城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 170.141.0.0 - 170.143.255.255
CIDR: 170.141.0.0/16, 170.142.0.0/15
NetName: TNNET
NetHandle: NET-170-141-0-0-1
Parent: NET170 (NET-170-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: State of Tennessee (TENN)
RegDate: 1994-04-29
Updated: 2019-05-22
Ref: https://rdap.arin.net/registry/ip/170.141.0.0
OrgName: State of Tennessee
OrgId: TENN
Address: Strategic Technology Solutions
City: Nashville
StateProv: TN
PostalCode: 37243
Country: US
RegDate: 1994-04-29
Updated: 2024-11-25
Ref: https://rdap.arin.net/registry/entity/TENN
OrgTechHandle: MUPPA2-ARIN
OrgTechName: Muppala, Goutham
OrgTechPhone: +1-615-788-9827
OrgTechEmail: goutham.muppala@tn.gov
OrgTechRef: https://rdap.arin.net/registry/entity/MUPPA2-ARIN
OrgAbuseHandle: FRANK688-ARIN
OrgAbuseName: Franklin, Jim
OrgAbusePhone: +1-615-741-9439
OrgAbuseEmail: james.franklin@tn.gov
OrgAbuseRef: https://rdap.arin.net/registry/entity/FRANK688-ARIN
OrgAbuseHandle: MUPPA2-ARIN
OrgAbuseName: Muppala, Goutham
OrgAbusePhone: +1-615-788-9827
OrgAbuseEmail: goutham.muppala@tn.gov
OrgAbuseRef: https://rdap.arin.net/registry/entity/MUPPA2-ARIN
OrgAbuseHandle: KULKA10-ARIN
OrgAbuseName: Kulkarni, Ayub
OrgAbusePhone: +1-615-532-5133
OrgAbuseEmail: ayub.kulkarni@tn.gov
OrgAbuseRef: https://rdap.arin.net/registry/entity/KULKA10-ARIN
OrgNOCHandle: KULKA10-ARIN
OrgNOCName: Kulkarni, Ayub
OrgNOCPhone: +1-615-532-5133
OrgNOCEmail: ayub.kulkarni@tn.gov
OrgNOCRef: https://rdap.arin.net/registry/entity/KULKA10-ARIN
OrgTechHandle: KULKA10-ARIN
OrgTechName: Kulkarni, Ayub
OrgTechPhone: +1-615-532-5133
OrgTechEmail: ayub.kulkarni@tn.gov
OrgTechRef: https://rdap.arin.net/registry/entity/KULKA10-ARIN
OrgTechHandle: FRANK688-ARIN
OrgTechName: Franklin, Jim
OrgTechPhone: +1-615-741-9439
OrgTechEmail: james.franklin@tn.gov
OrgTechRef: https://rdap.arin.net/registry/entity/FRANK688-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 170.143.163.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51443
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;170.143.163.103. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032401 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 25 12:12:39 CST 2026
;; MSG SIZE rcvd: 108
Host 103.163.143.170.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 103.163.143.170.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 51.255.35.58 | attackbots | Nov 16 09:30:28 meumeu sshd[4092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.35.58 Nov 16 09:30:30 meumeu sshd[4092]: Failed password for invalid user plazara from 51.255.35.58 port 51580 ssh2 Nov 16 09:34:00 meumeu sshd[4854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.35.58 ... |
2019-11-16 16:51:38 |
| 138.197.199.249 | attack | Nov 16 08:27:23 ncomp sshd[1976]: Invalid user home from 138.197.199.249 Nov 16 08:27:23 ncomp sshd[1976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.199.249 Nov 16 08:27:23 ncomp sshd[1976]: Invalid user home from 138.197.199.249 Nov 16 08:27:25 ncomp sshd[1976]: Failed password for invalid user home from 138.197.199.249 port 59156 ssh2 |
2019-11-16 16:17:14 |
| 178.128.55.52 | attackspambots | 2019-11-16T06:26:34.215973abusebot-5.cloudsearch.cf sshd\[25876\]: Invalid user fuckyou from 178.128.55.52 port 55839 |
2019-11-16 16:47:32 |
| 189.124.197.172 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-11-16 16:52:01 |
| 139.199.228.154 | attackspambots | Nov 16 09:29:56 MK-Soft-VM7 sshd[15900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.228.154 Nov 16 09:29:58 MK-Soft-VM7 sshd[15900]: Failed password for invalid user nandan from 139.199.228.154 port 54858 ssh2 ... |
2019-11-16 16:35:10 |
| 46.147.244.38 | attackbots | searching backdoor |
2019-11-16 16:29:53 |
| 188.166.42.50 | attackspambots | Nov 16 09:19:57 relay postfix/smtpd\[24865\]: warning: unknown\[188.166.42.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 16 09:21:12 relay postfix/smtpd\[1082\]: warning: unknown\[188.166.42.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 16 09:21:44 relay postfix/smtpd\[1114\]: warning: unknown\[188.166.42.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 16 09:26:12 relay postfix/smtpd\[1114\]: warning: unknown\[188.166.42.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 16 09:35:12 relay postfix/smtpd\[1114\]: warning: unknown\[188.166.42.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-11-16 16:53:32 |
| 94.39.238.123 | attackbotsspam | Automatic report - Port Scan Attack |
2019-11-16 16:49:02 |
| 121.7.127.92 | attackbotsspam | 2019-11-16T02:16:13.5939431495-001 sshd\[51144\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=bb121-7-127-92.singnet.com.sg user=root 2019-11-16T02:16:15.6748941495-001 sshd\[51144\]: Failed password for root from 121.7.127.92 port 32979 ssh2 2019-11-16T02:20:51.1487611495-001 sshd\[51271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=bb121-7-127-92.singnet.com.sg user=root 2019-11-16T02:20:53.1538711495-001 sshd\[51271\]: Failed password for root from 121.7.127.92 port 51643 ssh2 2019-11-16T02:25:26.7218141495-001 sshd\[51458\]: Invalid user guest from 121.7.127.92 port 42068 2019-11-16T02:25:26.7294691495-001 sshd\[51458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=bb121-7-127-92.singnet.com.sg ... |
2019-11-16 16:38:48 |
| 176.9.121.208 | attack | searching backdoor |
2019-11-16 16:37:06 |
| 112.85.42.179 | attackbotsspam | 2019-11-16T08:01:35.600907Z 4e75ecabb034 New connection: 112.85.42.179:53706 (172.17.0.3:2222) [session: 4e75ecabb034] 2019-11-16T08:02:20.759884Z c8c2304b1cb4 New connection: 112.85.42.179:35941 (172.17.0.3:2222) [session: c8c2304b1cb4] |
2019-11-16 16:19:16 |
| 40.114.246.252 | attackbotsspam | Nov 16 13:13:46 gw1 sshd[24944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.114.246.252 Nov 16 13:13:48 gw1 sshd[24944]: Failed password for invalid user guest from 40.114.246.252 port 40578 ssh2 ... |
2019-11-16 16:20:30 |
| 200.196.249.170 | attack | Automatic report - Banned IP Access |
2019-11-16 16:26:25 |
| 139.215.217.180 | attackbots | Nov 16 08:07:42 cp sshd[25507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.215.217.180 |
2019-11-16 16:22:24 |
| 91.121.157.178 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-11-16 16:18:46 |