城市(city): San Antonio
省份(region): Texas
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
NetRange: 20.33.0.0 - 20.128.255.255
CIDR: 20.34.0.0/15, 20.64.0.0/10, 20.128.0.0/16, 20.40.0.0/13, 20.48.0.0/12, 20.33.0.0/16, 20.36.0.0/14
NetName: MSFT
NetHandle: NET-20-33-0-0-1
Parent: NET20 (NET-20-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Microsoft Corporation (MSFT)
RegDate: 2017-10-18
Updated: 2021-12-14
Ref: https://rdap.arin.net/registry/ip/20.33.0.0
OrgName: Microsoft Corporation
OrgId: MSFT
Address: One Microsoft Way
City: Redmond
StateProv: WA
PostalCode: 98052
Country: US
RegDate: 1998-07-10
Updated: 2025-06-10
Comment: To report suspected security issues specific to traffic emanating from Microsoft online services, including the distribution of malicious content or other illicit or illegal material through a Microsoft online service, please submit reports to:
Comment: * https://cert.microsoft.com.
Comment:
Comment: For SPAM and other abuse issues, such as Microsoft Accounts, please contact:
Comment: * abuse@microsoft.com.
Comment:
Comment: To report security vulnerabilities in Microsoft products and services, please contact:
Comment: * secure@microsoft.com.
Comment:
Comment: For legal and law enforcement-related requests, please contact:
Comment: * msndcc@microsoft.com
Comment:
Comment: For routing, peering or DNS issues, please
Comment: contact:
Comment: * IOC@microsoft.com
Ref: https://rdap.arin.net/registry/entity/MSFT
OrgRoutingHandle: CHATU3-ARIN
OrgRoutingName: Chaturmohta, Somesh
OrgRoutingPhone: +1-425-882-8080
OrgRoutingEmail: someshch@microsoft.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/CHATU3-ARIN
OrgTechHandle: BEDAR6-ARIN
OrgTechName: Bedard, Dawn
OrgTechPhone: +1-425-538-6637
OrgTechEmail: dabedard@microsoft.com
OrgTechRef: https://rdap.arin.net/registry/entity/BEDAR6-ARIN
OrgTechHandle: IPHOS5-ARIN
OrgTechName: IPHostmaster, IPHostmaster
OrgTechPhone: +1-425-538-6637
OrgTechEmail: iphostmaster@microsoft.com
OrgTechRef: https://rdap.arin.net/registry/entity/IPHOS5-ARIN
OrgTechHandle: SINGH683-ARIN
OrgTechName: Singh, Prachi
OrgTechPhone: +1-425-707-5601
OrgTechEmail: pracsin@microsoft.com
OrgTechRef: https://rdap.arin.net/registry/entity/SINGH683-ARIN
OrgAbuseHandle: MAC74-ARIN
OrgAbuseName: Microsoft Abuse Contact
OrgAbusePhone: +1-425-882-8080
OrgAbuseEmail: abuse@microsoft.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/MAC74-ARIN
OrgTechHandle: MRPD-ARIN
OrgTechName: Microsoft Routing, Peering, and DNS
OrgTechPhone: +1-425-882-8080
OrgTechEmail: IOC@microsoft.com
OrgTechRef: https://rdap.arin.net/registry/entity/MRPD-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.64.106.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48467
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;20.64.106.71. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025100302 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 04 11:00:46 CST 2025
;; MSG SIZE rcvd: 105
71.106.64.20.in-addr.arpa domain name pointer azpdsgrs9c08.stretchoid.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
71.106.64.20.in-addr.arpa name = azpdsgrs9c08.stretchoid.com.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
45.70.4.2 | attackbots | 3389BruteforceFW21 |
2019-11-07 02:58:50 |
193.32.160.152 | attackspam | 2019-11-06T19:35:47.142296mail01 postfix/smtpd[2007]: NOQUEUE: reject: RCPT from unknown[193.32.160.152]: 550 |
2019-11-07 02:42:07 |
1.245.61.144 | attackbotsspam | $f2bV_matches |
