw0rd from 51.38.186.207 port 46148 Sep 13 17:58:48 microserver sshd[7398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.207 Sep 13 18:11:13 microserver sshd[9238]: Invalid user 1234 from 51.38.186.207 port 46594 Sep 13 18:11:13 microserver sshd[9238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.207 Sep 13 18:11:15 microserver sshd[9238]: Failed password for invalid user 1234 from 51.38.186.207 port 46594 ssh2 Sep 13 18:15:27 microserver sshd[9597]: Invalid user csadmin from 51.38.186.207 port 37044 Sep 1 |
2019-09-14 00:46:15 |
| 119.254.155.187 | attackspam | Sep 13 12:01:30 TORMINT sshd\[12322\]: Invalid user steam from 119.254.155.187 Sep 13 12:01:30 TORMINT sshd\[12322\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.254.155.187 Sep 13 12:01:32 TORMINT sshd\[12322\]: Failed password for invalid user steam from 119.254.155.187 port 1735 ssh2 ... |
2019-09-14 01:44:22 |
| 182.75.176.107 | attackbots | 445/tcp 445/tcp 445/tcp... [2019-07-20/09-13]14pkt,1pt.(tcp) |
2019-09-14 00:54:47 |
| 36.71.34.110 | attackbots | Unauthorized connection attempt from IP address 36.71.34.110 on Port 445(SMB) |
2019-09-14 01:21:22 |
| 211.234.99.140 | attackbotsspam | scan z |
2019-09-14 00:50:35 |
| 85.144.226.170 | attack | Sep 13 06:58:37 auw2 sshd\[25960\]: Invalid user jenkins from 85.144.226.170 Sep 13 06:58:37 auw2 sshd\[25960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170-226-144-85.ftth.glasoperator.nl Sep 13 06:58:39 auw2 sshd\[25960\]: Failed password for invalid user jenkins from 85.144.226.170 port 43716 ssh2 Sep 13 07:03:28 auw2 sshd\[26386\]: Invalid user nagios from 85.144.226.170 Sep 13 07:03:28 auw2 sshd\[26386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170-226-144-85.ftth.glasoperator.nl |
2019-09-14 01:08:27 |
| 165.227.203.162 | attackbots | $f2bV_matches |
2019-09-14 00:58:17 |
| 117.254.82.146 | attackbotsspam | 445/tcp 445/tcp 445/tcp... [2019-08-11/09-13]5pkt,1pt.(tcp) |
2019-09-14 01:52:04 |
| 95.160.17.142 | attackspambots | Sent mail to target address hacked/leaked from abandonia in 2016 |
2019-09-14 01:05:12 |
| 59.93.196.133 | attack | Unauthorized connection attempt from IP address 59.93.196.133 on Port 445(SMB) |
2019-09-14 00:45:32 |
| 106.12.48.30 | attackspam | Sep 13 05:57:14 lcprod sshd\[32586\]: Invalid user sammy from 106.12.48.30 Sep 13 05:57:14 lcprod sshd\[32586\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.48.30 Sep 13 05:57:15 lcprod sshd\[32586\]: Failed password for invalid user sammy from 106.12.48.30 port 48366 ssh2 Sep 13 06:02:48 lcprod sshd\[622\]: Invalid user admin from 106.12.48.30 Sep 13 06:02:48 lcprod sshd\[622\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.48.30 |
2019-09-14 01:23:35 |