城市(city): Chicago
省份(region): Illinois
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 164.155.0.0 - 164.155.255.255
CIDR: 164.155.0.0/16
NetName: AFRINIC-164-155-0-0
NetHandle: NET-164-155-0-0-1
Parent: NET164 (NET-164-0-0-0-0)
NetType: Transferred to AfriNIC
OriginAS:
Organization: African Network Information Center (AFRINIC)
RegDate: 2005-02-21
Updated: 2005-02-21
Comment: This IP address range is under AFRINIC responsibility.
Comment: Please see http://www.afrinic.net/ for further details,
Comment: or check the WHOIS server located at whois.afrinic.net.
Ref: https://rdap.arin.net/registry/ip/164.155.0.0
ResourceLink: http://afrinic.net/en/services/whois-query
ResourceLink: whois.afrinic.net
OrgName: African Network Information Center
OrgId: AFRINIC
Address: Level 11ABC
Address: Raffles Tower
Address: Lot 19, Cybercity
City: Ebene
StateProv:
PostalCode:
Country: MU
RegDate: 2004-05-17
Updated: 2015-05-04
Comment: AfriNIC - http://www.afrinic.net
Comment: The African & Indian Ocean Internet Registry
Ref: https://rdap.arin.net/registry/entity/AFRINIC
ReferralServer: whois://whois.afrinic.net
ResourceLink: http://afrinic.net/en/services/whois-query
OrgAbuseHandle: GENER11-ARIN
OrgAbuseName: Generic POC
OrgAbusePhone: +230 4666616
OrgAbuseEmail: abusepoc@afrinic.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/GENER11-ARIN
OrgTechHandle: GENER11-ARIN
OrgTechName: Generic POC
OrgTechPhone: +230 4666616
OrgTechEmail: abusepoc@afrinic.net
OrgTechRef: https://rdap.arin.net/registry/entity/GENER11-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.afrinic.net.
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to the following terms of Use. See https://afrinic.net/whois/terms
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '164.155.0.0 - 164.155.255.255'
% No abuse contact registered for 164.155.0.0 - 164.155.255.255
inetnum: 164.155.0.0 - 164.155.255.255
netname: SENTRACHEM
descr: Sentrachem Limited
descr: PO BOX 781811
descr: Sandton, 2146
country: ZA
org: ORG-SL72-AFRINIC
admin-c: ALH1-AFRINIC
tech-c: ALH1-AFRINIC
status: ASSIGNED PI
remarks: ============REMARK===================
remarks: The custodianship of this IP prefix is presently
remarks: deemed to be in dispute. Consequently,
remarks: no change request pertaining to this particular
remarks: prefix will be entertained by AFRINIC until the
remarks: issue is finally resolved between the disputants
remarks: themselves or by a competent authority.
remarks: Further, whilst the current holder of the said prefix
remarks: continues to hold same, AFRINIC shall bear no
remarks: responsibility whatsoever in relation thereto and
remarks: disputants are encouraged to resolve the said
remarks: dispute expeditiously.
remarks: ============REMARK====================
mnt-by: AFRINIC-HM-MNT
mnt-lower: AFRINIC-LH-MNT
source: AFRINIC # Filtered
parent: 0.0.0.0 - 255.255.255.255
organisation: ORG-SL72-AFRINIC
org-name: Sentrachem Limited
org-type: EU-PI
country: ZA
address: PO BOX 781811
address: Sandton, 2146
address: Johannesburg
phone: tel:+230-403-5100
admin-c: ALH1-AFRINIC
tech-c: ALH1-AFRINIC
mnt-ref: AFRINIC-HM-MNT
mnt-ref: AFRINIC-LH-MNT
mnt-by: AFRINIC-HM-MNT
source: AFRINIC # Filtered
role: AFRINIC LH HOSTMASTERS
address: 11th Floor, Standard Chartered Tower
address: 19, Cybercity
address: Ebène, Mauritius
admin-c: JC17-AFRINIC
tech-c: JC17-AFRINIC
tech-c: NMB1-AFRINIC
nic-hdl: ALH1-AFRINIC
mnt-by: AFRINIC-LH-MNT
source: AFRINIC # Filtered
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.155.74.59
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59256
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;164.155.74.59. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032901 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 14:05:09 CST 2026
;; MSG SIZE rcvd: 106
b'Host 59.74.155.164.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 164.155.74.59.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 221.228.97.218 | attackbots | [MK-Root1] Blocked by UFW |
2020-07-26 23:38:09 |
| 152.136.212.92 | attackbots | 2020-07-26T15:07:39.696095v22018076590370373 sshd[14060]: Invalid user hadoop from 152.136.212.92 port 36558 2020-07-26T15:07:39.704026v22018076590370373 sshd[14060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.212.92 2020-07-26T15:07:39.696095v22018076590370373 sshd[14060]: Invalid user hadoop from 152.136.212.92 port 36558 2020-07-26T15:07:41.733074v22018076590370373 sshd[14060]: Failed password for invalid user hadoop from 152.136.212.92 port 36558 ssh2 2020-07-26T15:12:50.522039v22018076590370373 sshd[28750]: Invalid user nessa from 152.136.212.92 port 57032 ... |
