城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '171.0.0.0 - 171.255.255.255'
% Abuse contact for '171.0.0.0 - 171.255.255.255' is 'helpdesk@apnic.net'
inetnum: 171.0.0.0 - 171.255.255.255
netname: ERX-NETBLOCK
descr: Early registration addresses
remarks: ------------------------------------------------------
remarks: Important:
remarks:
remarks: Networks in this range were allocated by InterNIC
remarks: prior to the formation of Regional Internet
remarks: Registries (RIRs): AfriNIC, APNIC, ARIN, LACNIC and RIPE NCC.
remarks:
remarks: Address ranges from this historical space have now
remarks: been transferred to the appropriate RIR database.remarks:
remarks: If your search has returned this record, it means the
remarks: address range is not administered by APNIC.
remarks:
remarks: Instead, please search one of the following databases:
remarks:
remarks: - AfriNIC (Africa)
remarks: website: http://www.afrinic.net/
remarks: command line: whois.afrinic.net
remarks:
remarks: - ARIN (Northern America)
remarks: website: http://www.arin.net/
remarks: command line: whois.arin.net
remarks:
remarks: - LACNIC (Latin America and the Carribean)
remarks: website: http://www.lacnic.net/
remarks: command line: whois.lacnic.net
remarks:
remarks: - RIPE NCC (Europe)
remarks: website: http://www.ripe.net/
remarks: command line: whois.ripe.net
remarks:
remarks: For information on the Early Registration Transfer
remarks: (ERX) project, see:
remarks:
remarks: http://www.apnic.net/db/erx
remarks:
remarks: ------------------------------------------------------
country: AU
admin-c: IANA1-AP
tech-c: IANA1-AP
mnt-by: APNIC-HM
mnt-lower: APNIC-HM
mnt-irt: IRT-APNIC-AP
status: ALLOCATED PORTABLE
last-modified: 2011-02-09T00:29:28Z
source: APNIC
irt: IRT-APNIC-AP
address: Brisbane, Australia
e-mail: helpdesk@apnic.net
abuse-mailbox: helpdesk@apnic.net
admin-c: HM20-AP
tech-c: NO4-AP
remarks: APNIC is a Regional Internet Registry.
remarks: We do not operate the referring network and
remarks: are unable to investigate complaints of network abuse.
remarks: For information about IRT, see www.apnic.net/irt
remarks: helpdesk@apnic.net was validated on 2020-02-03
auth: # Filtered
mnt-by: APNIC-HM
last-modified: 2025-11-18T00:26:21Z
source: APNIC
role: Internet Assigned Numbers Authority
address: see http://www.iana.org.
admin-c: IANA1-AP
tech-c: IANA1-AP
nic-hdl: IANA1-AP
remarks: For more information on IANA services
remarks: go to IANA web site at http://www.iana.org.
mnt-by: MAINT-APNIC-AP
last-modified: 2018-06-22T22:34:30Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 171.206.220.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4895
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;171.206.220.16. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032300 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 20:03:10 CST 2026
;; MSG SIZE rcvd: 107
Host 16.220.206.171.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 16.220.206.171.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 114.32.142.148 | attackbotsspam | Port Scan detected! ... |
2020-06-25 12:57:13 |
| 112.33.55.210 | attackbots | Jun 25 06:54:49 journals sshd\[80956\]: Invalid user gt from 112.33.55.210 Jun 25 06:54:49 journals sshd\[80956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.33.55.210 Jun 25 06:54:51 journals sshd\[80956\]: Failed password for invalid user gt from 112.33.55.210 port 42328 ssh2 Jun 25 06:56:07 journals sshd\[81053\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.33.55.210 user=root Jun 25 06:56:10 journals sshd\[81053\]: Failed password for root from 112.33.55.210 port 52820 ssh2 ... |
2020-06-25 13:05:44 |
| 105.225.145.250 | attackspambots | Total attacks: 2 |
2020-06-25 13:03:52 |
| 51.105.7.70 | attack | Invalid user charity from 51.105.7.70 port 53382 |
2020-06-25 12:53:59 |
| 198.74.98.82 | attackbotsspam | Jun 25 10:04:16 gw1 sshd[13218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.74.98.82 Jun 25 10:04:18 gw1 sshd[13218]: Failed password for invalid user tushar from 198.74.98.82 port 48082 ssh2 ... |
