城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 100.64.0.0 - 100.127.255.255
CIDR: 100.64.0.0/10
NetName: SHARED-ADDRESS-SPACE-RFC6598-IANA-RESERVED
NetHandle: NET-100-64-0-0-1
Parent: NET100 (NET-100-0-0-0-0)
NetType: IANA Special Use
OriginAS:
Organization: Internet Assigned Numbers Authority (IANA)
RegDate: 2012-03-13
Updated: 2024-05-24
Comment: This block is used as Shared Address Space. Traffic from these addresses does not come from IANA. IANA has simply reserved these numbers in its database and does not use or operate them. We are not the source of activity you may see on logs or in e-mail records. Please refer to http://www.iana.org/abuse/
Comment:
Comment: Shared Address Space can only be used in Service Provider networks or on routing equipment that is able to do address translation across router interfaces when addresses are identical on two different interfaces.
Comment:
Comment: This block was assigned by the IETF in the Best Current Practice document,
Comment: RFC 6598 which can be found at:
Comment: http://tools.ietf.org/html/rfc6598
Ref: https://rdap.arin.net/registry/ip/100.64.0.0
OrgName: Internet Assigned Numbers Authority
OrgId: IANA
Address: 12025 Waterfront Drive
Address: Suite 300
City: Los Angeles
StateProv: CA
PostalCode: 90292
Country: US
RegDate:
Updated: 2024-05-24
Ref: https://rdap.arin.net/registry/entity/IANA
OrgAbuseHandle: IANA-IP-ARIN
OrgAbuseName: ICANN
OrgAbusePhone: +1-310-301-5820
OrgAbuseEmail: abuse@iana.org
OrgAbuseRef: https://rdap.arin.net/registry/entity/IANA-IP-ARIN
OrgTechHandle: IANA-IP-ARIN
OrgTechName: ICANN
OrgTechPhone: +1-310-301-5820
OrgTechEmail: abuse@iana.org
OrgTechRef: https://rdap.arin.net/registry/entity/IANA-IP-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 100.99.100.205
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2460
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;100.99.100.205. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032502 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 26 10:44:03 CST 2026
;; MSG SIZE rcvd: 107
Host 205.100.99.100.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 205.100.99.100.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 201.77.124.248 | attackbotsspam | SSH authentication failure x 6 reported by Fail2Ban ... |
2020-06-20 00:40:53 |
| 162.248.16.14 | attack | 21 attempts against mh-misbehave-ban on leaf |
2020-06-19 23:59:46 |
| 174.35.25.129 | attack | Jun 19 17:56:10 localhost sshd\[26820\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.35.25.129 user=root Jun 19 17:56:11 localhost sshd\[26820\]: Failed password for root from 174.35.25.129 port 45238 ssh2 Jun 19 17:59:34 localhost sshd\[26911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.35.25.129 user=root Jun 19 17:59:37 localhost sshd\[26911\]: Failed password for root from 174.35.25.129 port 45126 ssh2 Jun 19 18:03:04 localhost sshd\[27140\]: Invalid user rik from 174.35.25.129 ... |
2020-06-20 00:12:45 |
| 88.149.248.9 | attackspam | 2020-06-19T14:31:36+0200 Failed SSH Authentication/Brute Force Attack. (Server 9) |
2020-06-20 00:26:05 |
| 222.186.175.150 | attackspambots | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.150 user=root Failed password for root from 222.186.175.150 port 29974 ssh2 Failed password for root from 222.186.175.150 port 29974 ssh2 Failed password for root from 222.186.175.150 port 29974 ssh2 Failed password for root from 222.186.175.150 port 29974 ssh2 |
2020-06-20 00:04:14 |
| 182.61.6.64 | attack | Jun 19 14:24:03 mailserver sshd\[13884\]: Invalid user prova from 182.61.6.64 ... |
2020-06-20 00:12:17 |
| 141.98.81.42 | attackspambots | Jun 19 15:56:41 scw-6657dc sshd[28087]: Failed password for root from 141.98.81.42 port 2793 ssh2 Jun 19 15:56:41 scw-6657dc sshd[28087]: Failed password for root from 141.98.81.42 port 2793 ssh2 Jun 19 15:56:54 scw-6657dc sshd[28126]: Invalid user guest from 141.98.81.42 port 6779 ... |
2020-06-20 00:19:53 |
| 45.148.10.60 | attackbotsspam | 'IP reached maximum auth failures for a one day block' |
2020-06-20 00:28:35 |
| 42.123.99.67 | attackbotsspam | Jun 19 14:26:49 OPSO sshd\[8940\]: Invalid user mdk from 42.123.99.67 port 60620 Jun 19 14:26:49 OPSO sshd\[8940\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.123.99.67 Jun 19 14:26:52 OPSO sshd\[8940\]: Failed password for invalid user mdk from 42.123.99.67 port 60620 ssh2 Jun 19 14:30:49 OPSO sshd\[9761\]: Invalid user hui from 42.123.99.67 port 50338 Jun 19 14:30:49 OPSO sshd\[9761\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.123.99.67 |
2020-06-20 00:40:13 |
| 185.220.101.211 | attackspambots | Invalid user domainspeicher from 185.220.101.211 port 29980 |
2020-06-20 00:22:49 |
| 46.101.81.132 | attackspambots | Automatic report - Banned IP Access |
2020-06-19 23:57:08 |
| 103.131.71.61 | attackspambots | (mod_security) mod_security (id:210730) triggered by 103.131.71.61 (VN/Vietnam/bot-103-131-71-61.coccoc.com): 5 in the last 3600 secs |
2020-06-20 00:21:51 |
| 141.98.81.209 | attackbotsspam | 2020-06-19T17:12:11.474291vps751288.ovh.net sshd\[8839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.209 user=root 2020-06-19T17:12:13.316531vps751288.ovh.net sshd\[8839\]: Failed password for root from 141.98.81.209 port 32749 ssh2 2020-06-19T17:12:27.112368vps751288.ovh.net sshd\[8863\]: Invalid user admin from 141.98.81.209 port 26439 2020-06-19T17:12:27.128882vps751288.ovh.net sshd\[8863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.209 2020-06-19T17:12:29.166711vps751288.ovh.net sshd\[8863\]: Failed password for invalid user admin from 141.98.81.209 port 26439 ssh2 |
2020-06-20 00:03:03 |
| 222.186.180.17 | attackbotsspam | Jun 18 11:08:04 mail sshd[8698]: Failed password for root from 222.186.180.17 port 3242 ssh2 Jun 18 11:08:10 mail sshd[8698]: Failed password for root from 222.186.180.17 port 3242 ssh2 ... |
2020-06-20 00:00:32 |
| 37.229.196.223 | attackspam | 0,33-02/22 [bc01/m18] PostRequest-Spammer scoring: brussels |
2020-06-20 00:10:23 |