城市(city): Seoul
省份(region): Seoul Special City
国家(country): South Korea
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 20.192.0.0 - 20.255.255.255
CIDR: 20.192.0.0/10
NetName: MSFT
NetHandle: NET-20-192-0-0-1
Parent: NET20 (NET-20-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Microsoft Corporation (MSFT)
RegDate: 2017-10-18
Updated: 2021-12-14
Ref: https://rdap.arin.net/registry/ip/20.192.0.0
OrgName: Microsoft Corporation
OrgId: MSFT
Address: One Microsoft Way
City: Redmond
StateProv: WA
PostalCode: 98052
Country: US
RegDate: 1998-07-10
Updated: 2025-06-10
Comment: To report suspected security issues specific to traffic emanating from Microsoft online services, including the distribution of malicious content or other illicit or illegal material through a Microsoft online service, please submit reports to:
Comment: * https://cert.microsoft.com.
Comment:
Comment: For SPAM and other abuse issues, such as Microsoft Accounts, please contact:
Comment: * abuse@microsoft.com.
Comment:
Comment: To report security vulnerabilities in Microsoft products and services, please contact:
Comment: * secure@microsoft.com.
Comment:
Comment: For legal and law enforcement-related requests, please contact:
Comment: * msndcc@microsoft.com
Comment:
Comment: For routing, peering or DNS issues, please
Comment: contact:
Comment: * IOC@microsoft.com
Ref: https://rdap.arin.net/registry/entity/MSFT
OrgTechHandle: BEDAR6-ARIN
OrgTechName: Bedard, Dawn
OrgTechPhone: +1-425-538-6637
OrgTechEmail: dabedard@microsoft.com
OrgTechRef: https://rdap.arin.net/registry/entity/BEDAR6-ARIN
OrgTechHandle: IPHOS5-ARIN
OrgTechName: IPHostmaster, IPHostmaster
OrgTechPhone: +1-425-538-6637
OrgTechEmail: iphostmaster@microsoft.com
OrgTechRef: https://rdap.arin.net/registry/entity/IPHOS5-ARIN
OrgTechHandle: MRPD-ARIN
OrgTechName: Microsoft Routing, Peering, and DNS
OrgTechPhone: +1-425-882-8080
OrgTechEmail: IOC@microsoft.com
OrgTechRef: https://rdap.arin.net/registry/entity/MRPD-ARIN
OrgRoutingHandle: CHATU3-ARIN
OrgRoutingName: Chaturmohta, Somesh
OrgRoutingPhone: +1-425-882-8080
OrgRoutingEmail: someshch@microsoft.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/CHATU3-ARIN
OrgTechHandle: SINGH683-ARIN
OrgTechName: Singh, Prachi
OrgTechPhone: +1-425-707-5601
OrgTechEmail: pracsin@microsoft.com
OrgTechRef: https://rdap.arin.net/registry/entity/SINGH683-ARIN
OrgAbuseHandle: MAC74-ARIN
OrgAbuseName: Microsoft Abuse Contact
OrgAbusePhone: +1-425-882-8080
OrgAbuseEmail: abuse@microsoft.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/MAC74-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.196.217.188
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30315
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;20.196.217.188. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026030901 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 10 09:20:30 CST 2026
;; MSG SIZE rcvd: 107
Host 188.217.196.20.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 188.217.196.20.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 152.136.219.146 | attackbotsspam | 2020-05-27T12:30:26.918365shield sshd\[24743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.219.146 user=root 2020-05-27T12:30:29.481951shield sshd\[24743\]: Failed password for root from 152.136.219.146 port 39996 ssh2 2020-05-27T12:32:32.366843shield sshd\[25089\]: Invalid user 00000 from 152.136.219.146 port 34590 2020-05-27T12:32:32.370662shield sshd\[25089\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.219.146 2020-05-27T12:32:34.563206shield sshd\[25089\]: Failed password for invalid user 00000 from 152.136.219.146 port 34590 ssh2 |