2020-06-25 13:08:48 |
| 91.90.36.174 | attackbotsspam | Jun 25 06:17:44 vps sshd[961475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.90.36.174 user=root Jun 25 06:17:46 vps sshd[961475]: Failed password for root from 91.90.36.174 port 35578 ssh2 Jun 25 06:18:08 vps sshd[963187]: Invalid user ftptest from 91.90.36.174 port 37612 Jun 25 06:18:08 vps sshd[963187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.90.36.174 Jun 25 06:18:10 vps sshd[963187]: Failed password for invalid user ftptest from 91.90.36.174 port 37612 ssh2 ... |
2020-06-25 12:37:51 |
| 112.85.42.186 | attackspam | Jun 25 07:33:25 ift sshd\[9592\]: Failed password for root from 112.85.42.186 port 57482 ssh2Jun 25 07:34:10 ift sshd\[9686\]: Failed password for root from 112.85.42.186 port 43946 ssh2Jun 25 07:35:42 ift sshd\[10153\]: Failed password for root from 112.85.42.186 port 58444 ssh2Jun 25 07:35:45 ift sshd\[10153\]: Failed password for root from 112.85.42.186 port 58444 ssh2Jun 25 07:35:47 ift sshd\[10153\]: Failed password for root from 112.85.42.186 port 58444 ssh2 ... |
2020-06-25 12:40:53 |
| 85.209.0.121 | attackbotsspam | Jun 25 05:56:03 backup sshd[4421]: Failed password for root from 85.209.0.121 port 54154 ssh2 ... |
2020-06-25 13:13:42 |
| 193.95.247.90 | attack | 2020-06-25T05:56:39.377665 sshd[31959]: Invalid user order from 193.95.247.90 port 50026 2020-06-25T05:56:39.393786 sshd[31959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.95.247.90 2020-06-25T05:56:39.377665 sshd[31959]: Invalid user order from 193.95.247.90 port 50026 2020-06-25T05:56:41.187904 sshd[31959]: Failed password for invalid user order from 193.95.247.90 port 50026 ssh2 ... |
2020-06-25 12:42:12 |
| 51.77.137.230 | attackbotsspam | Invalid user cac from 51.77.137.230 port 50562 |
2020-06-25 13:15:23 |
| 222.186.42.7 | attackspambots | Jun 25 14:47:15 localhost sshd[2885717]: Disconnected from 222.186.42.7 port 26038 [preauth] ... |
2020-06-25 12:47:50 |
| 122.117.114.157 | attack | " " |
2020-06-25 13:11:33 |
| 49.233.169.219 | attack | 2020-06-25T06:54:54.938031afi-git.jinr.ru sshd[19631]: Failed password for invalid user cacti from 49.233.169.219 port 22203 ssh2 2020-06-25T06:56:14.517387afi-git.jinr.ru sshd[20005]: Invalid user svz from 49.233.169.219 port 35569 2020-06-25T06:56:14.520693afi-git.jinr.ru sshd[20005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.169.219 2020-06-25T06:56:14.517387afi-git.jinr.ru sshd[20005]: Invalid user svz from 49.233.169.219 port 35569 2020-06-25T06:56:16.549768afi-git.jinr.ru sshd[20005]: Failed password for invalid user svz from 49.233.169.219 port 35569 ssh2 ... |
2020-06-25 12:59:56 |
| 139.155.82.119 | attackbotsspam | 2020-06-25T03:51:54.147926ionos.janbro.de sshd[31935]: Invalid user mysql from 139.155.82.119 port 36764 2020-06-25T03:51:56.591257ionos.janbro.de sshd[31935]: Failed password for invalid user mysql from 139.155.82.119 port 36764 ssh2 2020-06-25T03:54:06.789213ionos.janbro.de sshd[31945]: Invalid user nelson from 139.155.82.119 port 39430 2020-06-25T03:54:07.006456ionos.janbro.de sshd[31945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.82.119 2020-06-25T03:54:06.789213ionos.janbro.de sshd[31945]: Invalid user nelson from 139.155.82.119 port 39430 2020-06-25T03:54:08.796987ionos.janbro.de sshd[31945]: Failed password for invalid user nelson from 139.155.82.119 port 39430 ssh2 2020-06-25T03:56:21.954227ionos.janbro.de sshd[31959]: Invalid user ventura from 139.155.82.119 port 42098 2020-06-25T03:56:22.188777ionos.janbro.de sshd[31959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.82.119 ... |
2020-06-25 12:48:22 |
| 51.254.248.18 | attack | Jun 25 05:52:25 vserver sshd\[19306\]: Invalid user ravi from 51.254.248.18Jun 25 05:52:27 vserver sshd\[19306\]: Failed password for invalid user ravi from 51.254.248.18 port 37608 ssh2Jun 25 05:56:02 vserver sshd\[19328\]: Invalid user hive from 51.254.248.18Jun 25 05:56:04 vserver sshd\[19328\]: Failed password for invalid user hive from 51.254.248.18 port 59182 ssh2 ... |
2020-06-25 13:14:06 |