城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 10.0.0.0 - 10.255.255.255
CIDR: 10.0.0.0/8
NetName: PRIVATE-ADDRESS-ABLK-RFC1918-IANA-RESERVED
NetHandle: NET-10-0-0-0-1
Parent: ()
NetType: IANA Special Use
OriginAS:
Organization: Internet Assigned Numbers Authority (IANA)
RegDate:
Updated: 2024-05-24
Comment: These addresses are in use by many millions of independently operated networks, which might be as small as a single computer connected to a home gateway, and are automatically configured in hundreds of millions of devices. They are only intended for use within a private context and traffic that needs to cross the Internet will need to use a different, unique address.
Comment:
Comment: These addresses can be used by anyone without any need to coordinate with IANA or an Internet registry. The traffic from these addresses does not come from ICANN or IANA. We are not the source of activity you may see on logs or in e-mail records. Please refer to http://www.iana.org/abuse/answers
Comment:
Comment: These addresses were assigned by the IETF, the organization that develops Internet protocols, in the Best Current Practice document, RFC 1918 which can be found at:
Comment: http://datatracker.ietf.org/doc/rfc1918
Ref: https://rdap.arin.net/registry/ip/10.0.0.0
OrgName: Internet Assigned Numbers Authority
OrgId: IANA
Address: 12025 Waterfront Drive
Address: Suite 300
City: Los Angeles
StateProv: CA
PostalCode: 90292
Country: US
RegDate:
Updated: 2024-05-24
Ref: https://rdap.arin.net/registry/entity/IANA
OrgTechHandle: IANA-IP-ARIN
OrgTechName: ICANN
OrgTechPhone: +1-310-301-5820
OrgTechEmail: abuse@iana.org
OrgTechRef: https://rdap.arin.net/registry/entity/IANA-IP-ARIN
OrgAbuseHandle: IANA-IP-ARIN
OrgAbuseName: ICANN
OrgAbusePhone: +1-310-301-5820
OrgAbuseEmail: abuse@iana.org
OrgAbuseRef: https://rdap.arin.net/registry/entity/IANA-IP-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 10.61.133.228
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49417
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;10.61.133.228. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026033101 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 01 00:00:23 CST 2026
;; MSG SIZE rcvd: 106
Host 228.133.61.10.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 228.133.61.10.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 103.219.143.206 | attackspam | Unauthorized connection attempt detected from IP address 103.219.143.206 to port 8080 [J] |
2020-01-31 01:29:32 |
| 51.254.114.105 | attack | Unauthorized connection attempt detected from IP address 51.254.114.105 to port 2220 [J] |
2020-01-31 01:12:04 |
| 41.190.226.190 | attack | Unauthorized connection attempt detected from IP address 41.190.226.190 to port 1433 [J] |
2020-01-31 00:50:57 |
| 101.200.210.27 | attack | Unauthorized connection attempt detected from IP address 101.200.210.27 to port 8545 [J] |
2020-01-31 01:30:28 |
| 3.81.84.104 | attack | Unauthorized connection attempt detected from IP address 3.81.84.104 to port 3306 [J] |
2020-01-31 00:51:45 |
| 103.23.237.239 | attackspam | Unauthorized connection attempt detected from IP address 103.23.237.239 to port 80 [J] |
2020-01-31 01:08:03 |
| 200.194.31.140 | attack | Unauthorized connection attempt detected from IP address 200.194.31.140 to port 23 [J] |
2020-01-31 01:18:46 |
| 118.70.123.224 | attackspambots | Unauthorized connection attempt detected from IP address 118.70.123.224 to port 23 [J] |
2020-01-31 01:05:05 |
| 186.155.9.193 | attackbotsspam | Unauthorized connection attempt detected from IP address 186.155.9.193 to port 81 [J] |
2020-01-31 01:21:35 |
| 190.13.138.164 | attackbotsspam | Unauthorized connection attempt detected from IP address 190.13.138.164 to port 23 [J] |
2020-01-31 01:20:00 |
| 201.109.2.35 | attack | Unauthorized connection attempt detected from IP address 201.109.2.35 to port 23 [J] |
2020-01-31 00:54:36 |
| 78.170.217.164 | attackbots | Unauthorized connection attempt detected from IP address 78.170.217.164 to port 23 [J] |
2020-01-31 01:10:20 |
| 176.41.144.198 | attack | Unauthorized connection attempt detected from IP address 176.41.144.198 to port 8000 [J] |
2020-01-31 00:59:55 |
| 83.3.93.154 | attackbotsspam | Unauthorized connection attempt detected from IP address 83.3.93.154 to port 2220 [J] |
2020-01-31 01:32:16 |
| 176.205.32.40 | attack | Unauthorized connection attempt detected from IP address 176.205.32.40 to port 22 [J] |
2020-01-31 00:59:32 |