城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
NetRange: 10.0.0.0 - 10.255.255.255
CIDR: 10.0.0.0/8
NetName: PRIVATE-ADDRESS-ABLK-RFC1918-IANA-RESERVED
NetHandle: NET-10-0-0-0-1
Parent: ()
NetType: IANA Special Use
OriginAS:
Organization: Internet Assigned Numbers Authority (IANA)
RegDate:
Updated: 2024-05-24
Comment: These addresses are in use by many millions of independently operated networks, which might be as small as a single computer connected to a home gateway, and are automatically configured in hundreds of millions of devices. They are only intended for use within a private context and traffic that needs to cross the Internet will need to use a different, unique address.
Comment:
Comment: These addresses can be used by anyone without any need to coordinate with IANA or an Internet registry. The traffic from these addresses does not come from ICANN or IANA. We are not the source of activity you may see on logs or in e-mail records. Please refer to http://www.iana.org/abuse/answers
Comment:
Comment: These addresses were assigned by the IETF, the organization that develops Internet protocols, in the Best Current Practice document, RFC 1918 which can be found at:
Comment: http://datatracker.ietf.org/doc/rfc1918
Ref: https://rdap.arin.net/registry/ip/10.0.0.0
OrgName: Internet Assigned Numbers Authority
OrgId: IANA
Address: 12025 Waterfront Drive
Address: Suite 300
City: Los Angeles
StateProv: CA
PostalCode: 90292
Country: US
RegDate:
Updated: 2024-05-24
Ref: https://rdap.arin.net/registry/entity/IANA
OrgTechHandle: IANA-IP-ARIN
OrgTechName: ICANN
OrgTechPhone: +1-310-301-5820
OrgTechEmail: abuse@iana.org
OrgTechRef: https://rdap.arin.net/registry/entity/IANA-IP-ARIN
OrgAbuseHandle: IANA-IP-ARIN
OrgAbuseName: ICANN
OrgAbusePhone: +1-310-301-5820
OrgAbuseEmail: abuse@iana.org
OrgAbuseRef: https://rdap.arin.net/registry/entity/IANA-IP-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 10.148.111.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24952
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;10.148.111.105. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025113001 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 01 11:58:09 CST 2025
;; MSG SIZE rcvd: 107
Host 105.111.148.10.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 105.111.148.10.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 115.153.102.109 | attack | Unauthorized connection attempt detected from IP address 115.153.102.109 to port 445 |
2020-01-01 04:10:06 |
| 106.0.7.201 | attack | Unauthorized connection attempt detected from IP address 106.0.7.201 to port 1433 |
2020-01-01 04:13:47 |
| 183.90.142.38 | attackbots | Unauthorized connection attempt detected from IP address 183.90.142.38 to port 12917 |
2020-01-01 04:00:05 |
| 27.2.241.18 | attack | Unauthorized connection attempt detected from IP address 27.2.241.18 to port 5555 |
2020-01-01 04:21:37 |
| 183.80.15.56 | attackspambots | Unauthorized connection attempt detected from IP address 183.80.15.56 to port 23 |
2020-01-01 04:01:33 |
| 118.187.58.213 | attackspambots | Unauthorized connection attempt detected from IP address 118.187.58.213 to port 1433 |
2020-01-01 04:08:25 |
| 106.248.202.75 | attackspambots | Unauthorized connection attempt detected from IP address 106.248.202.75 to port 5555 |
2020-01-01 04:12:23 |
| 89.248.172.90 | attackbotsspam | Unauthorized connection attempt detected from IP address 89.248.172.90 to port 1080 |
2020-01-01 04:15:26 |
| 42.112.101.207 | attackbots | Unauthorized connection attempt detected from IP address 42.112.101.207 to port 23 |
2020-01-01 04:20:20 |
| 91.225.79.162 | attackbots | Unauthorized connection attempt detected from IP address 91.225.79.162 to port 23 |
2020-01-01 04:15:10 |
| 112.255.28.183 | attackspambots | Dec 31 20:27:29 debian-2gb-nbg1-2 kernel: \[79782.851635\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=112.255.28.183 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=231 ID=10239 PROTO=TCP SPT=51595 DPT=1433 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-01-01 04:10:43 |
| 58.56.0.28 | attackspam | Unauthorized connection attempt detected from IP address 58.56.0.28 to port 1433 |
2020-01-01 03:50:12 |
| 49.81.173.36 | attackspambots | Unauthorized connection attempt detected from IP address 49.81.173.36 to port 23 |
2020-01-01 04:18:34 |
| 222.74.94.190 | attackbots | Unauthorized connection attempt detected from IP address 222.74.94.190 to port 1433 |
2020-01-01 04:23:32 |
| 58.219.130.178 | attack | Unauthorized connection attempt detected from IP address 58.219.130.178 to port 2222 |
2020-01-01 04:17:56 |