城市(city): Phoenix
省份(region): Arizona
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b'#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 20.160.0.0 - 20.175.255.255
CIDR: 20.160.0.0/12
NetName: MSFT
NetHandle: NET-20-160-0-0-1
Parent: NET20 (NET-20-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Microsoft Corporation (MSFT)
RegDate: 2017-02-22
Updated: 2017-02-22
Ref: https://rdap.arin.net/registry/ip/20.160.0.0
OrgName: Microsoft Corporation
OrgId: MSFT
Address: One Microsoft Way
City: Redmond
StateProv: WA
PostalCode: 98052
Country: US
RegDate: 1998-07-10
Updated: 2025-06-10
Comment: To report suspected security issues specific to traffic emanating from Microsoft online services, including the distribution of malicious content or other illicit or illegal material through a Microsoft online service, please submit reports to:
Comment: * https://cert.microsoft.com.
Comment:
Comment: For SPAM and other abuse issues, such as Microsoft Accounts, please contact:
Comment: * abuse@microsoft.com.
Comment:
Comment: To report security vulnerabilities in Microsoft products and services, please contact:
Comment: * secure@microsoft.com.
Comment:
Comment: For legal and law enforcement-related requests, please contact:
Comment: * msndcc@microsoft.com
Comment:
Comment: For routing, peering or DNS issues, please
Comment: contact:
Comment: * IOC@microsoft.com
Ref: https://rdap.arin.net/registry/entity/MSFT
OrgTechHandle: BEDAR6-ARIN
OrgTechName: Bedard, Dawn
OrgTechPhone: +1-425-538-6637
OrgTechEmail: dabedard@microsoft.com
OrgTechRef: https://rdap.arin.net/registry/entity/BEDAR6-ARIN
OrgTechHandle: IPHOS5-ARIN
OrgTechName: IPHostmaster, IPHostmaster
OrgTechPhone: +1-425-538-6637
OrgTechEmail: iphostmaster@microsoft.com
OrgTechRef: https://rdap.arin.net/registry/entity/IPHOS5-ARIN
OrgTechHandle: MRPD-ARIN
OrgTechName: Microsoft Routing, Peering, and DNS
OrgTechPhone: +1-425-882-8080
OrgTechEmail: IOC@microsoft.com
OrgTechRef: https://rdap.arin.net/registry/entity/MRPD-ARIN
OrgRoutingHandle: CHATU3-ARIN
OrgRoutingName: Chaturmohta, Somesh
OrgRoutingPhone: +1-425-882-8080
OrgRoutingEmail: someshch@microsoft.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/CHATU3-ARIN
OrgTechHandle: SINGH683-ARIN
OrgTechName: Singh, Prachi
OrgTechPhone: +1-425-707-5601
OrgTechEmail: pracsin@microsoft.com
OrgTechRef: https://rdap.arin.net/registry/entity/SINGH683-ARIN
OrgAbuseHandle: MAC74-ARIN
OrgAbuseName: Microsoft Abuse Contact
OrgAbusePhone: +1-425-882-8080
OrgAbuseEmail: abuse@microsoft.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/MAC74-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#'
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.169.50.188
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29844
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;20.169.50.188. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026030800 1800 900 604800 86400
;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 09 00:10:28 CST 2026
;; MSG SIZE rcvd: 106
Host 188.50.169.20.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 188.50.169.20.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 37.49.224.204 | attack | Jul 3 01:16:04 ovpn sshd\[4795\]: Invalid user admin from 37.49.224.204 Jul 3 01:16:04 ovpn sshd\[4795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.49.224.204 Jul 3 01:16:06 ovpn sshd\[4795\]: Failed password for invalid user admin from 37.49.224.204 port 60024 ssh2 Jul 3 01:16:12 ovpn sshd\[4815\]: Invalid user support from 37.49.224.204 Jul 3 01:16:12 ovpn sshd\[4815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.49.224.204 |
2019-07-03 09:25:37 |
| 88.179.172.174 | attack | Mar 4 04:26:51 motanud sshd\[30610\]: Invalid user gg from 88.179.172.174 port 56017 Mar 4 04:26:51 motanud sshd\[30610\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.179.172.174 Mar 4 04:26:53 motanud sshd\[30610\]: Failed password for invalid user gg from 88.179.172.174 port 56017 ssh2 |
2019-07-03 09:11:05 |
| 218.92.0.143 | attackspam | Jul 3 02:41:46 SilenceServices sshd[5121]: Failed password for root from 218.92.0.143 port 36657 ssh2 Jul 3 02:42:00 SilenceServices sshd[5121]: error: maximum authentication attempts exceeded for root from 218.92.0.143 port 36657 ssh2 [preauth] Jul 3 02:42:05 SilenceServices sshd[5467]: Failed password for root from 218.92.0.143 port 54952 ssh2 |
2019-07-03 08:53:09 |
| 145.239.82.192 | attackspambots | $f2bV_matches |
2019-07-03 09:10:07 |
| 118.25.208.97 | attackspambots | Jul 3 02:06:16 meumeu sshd[25291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.208.97 Jul 3 02:06:18 meumeu sshd[25291]: Failed password for invalid user simran from 118.25.208.97 port 44532 ssh2 Jul 3 02:08:57 meumeu sshd[25610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.208.97 ... |
2019-07-03 09:17:08 |
| 178.128.177.180 | attackspambots | Brute force attempt |
2019-07-03 09:36:01 |
| 36.234.236.162 | attackbots | 23/tcp [2019-07-02]1pkt |
2019-07-03 09:37:19 |
| 96.70.52.227 | attackspam | SMTP Fraud Orders |
2019-07-03 09:04:00 |
| 218.92.0.178 | attackbotsspam | Brute SSH |
2019-07-03 08:54:45 |
| 178.128.79.169 | attackspambots | 2019-07-03T03:25:58.588638scmdmz1 sshd\[22728\]: Invalid user frank from 178.128.79.169 port 45070 2019-07-03T03:25:58.591736scmdmz1 sshd\[22728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.79.169 2019-07-03T03:26:00.172813scmdmz1 sshd\[22728\]: Failed password for invalid user frank from 178.128.79.169 port 45070 ssh2 ... |
2019-07-03 09:32:03 |
| 5.133.66.56 | attackbots | Jul 3 01:17:12 server postfix/smtpd[24347]: NOQUEUE: reject: RCPT from aquatic.tamnhapho.com[5.133.66.56]: 554 5.7.1 Service unavailable; Client host [5.133.66.56] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS; from= |
2019-07-03 09:07:48 |
| 139.59.17.173 | attack | Jul 3 00:48:04 localhost sshd\[27685\]: Invalid user japca from 139.59.17.173 port 35966 Jul 3 00:48:04 localhost sshd\[27685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.17.173 Jul 3 00:48:07 localhost sshd\[27685\]: Failed password for invalid user japca from 139.59.17.173 port 35966 ssh2 ... |
2019-07-03 09:22:46 |
| 201.76.112.135 | attackbots | Automatic report - Web App Attack |
2019-07-03 09:34:29 |
| 41.204.60.14 | attackbots | SSH-BruteForce |
2019-07-03 09:01:03 |
| 182.184.44.6 | attackbotsspam | Failed password for invalid user horizon from 182.184.44.6 port 45354 ssh2 Invalid user kou from 182.184.44.6 port 42304 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.184.44.6 Failed password for invalid user kou from 182.184.44.6 port 42304 ssh2 Invalid user iiii from 182.184.44.6 port 39262 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.184.44.6 |
2019-07-03 09:08:06 |