2020-05-28 01:38:06 |
| 14.248.239.43 | attackbotsspam | 1590580253 - 05/27/2020 13:50:53 Host: 14.248.239.43/14.248.239.43 Port: 445 TCP Blocked |
2020-05-28 01:29:39 |
| 211.193.60.137 | attack | 5x Failed Password |
2020-05-28 01:18:38 |
| 186.10.21.236 | attackbotsspam | May 27 08:41:37 firewall sshd[8845]: Failed password for invalid user autumn from 186.10.21.236 port 1457 ssh2 May 27 08:51:28 firewall sshd[9313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.10.21.236 user=root May 27 08:51:30 firewall sshd[9313]: Failed password for root from 186.10.21.236 port 9300 ssh2 ... |
2020-05-28 00:59:26 |
| 167.114.203.73 | attackspam | 2020-05-27T15:38:23.756611abusebot-5.cloudsearch.cf sshd[15436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip73.ip-167-114-203.net user=operator 2020-05-27T15:38:25.458420abusebot-5.cloudsearch.cf sshd[15436]: Failed password for operator from 167.114.203.73 port 40226 ssh2 2020-05-27T15:41:44.298895abusebot-5.cloudsearch.cf sshd[15441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip73.ip-167-114-203.net user=root 2020-05-27T15:41:46.595608abusebot-5.cloudsearch.cf sshd[15441]: Failed password for root from 167.114.203.73 port 54720 ssh2 2020-05-27T15:42:50.756130abusebot-5.cloudsearch.cf sshd[15444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip73.ip-167-114-203.net user=root 2020-05-27T15:42:53.111385abusebot-5.cloudsearch.cf sshd[15444]: Failed password for root from 167.114.203.73 port 43996 ssh2 2020-05-27T15:43:57.924195abusebot-5.cloudsearch.c ... |
2020-05-28 01:34:33 |
| 111.93.10.213 | attack | 2020-05-27 06:25:51 server sshd[43624]: Failed password for invalid user root from 111.93.10.213 port 41672 ssh2 |
2020-05-28 01:23:33 |
| 119.29.161.236 | attackbotsspam | $f2bV_matches |
2020-05-28 01:30:26 |
| 93.84.86.69 | attackbotsspam | May 27 11:28:00 ws24vmsma01 sshd[179789]: Failed password for root from 93.84.86.69 port 37418 ssh2 May 27 12:02:23 ws24vmsma01 sshd[131389]: Failed password for root from 93.84.86.69 port 49688 ssh2 ... |
2020-05-28 01:11:36 |
| 2607:f298:5:111b::b14:8d66 | attackspambots | MYH,DEF GET /wp-login.php |
2020-05-28 01:28:46 |
| 61.19.27.253 | attack | Brute-force attempt banned |
2020-05-28 01:26:01 |
| 72.164.246.194 | attackspam | 20/5/27@07:51:17: FAIL: Alarm-Network address from=72.164.246.194 20/5/27@07:51:17: FAIL: Alarm-Network address from=72.164.246.194 ... |
2020-05-28 01:08:08 |
| 220.167.103.30 | attack | CN_MAINT-CHINANET_<177>1590580285 [1:2010935:3] ET SCAN Suspicious inbound to MSSQL port 1433 [Classification: Potentially Bad Traffic] [Priority: 2]: |
2020-05-28 01:02:08 |
| 139.199.159.77 | attackspambots | $f2bV_matches |
2020-05-28 01:24:56 |
| 5.135.185.27 | attackbotsspam | 2020-05-27 07:23:28 server sshd[45431]: Failed password for invalid user root from 5.135.185.27 port 36080 ssh2 |
2020-05-28 01:10:14 |
| 45.55.60.73 | attackbotsspam | Automatic report - XMLRPC Attack |
2020-05-28 01:06:05 |