城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 198.145.121.0 - 198.145.121.255
CIDR: 198.145.121.0/24
NetName: DATAR-6
NetHandle: NET-198-145-121-0-1
Parent: NET198 (NET-198-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Data Room, Inc (DATAR-6)
RegDate: 2023-05-30
Updated: 2024-08-26
Ref: https://rdap.arin.net/registry/ip/198.145.121.0
OrgName: Data Room, Inc
OrgId: DATAR-6
Address: 3418 Northern Blvd, Suite 408
City: Long Island City
StateProv: NY
PostalCode: 11101
Country: US
RegDate: 2006-02-06
Updated: 2021-09-15
Ref: https://rdap.arin.net/registry/entity/DATAR-6
OrgAbuseHandle: NETWO1108-ARIN
OrgAbuseName: Network Operations
OrgAbusePhone: +1-646-201-4076
OrgAbuseEmail: support@serverroom.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/NETWO1108-ARIN
OrgTechHandle: NETWO1108-ARIN
OrgTechName: Network Operations
OrgTechPhone: +1-646-201-4076
OrgTechEmail: support@serverroom.net
OrgTechRef: https://rdap.arin.net/registry/entity/NETWO1108-ARIN
OrgDNSHandle: SBO58-ARIN
OrgDNSName: Botez, Stefan
OrgDNSPhone: +40751257259
OrgDNSEmail: stefan@serverroom.net
OrgDNSRef: https://rdap.arin.net/registry/entity/SBO58-ARIN
OrgDNSHandle: COCEI-ARIN
OrgDNSName: Cocei, Andi
OrgDNSPhone: +40770437239
OrgDNSEmail: andi@serverroom.net
OrgDNSRef: https://rdap.arin.net/registry/entity/COCEI-ARIN
OrgNOCHandle: NETWO1108-ARIN
OrgNOCName: Network Operations
OrgNOCPhone: +1-646-201-4076
OrgNOCEmail: support@serverroom.net
OrgNOCRef: https://rdap.arin.net/registry/entity/NETWO1108-ARIN
OrgRoutingHandle: COCEI-ARIN
OrgRoutingName: Cocei, Andi
OrgRoutingPhone: +40770437239
OrgRoutingEmail: andi@serverroom.net
OrgRoutingRef: https://rdap.arin.net/registry/entity/COCEI-ARIN
OrgRoutingHandle: SBO58-ARIN
OrgRoutingName: Botez, Stefan
OrgRoutingPhone: +40751257259
OrgRoutingEmail: stefan@serverroom.net
OrgRoutingRef: https://rdap.arin.net/registry/entity/SBO58-ARIN
OrgTechHandle: COCEI-ARIN
OrgTechName: Cocei, Andi
OrgTechPhone: +40770437239
OrgTechEmail: andi@serverroom.net
OrgTechRef: https://rdap.arin.net/registry/entity/COCEI-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.145.121.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5030
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;198.145.121.150. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026020500 1800 900 604800 86400
;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 05 21:23:36 CST 2026
;; MSG SIZE rcvd: 108
150.121.145.198.in-addr.arpa domain name pointer enforce.de.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
150.121.145.198.in-addr.arpa name = enforce.de.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 111.19.179.149 | attack | 111.19.179.149 was recorded 5 times by 5 hosts attempting to connect to the following ports: 21. Incident counter (4h, 24h, all-time): 5, 5, 5 |
2019-11-21 21:05:53 |
| 51.15.229.114 | attack | CloudCIX Reconnaissance Scan Detected, PTR: 114-229-15-51.rev.cloud.scaleway.com. |
2019-11-21 20:42:58 |
| 107.170.190.16 | attackspambots | CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found |
2019-11-21 20:54:26 |
| 193.56.28.177 | attack | Nov 21 13:18:04 srv01 postfix/smtpd\[2883\]: warning: unknown\[193.56.28.177\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 21 13:35:39 srv01 postfix/smtpd\[7960\]: warning: unknown\[193.56.28.177\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 21 13:35:45 srv01 postfix/smtpd\[7960\]: warning: unknown\[193.56.28.177\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 21 13:35:55 srv01 postfix/smtpd\[7960\]: warning: unknown\[193.56.28.177\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 21 13:37:29 srv01 postfix/smtpd\[9002\]: warning: unknown\[193.56.28.177\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-11-21 21:18:51 |
| 74.58.106.15 | attackspambots | Automatic report - SSH Brute-Force Attack |
2019-11-21 21:07:44 |
| 109.184.152.173 | attackbotsspam | Port 1433 Scan |
2019-11-21 20:56:35 |
| 158.69.31.36 | attack | $f2bV_matches |
2019-11-21 21:26:16 |
| 222.186.180.17 | attack | Nov 21 02:54:20 auw2 sshd\[17709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17 user=root Nov 21 02:54:22 auw2 sshd\[17709\]: Failed password for root from 222.186.180.17 port 9140 ssh2 Nov 21 02:54:41 auw2 sshd\[17736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17 user=root Nov 21 02:54:44 auw2 sshd\[17736\]: Failed password for root from 222.186.180.17 port 25192 ssh2 Nov 21 02:55:04 auw2 sshd\[17765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17 user=root |
2019-11-21 21:04:51 |
| 129.204.23.5 | attackspambots | Nov 21 13:56:41 v22018086721571380 sshd[13503]: Failed password for invalid user mysql from 129.204.23.5 port 56888 ssh2 Nov 21 14:08:23 v22018086721571380 sshd[13843]: Failed password for invalid user host from 129.204.23.5 port 43028 ssh2 |
2019-11-21 21:08:47 |
| 193.188.22.229 | attack | Invalid user service from 193.188.22.229 port 26315 |
2019-11-21 21:03:06 |
| 124.251.110.147 | attackbots | Nov 21 14:08:40 vps691689 sshd[24252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.251.110.147 Nov 21 14:08:42 vps691689 sshd[24252]: Failed password for invalid user saboorian from 124.251.110.147 port 53282 ssh2 ... |
2019-11-21 21:23:29 |
| 62.234.91.173 | attackbotsspam | 5x Failed Password |
2019-11-21 20:52:37 |
| 112.175.184.45 | attack | Automatic report - XMLRPC Attack |
2019-11-21 21:24:31 |
| 54.38.241.162 | attackspambots | Nov 21 13:30:37 vps691689 sshd[23515]: Failed password for root from 54.38.241.162 port 38602 ssh2 Nov 21 13:37:24 vps691689 sshd[23655]: Failed password for root from 54.38.241.162 port 53852 ssh2 ... |
2019-11-21 20:46:23 |
| 36.189.253.226 | attackspam | Nov 2 09:11:51 odroid64 sshd\[30241\]: User root from 36.189.253.226 not allowed because not listed in AllowUsers Nov 2 09:11:51 odroid64 sshd\[30241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.189.253.226 user=root ... |
2019-11-21 20:54:59 |