城市(city): unknown
省份(region): unknown
国家(country): Canada
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 142.100.0.0 - 142.100.255.255
CIDR: 142.100.0.0/16
NetName: CNESST01
NetHandle: NET-142-100-0-0-1
Parent: NET142 (NET-142-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Commission de Sante et de Securite au Travail (CDSEDSAT)
RegDate: 1993-10-21
Updated: 2023-02-14
Ref: https://rdap.arin.net/registry/ip/142.100.0.0
OrgName: Commission de Sante et de Securite au Travail
OrgId: CDSEDSAT
Address: 1600, avenue D'Estimauville
City: Quebec
StateProv: QC
PostalCode: G1J 0H7
Country: CA
RegDate: 1993-10-21
Updated: 2023-02-14
Ref: https://rdap.arin.net/registry/entity/CDSEDSAT
OrgNOCHandle: ADMIN6338-ARIN
OrgNOCName: Admin-142-100-0-0
OrgNOCPhone: +1-418-266-4434
OrgNOCEmail: reseau-perimetre.gr@cnesst.gouv.qc.ca
OrgNOCRef: https://rdap.arin.net/registry/entity/ADMIN6338-ARIN
OrgTechHandle: ADMIN6338-ARIN
OrgTechName: Admin-142-100-0-0
OrgTechPhone: +1-418-266-4434
OrgTechEmail: reseau-perimetre.gr@cnesst.gouv.qc.ca
OrgTechRef: https://rdap.arin.net/registry/entity/ADMIN6338-ARIN
OrgAbuseHandle: ADMIN6338-ARIN
OrgAbuseName: Admin-142-100-0-0
OrgAbusePhone: +1-418-266-4434
OrgAbuseEmail: reseau-perimetre.gr@cnesst.gouv.qc.ca
OrgAbuseRef: https://rdap.arin.net/registry/entity/ADMIN6338-ARIN
RNOCHandle: ADMIN6338-ARIN
RNOCName: Admin-142-100-0-0
RNOCPhone: +1-418-266-4434
RNOCEmail: reseau-perimetre.gr@cnesst.gouv.qc.ca
RNOCRef: https://rdap.arin.net/registry/entity/ADMIN6338-ARIN
RAbuseHandle: ADMIN6338-ARIN
RAbuseName: Admin-142-100-0-0
RAbusePhone: +1-418-266-4434
RAbuseEmail: reseau-perimetre.gr@cnesst.gouv.qc.ca
RAbuseRef: https://rdap.arin.net/registry/entity/ADMIN6338-ARIN
RTechHandle: ADMIN6338-ARIN
RTechName: Admin-142-100-0-0
RTechPhone: +1-418-266-4434
RTechEmail: reseau-perimetre.gr@cnesst.gouv.qc.ca
RTechRef: https://rdap.arin.net/registry/entity/ADMIN6338-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.100.121.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64046
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.100.121.6. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032901 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 13:44:48 CST 2026
;; MSG SIZE rcvd: 106
Host 6.121.100.142.in-addr.arpa. not found: 3(NXDOMAIN)
server can't find 142.100.121.6.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 149.202.160.192 | attack | Aug 18 13:45:57 sso sshd[5309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.160.192 Aug 18 13:45:59 sso sshd[5309]: Failed password for invalid user git from 149.202.160.192 port 50591 ssh2 ... |
2020-08-18 19:52:01 |
| 104.248.158.95 | attackspam | 104.248.158.95 - - [18/Aug/2020:07:01:38 +0100] "POST /wp-login.php HTTP/1.1" 200 2136 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 104.248.158.95 - - [18/Aug/2020:07:01:41 +0100] "POST /wp-login.php HTTP/1.1" 200 2156 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 104.248.158.95 - - [18/Aug/2020:07:01:43 +0100] "POST /wp-login.php HTTP/1.1" 200 2113 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-08-18 19:55:52 |
| 139.59.92.19 | attackspam | Failed password for postgres from 139.59.92.19 port 52552 ssh2 Invalid user ganyi from 139.59.92.19 port 34042 pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.92.19 Invalid user ganyi from 139.59.92.19 port 34042 Failed password for invalid user ganyi from 139.59.92.19 port 34042 ssh2 |
2020-08-18 20:05:12 |
| 222.73.182.137 | attack | k+ssh-bruteforce |
2020-08-18 20:24:24 |
| 97.116.147.67 | attackspam | SSH/22 MH Probe, BF, Hack - |
2020-08-18 20:10:26 |
