城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
NetRange: 10.0.0.0 - 10.255.255.255
CIDR: 10.0.0.0/8
NetName: PRIVATE-ADDRESS-ABLK-RFC1918-IANA-RESERVED
NetHandle: NET-10-0-0-0-1
Parent: ()
NetType: IANA Special Use
OriginAS:
Organization: Internet Assigned Numbers Authority (IANA)
RegDate:
Updated: 2024-05-24
Comment: These addresses are in use by many millions of independently operated networks, which might be as small as a single computer connected to a home gateway, and are automatically configured in hundreds of millions of devices. They are only intended for use within a private context and traffic that needs to cross the Internet will need to use a different, unique address.
Comment:
Comment: These addresses can be used by anyone without any need to coordinate with IANA or an Internet registry. The traffic from these addresses does not come from ICANN or IANA. We are not the source of activity you may see on logs or in e-mail records. Please refer to http://www.iana.org/abuse/answers
Comment:
Comment: These addresses were assigned by the IETF, the organization that develops Internet protocols, in the Best Current Practice document, RFC 1918 which can be found at:
Comment: http://datatracker.ietf.org/doc/rfc1918
Ref: https://rdap.arin.net/registry/ip/10.0.0.0
OrgName: Internet Assigned Numbers Authority
OrgId: IANA
Address: 12025 Waterfront Drive
Address: Suite 300
City: Los Angeles
StateProv: CA
PostalCode: 90292
Country: US
RegDate:
Updated: 2024-05-24
Ref: https://rdap.arin.net/registry/entity/IANA
OrgTechHandle: IANA-IP-ARIN
OrgTechName: ICANN
OrgTechPhone: +1-310-301-5820
OrgTechEmail: abuse@iana.org
OrgTechRef: https://rdap.arin.net/registry/entity/IANA-IP-ARIN
OrgAbuseHandle: IANA-IP-ARIN
OrgAbuseName: ICANN
OrgAbusePhone: +1-310-301-5820
OrgAbuseEmail: abuse@iana.org
OrgAbuseRef: https://rdap.arin.net/registry/entity/IANA-IP-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 10.114.207.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17641
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;10.114.207.157. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025101600 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 16 18:32:31 CST 2025
;; MSG SIZE rcvd: 107
Host 157.207.114.10.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 157.207.114.10.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
78.128.113.66 | attackspam | Mar 4 09:45:30 srv01 postfix/smtpd\[16927\]: warning: unknown\[78.128.113.66\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 4 09:45:37 srv01 postfix/smtpd\[15056\]: warning: unknown\[78.128.113.66\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 4 09:48:40 srv01 postfix/smtpd\[6073\]: warning: unknown\[78.128.113.66\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 4 09:48:47 srv01 postfix/smtpd\[15056\]: warning: unknown\[78.128.113.66\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 4 09:49:25 srv01 postfix/smtpd\[16927\]: warning: unknown\[78.128.113.66\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-03-04 17:02:58 |
106.12.92.170 | attack | Mar 4 05:33:48 ws22vmsma01 sshd[150665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.92.170 Mar 4 05:33:50 ws22vmsma01 sshd[150665]: Failed password for invalid user ovhuser from 106.12.92.170 port 60114 ssh2 ... |
2020-03-04 16:56:02 |
128.199.133.249 | attackspam | (sshd) Failed SSH login from 128.199.133.249 (SG/Singapore/152717.cloudwaysapps.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 4 08:20:32 amsweb01 sshd[28655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.133.249 user=root Mar 4 08:20:34 amsweb01 sshd[28655]: Failed password for root from 128.199.133.249 port 46765 ssh2 Mar 4 08:24:27 amsweb01 sshd[29010]: Invalid user feestballonnen from 128.199.133.249 port 60058 Mar 4 08:24:29 amsweb01 sshd[29010]: Failed password for invalid user feestballonnen from 128.199.133.249 port 60058 ssh2 Mar 4 08:28:20 amsweb01 sshd[29323]: User admin from 128.199.133.249 not allowed because not listed in AllowUsers |
2020-03-04 16:50:26 |
89.128.47.163 | attackspambots | spam |
2020-03-04 16:50:56 |
