城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
NetRange: 134.244.0.0 - 134.244.255.255
CIDR: 134.244.0.0/16
NetName: SIEMENS-AG
NetHandle: NET-134-244-0-0-1
Parent: NET134 (NET-134-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Siemens Corporation (SC-40)
RegDate: 1989-08-15
Updated: 2021-12-14
Ref: https://rdap.arin.net/registry/ip/134.244.0.0
OrgName: Siemens Corporation
OrgId: SC-40
Address: 170 Wood Avenue South
City: Iselin
StateProv: NJ
PostalCode: 08830
Country: US
RegDate: 2011-05-03
Updated: 2025-07-04
Ref: https://rdap.arin.net/registry/entity/SC-40
OrgNOCHandle: GEMEI-ARIN
OrgNOCName: Gemeinhardt, Olaf
OrgNOCPhone: +49 173 974 7893
OrgNOCEmail: olaf.gemeinhardt@siemens.com
OrgNOCRef: https://rdap.arin.net/registry/entity/GEMEI-ARIN
OrgTechHandle: GEMEI-ARIN
OrgTechName: Gemeinhardt, Olaf
OrgTechPhone: +49 173 974 7893
OrgTechEmail: olaf.gemeinhardt@siemens.com
OrgTechRef: https://rdap.arin.net/registry/entity/GEMEI-ARIN
OrgTechHandle: MCJR1-ARIN
OrgTechName: Montecinos Cabado, Javier Raul
OrgTechPhone: +351 910095483
OrgTechEmail: javier.montecinos-cabado@siemens.com
OrgTechRef: https://rdap.arin.net/registry/entity/MCJR1-ARIN
OrgAbuseHandle: GEMEI-ARIN
OrgAbuseName: Gemeinhardt, Olaf
OrgAbusePhone: +49 173 974 7893
OrgAbuseEmail: olaf.gemeinhardt@siemens.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/GEMEI-ARIN
RNOCHandle: BILLI139-ARIN
RNOCName: Billios, Georgios
RNOCPhone: +306936888229
RNOCEmail: georgios.billios@siemens.com
RNOCRef: https://rdap.arin.net/registry/entity/BILLI139-ARIN
RTechHandle: BILLI139-ARIN
RTechName: Billios, Georgios
RTechPhone: +306936888229
RTechEmail: georgios.billios@siemens.com
RTechRef: https://rdap.arin.net/registry/entity/BILLI139-ARIN
RAbuseHandle: BILLI139-ARIN
RAbuseName: Billios, Georgios
RAbusePhone: +306936888229
RAbuseEmail: georgios.billios@siemens.com
RAbuseRef: https://rdap.arin.net/registry/entity/BILLI139-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.244.207.156
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42784
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.244.207.156. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025120301 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 04 03:48:12 CST 2025
;; MSG SIZE rcvd: 108
Host 156.207.244.134.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 156.207.244.134.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 91.54.35.199 | attackbotsspam | Lines containing failures of 91.54.35.199 Feb 5 14:25:57 shared05 sshd[3695]: Invalid user pi from 91.54.35.199 port 58582 Feb 5 14:25:57 shared05 sshd[3695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.54.35.199 Feb 5 14:25:57 shared05 sshd[3697]: Invalid user pi from 91.54.35.199 port 58586 Feb 5 14:25:57 shared05 sshd[3697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.54.35.199 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=91.54.35.199 |
2020-02-06 01:41:10 |
| 120.70.103.40 | attackbots | Unauthorized connection attempt detected from IP address 120.70.103.40 to port 2220 [J] |
2020-02-06 01:45:44 |
| 103.110.217.86 | attackspambots | Unauthorized connection attempt from IP address 103.110.217.86 on Port 445(SMB) |
2020-02-06 02:14:20 |
| 181.188.172.30 | attackspambots | Unauthorized connection attempt from IP address 181.188.172.30 on Port 445(SMB) |
2020-02-06 01:53:08 |
| 112.200.1.240 | attackbotsspam | Unauthorized connection attempt detected from IP address 112.200.1.240 to port 445 |
2020-02-06 02:13:46 |
| 142.93.97.100 | attackbots | Honeypot attack, port: 81, PTR: min-extra-scan-202-de-prod.binaryedge.ninja. |
2020-02-06 01:53:30 |
| 162.243.130.244 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-06 02:11:12 |
| 77.247.110.84 | attackbotsspam | SIPVicious Scanner Detection |
2020-02-06 01:39:58 |
| 132.148.129.180 | attack | none |
2020-02-06 01:56:02 |
| 218.106.92.66 | attackbotsspam | Feb 4 11:31:08 finn sshd[20530]: Invalid user boris from 218.106.92.66 port 3425 Feb 4 11:31:08 finn sshd[20530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.106.92.66 Feb 4 11:31:09 finn sshd[20530]: Failed password for invalid user boris from 218.106.92.66 port 3425 ssh2 Feb 4 11:31:11 finn sshd[20530]: Received disconnect from 218.106.92.66 port 3425:11: Bye Bye [preauth] Feb 4 11:31:11 finn sshd[20530]: Disconnected from 218.106.92.66 port 3425 [preauth] Feb 4 11:45:08 finn sshd[23244]: Invalid user swhostnamech from 218.106.92.66 port 11169 Feb 4 11:45:08 finn sshd[23244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.106.92.66 Feb 4 11:45:10 finn sshd[23244]: Failed password for invalid user swhostnamech from 218.106.92.66 port 11169 ssh2 Feb 4 11:45:10 finn sshd[23244]: Received disconnect from 218.106.92.66 port 11169:11: Bye Bye [preauth] Feb 4 11:45:10 finn ........ ------------------------------- |
2020-02-06 01:47:30 |
| 185.19.192.40 | attackbots | Unauthorized connection attempt from IP address 185.19.192.40 on Port 445(SMB) |
2020-02-06 02:10:53 |
| 43.254.45.10 | attack | Feb 5 12:13:12 plusreed sshd[6008]: Invalid user sawczyn from 43.254.45.10 ... |
2020-02-06 02:18:06 |
| 103.90.248.222 | attackspambots | Unauthorized connection attempt detected from IP address 103.90.248.222 to port 2220 [J] |
2020-02-06 01:40:52 |
| 87.253.93.190 | attackbots | Unauthorized connection attempt detected from IP address 87.253.93.190 to port 2220 [J] |
2020-02-06 01:54:46 |
| 77.109.173.12 | attack | 2020-02-05T13:40:41.301693abusebot-2.cloudsearch.cf sshd[13042]: Invalid user test2 from 77.109.173.12 port 51726 2020-02-05T13:40:41.310790abusebot-2.cloudsearch.cf sshd[13042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.109.173.12 2020-02-05T13:40:41.301693abusebot-2.cloudsearch.cf sshd[13042]: Invalid user test2 from 77.109.173.12 port 51726 2020-02-05T13:40:43.082948abusebot-2.cloudsearch.cf sshd[13042]: Failed password for invalid user test2 from 77.109.173.12 port 51726 ssh2 2020-02-05T13:43:16.644520abusebot-2.cloudsearch.cf sshd[13174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.109.173.12 user=root 2020-02-05T13:43:18.361549abusebot-2.cloudsearch.cf sshd[13174]: Failed password for root from 77.109.173.12 port 49956 ssh2 2020-02-05T13:45:54.449924abusebot-2.cloudsearch.cf sshd[13346]: Invalid user riva from 77.109.173.12 port 48178 ... |
2020-02-06 02:04:31 |