| 49.255.93.10 | attackbotsspam | Invalid user guest from 49.255.93.10 port 50164 |
2020-08-18 20:23:14 |
| 174.138.43.162 | attackbotsspam | Aug 17 02:05:05 mailrelay sshd[2264]: Invalid user SEIMO99 from 174.138.43.162 port 60394 Aug 17 02:05:05 mailrelay sshd[2264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.43.162 Aug 17 02:05:07 mailrelay sshd[2264]: Failed password for invalid user SEIMO99 from 174.138.43.162 port 60394 ssh2 Aug 17 02:05:07 mailrelay sshd[2264]: Received disconnect from 174.138.43.162 port 60394:11: Bye Bye [preauth] Aug 17 02:05:07 mailrelay sshd[2264]: Disconnected from 174.138.43.162 port 60394 [preauth] Aug 17 02:17:20 mailrelay sshd[2619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.43.162 user=r.r Aug 17 02:17:22 mailrelay sshd[2619]: Failed password for r.r from 174.138.43.162 port 57954 ssh2 Aug 17 02:17:23 mailrelay sshd[2619]: Received disconnect from 174.138.43.162 port 57954:11: Bye Bye [preauth] Aug 17 02:17:23 mailrelay sshd[2619]: Disconnected from 174.138.43.162 port........ ------------------------------- |
2020-08-18 20:09:18 |
| 188.166.150.254 | attack | Aug 18 13:50:14 marvibiene sshd[8447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.150.254 Aug 18 13:50:16 marvibiene sshd[8447]: Failed password for invalid user ftpuser from 188.166.150.254 port 40424 ssh2 Aug 18 13:57:44 marvibiene sshd[8798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.150.254 |
2020-08-18 20:22:52 |
| 118.24.219.30 | attack | Aug 18 13:55:39 [host] sshd[31496]: Invalid user p Aug 18 13:55:39 [host] sshd[31496]: pam_unix(sshd: Aug 18 13:55:42 [host] sshd[31496]: Failed passwor |
2020-08-18 20:13:24 |
| 123.126.106.88 | attack | $f2bV_matches |
2020-08-18 20:27:13 |
| 150.109.100.65 | attackbotsspam | Aug 18 09:07:52 plex-server sshd[3186466]: Invalid user olga from 150.109.100.65 port 36616 Aug 18 09:07:52 plex-server sshd[3186466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.100.65 Aug 18 09:07:52 plex-server sshd[3186466]: Invalid user olga from 150.109.100.65 port 36616 Aug 18 09:07:53 plex-server sshd[3186466]: Failed password for invalid user olga from 150.109.100.65 port 36616 ssh2 Aug 18 09:11:54 plex-server sshd[3188081]: Invalid user admin from 150.109.100.65 port 45346 ... |
2020-08-18 20:21:21 |
| 104.211.167.49 | attack | 2020-08-18T11:40:04.140362mail.standpoint.com.ua sshd[28703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.167.49 2020-08-18T11:40:04.137294mail.standpoint.com.ua sshd[28703]: Invalid user kvm from 104.211.167.49 port 1024 2020-08-18T11:40:06.379010mail.standpoint.com.ua sshd[28703]: Failed password for invalid user kvm from 104.211.167.49 port 1024 ssh2 2020-08-18T11:44:58.753946mail.standpoint.com.ua sshd[29269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.167.49 user=root 2020-08-18T11:45:00.685451mail.standpoint.com.ua sshd[29269]: Failed password for root from 104.211.167.49 port 1024 ssh2 ... |
2020-08-18 19:45:17 |
| 121.201.123.252 | attack | Aug 18 08:17:51 ift sshd\[57961\]: Invalid user minecraft from 121.201.123.252Aug 18 08:17:54 ift sshd\[57961\]: Failed password for invalid user minecraft from 121.201.123.252 port 58926 ssh2Aug 18 08:21:09 ift sshd\[58523\]: Invalid user bi from 121.201.123.252Aug 18 08:21:10 ift sshd\[58523\]: Failed password for invalid user bi from 121.201.123.252 port 50696 ssh2Aug 18 08:24:31 ift sshd\[58751\]: Invalid user docker from 121.201.123.252 ... |
2020-08-18 19:56:55 |
| 188.112.7.125 | attackspam | Brute force attempt |
2020-08-18 20:25:45 |
| 202.70.136.161 | attack | Invalid user semenov from 202.70.136.161 port 60290 |
2020-08-18 19:57:11 |