13.94.205.37 | attackspambots | Mar 4 08:45:56 lnxweb62 sshd[27684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.94.205.37 Mar 4 08:45:58 lnxweb62 sshd[27684]: Failed password for invalid user ftpuser from 13.94.205.37 port 33982 ssh2 Mar 4 08:49:38 lnxweb62 sshd[28853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.94.205.37 |
2020-03-04 17:12:50 |
183.82.121.81 | attack | $f2bV_matches |
2020-03-04 17:16:40 |
23.250.7.86 | attackbotsspam | Mar 4 06:20:43 localhost sshd[43907]: Invalid user postgres from 23.250.7.86 port 40058 Mar 4 06:20:43 localhost sshd[43907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.250.7.86 Mar 4 06:20:43 localhost sshd[43907]: Invalid user postgres from 23.250.7.86 port 40058 Mar 4 06:20:45 localhost sshd[43907]: Failed password for invalid user postgres from 23.250.7.86 port 40058 ssh2 Mar 4 06:24:15 localhost sshd[44253]: Invalid user masespectaculo from 23.250.7.86 port 38796 ... |
2020-03-04 16:39:03 |
192.241.231.16 | attack | " " |
2020-03-04 16:52:25 |
201.182.223.59 | attackspambots | Mar 4 01:33:45 plusreed sshd[14664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.182.223.59 user=root Mar 4 01:33:46 plusreed sshd[14664]: Failed password for root from 201.182.223.59 port 42163 ssh2 ... |
2020-03-04 16:40:48 |
84.33.89.165 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-03-04 17:19:31 |
45.143.220.202 | attackbotsspam | \[2020-03-04 05:48:14\] SECURITY\[2093\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-03-04T05:48:14.278+0100",Severity="Error",Service="SIP",EventVersion="2",AccountID="011199.126.0.204",SessionID="0x7f23bd7caf58",LocalAddress="IPV4/UDP/204.8.216.89/5060",RemoteAddress="IPV4/UDP/45.143.220.202/5076",Challenge="44f4e455",ReceivedChallenge="44f4e455",ReceivedHash="94b4049d111c8c83fc84d00c94ca9137" \[2020-03-04 05:57:17\] SECURITY\[2093\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-03-04T05:57:17.146+0100",Severity="Error",Service="SIP",EventVersion="2",AccountID="9011199.126.0.204",SessionID="0x7f23bd8aa6f8",LocalAddress="IPV4/UDP/204.8.216.89/5060",RemoteAddress="IPV4/UDP/45.143.220.202/5109",Challenge="503b7593",ReceivedChallenge="503b7593",ReceivedHash="541da5e955bcc0ba5c152614920831dc" \[2020-03-04 06:07:26\] SECURITY\[2093\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-03-04T06:07:26.893+0100",Severity="Error",Service= ... |
2020-03-04 16:43:55 |
189.90.255.173 | attackbots | 2020-03-04T06:17:34.680852 sshd[28272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.90.255.173 user=nagios 2020-03-04T06:17:36.662446 sshd[28272]: Failed password for nagios from 189.90.255.173 port 33757 ssh2 2020-03-04T06:24:14.193404 sshd[28358]: Invalid user admin from 189.90.255.173 port 54415 ... |
2020-03-04 16:52:59 |
114.242.117.12 | attack | Mar 4 14:13:53 areeb-Workstation sshd[12656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.242.117.12 Mar 4 14:13:55 areeb-Workstation sshd[12656]: Failed password for invalid user yangzuokun from 114.242.117.12 port 49314 ssh2 ... |
2020-03-04 16:58:47 |
201.236.213.137 | attackbotsspam | 2020-03-04T04:00:40.503462vps773228.ovh.net sshd[15067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.236.213.137 2020-03-04T04:00:40.492437vps773228.ovh.net sshd[15067]: Invalid user michael from 201.236.213.137 port 41213 2020-03-04T04:00:42.179552vps773228.ovh.net sshd[15067]: Failed password for invalid user michael from 201.236.213.137 port 41213 ssh2 2020-03-04T05:15:43.933810vps773228.ovh.net sshd[17149]: Invalid user proftpd from 201.236.213.137 port 59776 2020-03-04T05:15:43.946556vps773228.ovh.net sshd[17149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.236.213.137 2020-03-04T05:15:43.933810vps773228.ovh.net sshd[17149]: Invalid user proftpd from 201.236.213.137 port 59776 2020-03-04T05:15:45.807599vps773228.ovh.net sshd[17149]: Failed password for invalid user proftpd from 201.236.213.137 port 59776 ssh2 2020-03-04T05:34:34.614603vps773228.ovh.net sshd[17683]: pam_unix(sshd:auth): ... |
2020-03-04 16:44:36 |
86.124.98.74 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-03-04 16:39:58 |