城市(city): Valencia
省份(region): Comunidad Valenciana
国家(country): Spain
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 158.42.0.0 - 158.43.255.255
CIDR: 158.42.0.0/15
NetName: RIPE-ERX-158-41-0-0
NetHandle: NET-158-42-0-0-1
Parent: NET158 (NET-158-0-0-0-0)
NetType: Early Registrations, Transferred to RIPE NCC
OriginAS:
Organization: RIPE Network Coordination Centre (RIPE)
RegDate: 2003-10-15
Updated: 2025-02-10
Comment: These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref: https://rdap.arin.net/registry/ip/158.42.0.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois.ripe.net
OrgName: RIPE Network Coordination Centre
OrgId: RIPE
Address: P.O. Box 10096
City: Amsterdam
StateProv:
PostalCode: 1001EB
Country: NL
RegDate:
Updated: 2013-07-29
Ref: https://rdap.arin.net/registry/entity/RIPE
ReferralServer: whois.ripe.net
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName: Abuse Contact
OrgAbusePhone: +31205354444
OrgAbuseEmail: abuse@ripe.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3850-ARIN
OrgTechHandle: RNO29-ARIN
OrgTechName: RIPE NCC Operations
OrgTechPhone: +31 20 535 4444
OrgTechEmail: hostmaster@ripe.net
OrgTechRef: https://rdap.arin.net/registry/entity/RNO29-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.42.246.155
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56012
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;158.42.246.155. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031900 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 19 20:00:53 CST 2026
;; MSG SIZE rcvd: 107
155.246.42.158.in-addr.arpa domain name pointer vpn246-155.vpns.upv.es.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
155.246.42.158.in-addr.arpa name = vpn246-155.vpns.upv.es.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 111.161.41.156 | attackbotsspam | $f2bV_matches |
2020-03-27 04:02:43 |
| 106.54.98.89 | attackspam | Mar 26 17:06:51 *** sshd[30837]: Invalid user unitedlinux from 106.54.98.89 |
2020-03-27 04:08:42 |
| 115.186.148.38 | attack | SSH Brute-Force Attack |
2020-03-27 04:13:55 |
| 14.186.179.69 | attackbots | Mar 26 13:03:44 tux sshd[20448]: Address 14.186.179.69 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Mar 26 13:03:44 tux sshd[20448]: Invalid user admin from 14.186.179.69 Mar 26 13:03:44 tux sshd[20448]: Connection closed by 14.186.179.69 [preauth] Mar 26 13:03:51 tux sshd[20450]: Address 14.186.179.69 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Mar 26 13:03:51 tux sshd[20450]: Invalid user admin from 14.186.179.69 Mar 26 13:03:51 tux sshd[20450]: Connection closed by 14.186.179.69 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=14.186.179.69 |
2020-03-27 03:37:51 |
| 116.233.202.252 | attackbotsspam | Honeypot attack, port: 445, PTR: PTR record not found |
2020-03-27 03:38:05 |
| 92.118.161.29 | attack | 444/tcp 5000/tcp 2483/tcp... [2020-01-25/03-25]47pkt,34pt.(tcp),3pt.(udp),1tp.(icmp) |
2020-03-27 03:48:09 |
| 92.118.161.25 | attackbots | ICMP MH Probe, Scan /Distributed - |
2020-03-27 03:51:56 |
| 159.203.184.54 | attackspambots | Automatic report - XMLRPC Attack |
2020-03-27 03:46:13 |
| 106.12.105.193 | attackbots | (sshd) Failed SSH login from 106.12.105.193 (CN/China/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 26 20:30:50 ubnt-55d23 sshd[30869]: Invalid user earlene from 106.12.105.193 port 56574 Mar 26 20:30:51 ubnt-55d23 sshd[30869]: Failed password for invalid user earlene from 106.12.105.193 port 56574 ssh2 |
2020-03-27 03:38:56 |
| 122.142.235.222 | attackspam | Unauthorised access (Mar 26) SRC=122.142.235.222 LEN=40 TTL=49 ID=56671 TCP DPT=8080 WINDOW=36270 SYN Unauthorised access (Mar 26) SRC=122.142.235.222 LEN=40 TTL=49 ID=48945 TCP DPT=8080 WINDOW=18799 SYN Unauthorised access (Mar 25) SRC=122.142.235.222 LEN=40 TTL=49 ID=14464 TCP DPT=8080 WINDOW=18799 SYN Unauthorised access (Mar 25) SRC=122.142.235.222 LEN=40 TTL=49 ID=44738 TCP DPT=8080 WINDOW=18799 SYN Unauthorised access (Mar 25) SRC=122.142.235.222 LEN=40 TTL=49 ID=41200 TCP DPT=8080 WINDOW=18799 SYN Unauthorised access (Mar 24) SRC=122.142.235.222 LEN=40 TTL=49 ID=52746 TCP DPT=8080 WINDOW=18799 SYN |
2020-03-27 04:08:29 |
| 183.129.141.44 | attackbots | Invalid user server from 183.129.141.44 port 43836 |
2020-03-27 03:58:15 |
| 114.99.31.108 | attack | - |
2020-03-27 04:11:48 |
| 92.118.161.13 | attackbotsspam | " " |
2020-03-27 04:03:16 |
| 172.247.123.16 | attackspambots | Mar 26 13:14:44 Ubuntu-1404-trusty-64-minimal sshd\[25882\]: Invalid user iepure from 172.247.123.16 Mar 26 13:14:44 Ubuntu-1404-trusty-64-minimal sshd\[25882\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.247.123.16 Mar 26 13:14:45 Ubuntu-1404-trusty-64-minimal sshd\[25882\]: Failed password for invalid user iepure from 172.247.123.16 port 46880 ssh2 Mar 26 13:34:14 Ubuntu-1404-trusty-64-minimal sshd\[6930\]: Invalid user eugene from 172.247.123.16 Mar 26 13:34:14 Ubuntu-1404-trusty-64-minimal sshd\[6930\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.247.123.16 |
2020-03-27 03:40:23 |
| 196.223.154.66 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-03-27 03:48:54 |