2020-07-26 23:22:16 |
| 67.230.51.241 | attackbotsspam | Automatic report - Port Scan Attack |
2020-07-26 23:51:29 |
| 117.50.63.120 | attack | Fail2Ban |
2020-07-26 23:40:00 |
| 106.13.60.222 | attackspambots | Jul 26 16:50:07 pve1 sshd[3076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.60.222 Jul 26 16:50:09 pve1 sshd[3076]: Failed password for invalid user diep from 106.13.60.222 port 60806 ssh2 ... |
2020-07-26 23:58:56 |
| 98.167.124.171 | attack | (sshd) Failed SSH login from 98.167.124.171 (US/United States/ip98-167-124-171.lv.lv.cox.net): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 26 08:09:36 localhost sshd[3102]: Invalid user annam from 98.167.124.171 port 49854 Jul 26 08:09:38 localhost sshd[3102]: Failed password for invalid user annam from 98.167.124.171 port 49854 ssh2 Jul 26 08:31:47 localhost sshd[4470]: Invalid user priv from 98.167.124.171 port 44082 Jul 26 08:31:48 localhost sshd[4470]: Failed password for invalid user priv from 98.167.124.171 port 44082 ssh2 Jul 26 08:35:59 localhost sshd[4815]: Invalid user jyothi from 98.167.124.171 port 58746 |
2020-07-26 23:29:25 |
| 109.116.14.186 | attack | Automatic report - Banned IP Access |
2020-07-26 23:45:53 |
| 103.6.244.158 | attackbotsspam | 103.6.244.158 - - \[26/Jul/2020:16:11:56 +0200\] "POST /wp-login.php HTTP/1.0" 200 4128 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 103.6.244.158 - - \[26/Jul/2020:16:12:01 +0200\] "POST /wp-login.php HTTP/1.0" 200 3955 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 103.6.244.158 - - \[26/Jul/2020:16:12:03 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2020-07-26 23:37:16 |
| 80.82.77.212 | attack | 07/26/2020-11:24:13.180638 80.82.77.212 Protocol: 17 ET DROP Dshield Block Listed Source group 1 |
2020-07-26 23:34:54 |
| 200.17.114.215 | attackbotsspam | Jul 26 13:50:24 game-panel sshd[12319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.17.114.215 Jul 26 13:50:27 game-panel sshd[12319]: Failed password for invalid user seneca from 200.17.114.215 port 44309 ssh2 Jul 26 13:55:02 game-panel sshd[12432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.17.114.215 |
2020-07-26 23:48:36 |
| 222.186.42.137 | attackspam | Jul 26 17:31:36 OPSO sshd\[28508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.137 user=root Jul 26 17:31:38 OPSO sshd\[28508\]: Failed password for root from 222.186.42.137 port 26015 ssh2 Jul 26 17:31:40 OPSO sshd\[28508\]: Failed password for root from 222.186.42.137 port 26015 ssh2 Jul 26 17:31:43 OPSO sshd\[28508\]: Failed password for root from 222.186.42.137 port 26015 ssh2 Jul 26 17:31:45 OPSO sshd\[28547\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.137 user=root |
2020-07-26 23:36:18 |
| 51.15.214.21 | attack | Failed password for invalid user wuqiang from 51.15.214.21 port 47060 ssh2 |
2020-07-26 23:42:40 |
| 194.26.25.81 | attackspam | Jul 26 17:20:02 debian-2gb-nbg1-2 kernel: \[18035312.117273\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.25.81 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=54873 PROTO=TCP SPT=53017 DPT=8127 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-07-26 23:41:23 |
| 106.55.195.243 | attack | Jul 26 08:16:03 ny01 sshd[29908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.55.195.243 Jul 26 08:16:05 ny01 sshd[29908]: Failed password for invalid user test123 from 106.55.195.243 port 47282 ssh2 Jul 26 08:21:27 ny01 sshd[30686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.55.195.243 |
2020-07-26 23:17:26 |
| 170.210.121.66 | attackspam | (sshd) Failed SSH login from 170.210.121.66 (AR/Argentina/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 26 16:15:12 elude sshd[10966]: Invalid user m1 from 170.210.121.66 port 49066 Jul 26 16:15:14 elude sshd[10966]: Failed password for invalid user m1 from 170.210.121.66 port 49066 ssh2 Jul 26 16:21:19 elude sshd[11867]: Invalid user sap from 170.210.121.66 port 39860 Jul 26 16:21:21 elude sshd[11867]: Failed password for invalid user sap from 170.210.121.66 port 39860 ssh2 Jul 26 16:24:52 elude sshd[12487]: Invalid user camera from 170.210.121.66 port 59694 |
2020-07-26 23:57:37 |