城市(city): Tokyo
省份(region): Tokyo
国家(country): Japan
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to the following terms of Use. See https://afrinic.net/whois/terms
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '154.16.248.0 - 154.16.249.255'
% Abuse contact for '154.16.248.0 - 154.16.249.255' is 'report@abuseradar.com'
inetnum: 154.16.248.0 - 154.16.249.255
netname: HEFICED-CLOUD-SERVERS
descr: Digital Energy Technologies Limited
country: JP
admin-c: AR834
tech-c: AR834
status: ASSIGNED PA
remarks: Abuse email: report@abuseradar.com
remarks: -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
mnt-by: netutils-mnt
source: AFRINIC # Filtered
parent: 154.16.0.0 - 154.16.255.255
person: Internet Utilities
address: 300 Acacia Rd
address: Darrenwood
address: Randburg, 2195
phone: tel:+44-151-528-5820
abuse-mailbox: report@abuseradar.com
nic-hdl: AR834
mnt-by: netutils-mnt
source: AFRINIC # Filtered
% Information related to '154.16.248.0/24AS61112'
route: 154.16.248.0/24
origin: AS61112
descr: ipxo
mnt-by: NetStack-MNT
source: AFRINIC # Filtered
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 154.16.248.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57767
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;154.16.248.193. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026012401 1800 900 604800 86400
;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 25 09:08:46 CST 2026
;; MSG SIZE rcvd: 107
Host 193.248.16.154.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 193.248.16.154.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 45.117.81.170 | attackspambots | 2020-08-11T12:16:36.429252amanda2.illicoweb.com sshd\[16628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.117.81.170 user=root 2020-08-11T12:16:37.968315amanda2.illicoweb.com sshd\[16628\]: Failed password for root from 45.117.81.170 port 40002 ssh2 2020-08-11T12:22:59.152681amanda2.illicoweb.com sshd\[17132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.117.81.170 user=root 2020-08-11T12:23:00.937519amanda2.illicoweb.com sshd\[17132\]: Failed password for root from 45.117.81.170 port 58546 ssh2 2020-08-11T12:24:44.857784amanda2.illicoweb.com sshd\[17250\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.117.81.170 user=root ... |
2020-08-11 18:51:43 |
| 86.34.240.35 | attackbotsspam | Automatic report - Banned IP Access |
2020-08-11 18:32:49 |
| 202.129.1.202 | attackspam | Port probing on unauthorized port 445 |
2020-08-11 18:54:10 |
| 183.219.101.110 | attackspambots | Dovecot Invalid User Login Attempt. |
2020-08-11 18:50:55 |
| 103.147.10.222 | attackbots | 103.147.10.222 - - [11/Aug/2020:10:56:33 +0200] "GET /wp-login.php HTTP/1.1" 200 6060 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 103.147.10.222 - - [11/Aug/2020:10:56:36 +0200] "POST /wp-login.php HTTP/1.1" 200 6311 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 103.147.10.222 - - [11/Aug/2020:10:56:38 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-08-11 18:33:38 |
| 175.125.95.160 | attackspambots | Aug 11 06:45:24 cosmoit sshd[20016]: Failed password for root from 175.125.95.160 port 33476 ssh2 |
2020-08-11 18:45:00 |
| 159.65.180.64 | attack | Aug 11 08:17:46 cosmoit sshd[25322]: Failed password for root from 159.65.180.64 port 38122 ssh2 |
2020-08-11 18:14:44 |
| 95.147.158.1 | attackbots | Automatic report - Port Scan Attack |
2020-08-11 18:51:14 |
| 69.171.251.25 | attackspambots | [Tue Aug 11 10:49:22.377891 2020] [:error] [pid 19053:tid 140057356908288] [client 69.171.251.25:60932] [client 69.171.251.25] ModSecurity: Access denied with code 403 (phase 2). Match of "eq 0" against "&REQUEST_HEADERS:Transfer-Encoding" required. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "202"] [id "920171"] [msg "GET or HEAD Request with Transfer-Encoding."] [data "1"] [severity "CRITICAL"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/INVALID_HREQ"] [tag "CAPEC-272"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/depan/service-worker-v4.js"] [unique_id "XzIVQsETomSUt8mXut1TBwAAtAM"], referer: https://karangploso.jatim.bmkg.go.id/depan/service-worker-v4.js ... |
2020-08-11 18:27:35 |
| 118.25.44.66 | attack | (sshd) Failed SSH login from 118.25.44.66 (CN/China/-): 5 in the last 3600 secs |
2020-08-11 18:17:36 |
| 125.161.165.129 | attack | sshd: Failed password for .... from 125.161.165.129 port 41962 ssh2 |
2020-08-11 18:49:18 |
| 112.85.42.186 | attack | 2020-08-11T13:13:36.146160lavrinenko.info sshd[10433]: Failed password for root from 112.85.42.186 port 24588 ssh2 2020-08-11T13:13:31.849214lavrinenko.info sshd[10435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.186 user=root 2020-08-11T13:13:33.659214lavrinenko.info sshd[10435]: Failed password for root from 112.85.42.186 port 28268 ssh2 2020-08-11T13:13:35.675661lavrinenko.info sshd[10435]: Failed password for root from 112.85.42.186 port 28268 ssh2 2020-08-11T13:13:38.563589lavrinenko.info sshd[10435]: Failed password for root from 112.85.42.186 port 28268 ssh2 ... |
2020-08-11 18:30:12 |
| 146.88.240.4 | attackspambots | 146.88.240.4 was recorded 16 times by 4 hosts attempting to connect to the following ports: 27017,27018,28015,500,6881,51413,5060. Incident counter (4h, 24h, all-time): 16, 74, 84069 |
2020-08-11 18:31:15 |
| 49.88.112.117 | attackbotsspam | Aug 11 17:04:51 webhost01 sshd[1452]: Failed password for root from 49.88.112.117 port 47042 ssh2 ... |
2020-08-11 18:42:41 |
| 112.166.133.216 | attack | $f2bV_matches |
2020-08-11 18:14:30 |