城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 10.0.0.0 - 10.255.255.255
CIDR: 10.0.0.0/8
NetName: PRIVATE-ADDRESS-ABLK-RFC1918-IANA-RESERVED
NetHandle: NET-10-0-0-0-1
Parent: ()
NetType: IANA Special Use
OriginAS:
Organization: Internet Assigned Numbers Authority (IANA)
RegDate:
Updated: 2024-05-24
Comment: These addresses are in use by many millions of independently operated networks, which might be as small as a single computer connected to a home gateway, and are automatically configured in hundreds of millions of devices. They are only intended for use within a private context and traffic that needs to cross the Internet will need to use a different, unique address.
Comment:
Comment: These addresses can be used by anyone without any need to coordinate with IANA or an Internet registry. The traffic from these addresses does not come from ICANN or IANA. We are not the source of activity you may see on logs or in e-mail records. Please refer to http://www.iana.org/abuse/answers
Comment:
Comment: These addresses were assigned by the IETF, the organization that develops Internet protocols, in the Best Current Practice document, RFC 1918 which can be found at:
Comment: http://datatracker.ietf.org/doc/rfc1918
Ref: https://rdap.arin.net/registry/ip/10.0.0.0
OrgName: Internet Assigned Numbers Authority
OrgId: IANA
Address: 12025 Waterfront Drive
Address: Suite 300
City: Los Angeles
StateProv: CA
PostalCode: 90292
Country: US
RegDate:
Updated: 2024-05-24
Ref: https://rdap.arin.net/registry/entity/IANA
OrgTechHandle: IANA-IP-ARIN
OrgTechName: ICANN
OrgTechPhone: +1-310-301-5820
OrgTechEmail: abuse@iana.org
OrgTechRef: https://rdap.arin.net/registry/entity/IANA-IP-ARIN
OrgAbuseHandle: IANA-IP-ARIN
OrgAbuseName: ICANN
OrgAbusePhone: +1-310-301-5820
OrgAbuseEmail: abuse@iana.org
OrgAbuseRef: https://rdap.arin.net/registry/entity/IANA-IP-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 10.129.47.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 728
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;10.129.47.199. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026050502 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 06 06:54:17 CST 2026
;; MSG SIZE rcvd: 106
Host 199.47.129.10.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 199.47.129.10.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 59.19.147.198 | attackspambots | Aug 29 04:12:48 [munged] sshd[20182]: Invalid user test from 59.19.147.198 port 43314 Aug 29 04:12:48 [munged] sshd[20182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.19.147.198 |
2019-08-29 10:13:00 |
| 118.24.95.153 | attackspambots | Aug 28 15:15:23 auw2 sshd\[14276\]: Invalid user zabbix from 118.24.95.153 Aug 28 15:15:23 auw2 sshd\[14276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.95.153 Aug 28 15:15:25 auw2 sshd\[14276\]: Failed password for invalid user zabbix from 118.24.95.153 port 35238 ssh2 Aug 28 15:19:51 auw2 sshd\[14648\]: Invalid user ftp from 118.24.95.153 Aug 28 15:19:51 auw2 sshd\[14648\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.95.153 |
2019-08-29 09:41:59 |
| 92.63.194.26 | attackspambots | Aug 29 01:57:18 sshgateway sshd\[1350\]: Invalid user admin from 92.63.194.26 Aug 29 01:57:18 sshgateway sshd\[1350\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.26 Aug 29 01:57:20 sshgateway sshd\[1350\]: Failed password for invalid user admin from 92.63.194.26 port 60310 ssh2 |
2019-08-29 10:06:14 |
| 37.187.248.39 | attackspambots | Aug 29 03:30:20 dedicated sshd[27811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.248.39 user=proxy Aug 29 03:30:23 dedicated sshd[27811]: Failed password for proxy from 37.187.248.39 port 37402 ssh2 |
2019-08-29 09:46:07 |
| 58.97.115.164 | attackbots | SSH login attempts brute force. |
2019-08-29 10:00:40 |
| 138.197.213.233 | attackspam | Aug 29 02:55:24 ArkNodeAT sshd\[12296\]: Invalid user heng from 138.197.213.233 Aug 29 02:55:24 ArkNodeAT sshd\[12296\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.213.233 Aug 29 02:55:26 ArkNodeAT sshd\[12296\]: Failed password for invalid user heng from 138.197.213.233 port 57850 ssh2 |
2019-08-29 09:31:21 |
| 156.96.157.162 | attackspam | \[2019-08-28 20:25:24\] SECURITY\[1837\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-28T20:25:24.779-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="601148422069038",SessionID="0x7f7b3087b658",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/156.96.157.162/55460",ACLName="no_extension_match" \[2019-08-28 20:27:12\] SECURITY\[1837\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-28T20:27:12.043-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="33901148422069038",SessionID="0x7f7b3087b658",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/156.96.157.162/60162",ACLName="no_extension_match" \[2019-08-28 20:27:24\] SECURITY\[1837\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-28T20:27:24.561-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="67201148422069038",SessionID="0x7f7b30db7498",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/156.96.157.162/61131",ACLName= |
2019-08-29 09:39:48 |
| 79.8.245.19 | attack | Aug 29 02:05:39 vps691689 sshd[17566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.8.245.19 Aug 29 02:05:41 vps691689 sshd[17566]: Failed password for invalid user warner from 79.8.245.19 port 49346 ssh2 ... |
2019-08-29 09:32:00 |
| 27.254.41.13 | attackbotsspam | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-28 22:25:22,021 INFO [amun_request_handler] PortScan Detected on Port: 445 (27.254.41.13) |
2019-08-29 09:58:49 |
| 140.249.35.66 | attackbotsspam | Aug 29 03:50:55 eventyay sshd[30904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.35.66 Aug 29 03:50:58 eventyay sshd[30904]: Failed password for invalid user gpadmin from 140.249.35.66 port 42870 ssh2 Aug 29 03:59:52 eventyay sshd[523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.35.66 ... |
2019-08-29 10:13:52 |
| 101.88.85.25 | attackspambots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-28 22:23:39,861 INFO [amun_request_handler] PortScan Detected on Port: 445 (101.88.85.25) |
2019-08-29 10:14:20 |
| 84.121.165.180 | attackspam | Aug 29 02:05:16 eventyay sshd[4285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.121.165.180 Aug 29 02:05:18 eventyay sshd[4285]: Failed password for invalid user billet from 84.121.165.180 port 55502 ssh2 Aug 29 02:09:31 eventyay sshd[5305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.121.165.180 ... |
2019-08-29 09:39:12 |
| 94.183.225.104 | attack | Automatic report - Port Scan Attack |
2019-08-29 09:29:49 |
| 192.99.236.134 | attackspambots | Aug 29 04:08:58 SilenceServices sshd[22652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.236.134 Aug 29 04:09:00 SilenceServices sshd[22652]: Failed password for invalid user ms from 192.99.236.134 port 38534 ssh2 Aug 29 04:12:45 SilenceServices sshd[25563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.236.134 |
2019-08-29 10:15:15 |
| 123.27.242.179 | attackspam | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-28 22:32:00,963 INFO [amun_request_handler] PortScan Detected on Port: 445 (123.27.242.179) |
2019-08-29 09:34:42 |