2019-11-07 02:40:58 |
51.38.127.31 | attackbots | Nov 6 15:19:20 web8 sshd\[2831\]: Invalid user SERVER\)2012 from 51.38.127.31 Nov 6 15:19:20 web8 sshd\[2831\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.127.31 Nov 6 15:19:22 web8 sshd\[2831\]: Failed password for invalid user SERVER\)2012 from 51.38.127.31 port 56994 ssh2 Nov 6 15:23:35 web8 sshd\[4910\]: Invalid user VFREDCxswqaz from 51.38.127.31 Nov 6 15:23:35 web8 sshd\[4910\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.127.31 |
2019-11-07 03:16:59 |
71.126.167.89 | attack | Nov 6 18:25:21 localhost sshd\[30780\]: Invalid user git from 71.126.167.89 port 54106 Nov 6 18:25:21 localhost sshd\[30780\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.126.167.89 Nov 6 18:25:23 localhost sshd\[30780\]: Failed password for invalid user git from 71.126.167.89 port 54106 ssh2 |
2019-11-07 03:02:14 |
112.85.42.186 | attackspambots | Nov 7 00:00:58 areeb-Workstation sshd[2756]: Failed password for root from 112.85.42.186 port 33866 ssh2 ... |
2019-11-07 02:42:56 |
200.68.133.148 | attackspambots | $f2bV_matches |
2019-11-07 02:34:15 |
182.61.133.172 | attack | Nov 6 19:16:55 server sshd\[16153\]: Invalid user godzila from 182.61.133.172 Nov 6 19:16:55 server sshd\[16153\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.133.172 Nov 6 19:16:57 server sshd\[16153\]: Failed password for invalid user godzila from 182.61.133.172 port 57426 ssh2 Nov 6 19:44:30 server sshd\[23336\]: Invalid user xzhr from 182.61.133.172 Nov 6 19:44:30 server sshd\[23336\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.133.172 ... |
2019-11-07 02:41:21 |
41.41.53.3 | attackbots | Nov 6 15:36:36 vmd17057 sshd\[21821\]: Invalid user admin from 41.41.53.3 port 33498 Nov 6 15:36:36 vmd17057 sshd\[21821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.41.53.3 Nov 6 15:36:38 vmd17057 sshd\[21821\]: Failed password for invalid user admin from 41.41.53.3 port 33498 ssh2 ... |
2019-11-07 03:01:04 |
182.61.176.53 | attackbotsspam | Nov 6 21:32:54 itv-usvr-02 sshd[11769]: Invalid user admco from 182.61.176.53 port 34546 Nov 6 21:32:54 itv-usvr-02 sshd[11769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.176.53 Nov 6 21:32:54 itv-usvr-02 sshd[11769]: Invalid user admco from 182.61.176.53 port 34546 Nov 6 21:32:56 itv-usvr-02 sshd[11769]: Failed password for invalid user admco from 182.61.176.53 port 34546 ssh2 Nov 6 21:37:08 itv-usvr-02 sshd[11787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.176.53 user=root Nov 6 21:37:09 itv-usvr-02 sshd[11787]: Failed password for root from 182.61.176.53 port 46862 ssh2 |
2019-11-07 02:39:40 |
222.186.180.147 | attack | Nov 6 19:43:37 MK-Soft-Root1 sshd[25751]: Failed password for root from 222.186.180.147 port 49388 ssh2 Nov 6 19:43:41 MK-Soft-Root1 sshd[25751]: Failed password for root from 222.186.180.147 port 49388 ssh2 ... |
2019-11-07 02:51:22 |
194.55.187.3 | attackspambots | Unauthorised access (Nov 6) SRC=194.55.187.3 LEN=40 TTL=241 ID=54321 TCP DPT=21 WINDOW=65535 SYN Unauthorised access (Nov 5) SRC=194.55.187.3 LEN=40 TTL=237 ID=54321 TCP DPT=3306 WINDOW=65535 SYN |
2019-11-07 03:17:26 |
89.248.168.51 | attackspam | Connection by 89.248.168.51 on port: 4022 got caught by honeypot at 11/6/2019 5:42:21 PM |
2019-11-07 03:14:41 |
41.57.188.192 | attackbotsspam | Automatic report - Port Scan Attack |
2019-11-07 03:07:11 |
178.59.197.62 | attackspam | Chat Spam |
2019-11-07 02:33:48 |