城市(city): Aïn Taya
省份(region): Alger
国家(country): Algeria
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 45.130.168.0 - 45.132.79.255
CIDR: 45.132.0.0/18, 45.130.168.0/21, 45.131.0.0/16, 45.130.192.0/18, 45.132.64.0/20, 45.130.176.0/20
NetName: RIPE
NetHandle: NET-45-130-168-0-1
Parent: NET45 (NET-45-0-0-0-0)
NetType: Early Registrations, Transferred to RIPE NCC
OriginAS:
Organization: RIPE Network Coordination Centre (RIPE)
RegDate: 2014-05-22
Updated: 2025-02-10
Comment: These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref: https://rdap.arin.net/registry/ip/45.130.168.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois.ripe.net
OrgName: RIPE Network Coordination Centre
OrgId: RIPE
Address: P.O. Box 10096
City: Amsterdam
StateProv:
PostalCode: 1001EB
Country: NL
RegDate:
Updated: 2013-07-29
Ref: https://rdap.arin.net/registry/entity/RIPE
ReferralServer: whois.ripe.net
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName: Abuse Contact
OrgAbusePhone: +31205354444
OrgAbuseEmail: abuse@ripe.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3850-ARIN
OrgTechHandle: RNO29-ARIN
OrgTechName: RIPE NCC Operations
OrgTechPhone: +31 20 535 4444
OrgTechEmail: hostmaster@ripe.net
OrgTechRef: https://rdap.arin.net/registry/entity/RNO29-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.130.203.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13939
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;45.130.203.132. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026033101 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 01 01:30:07 CST 2026
;; MSG SIZE rcvd: 107
Host 132.203.130.45.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 132.203.130.45.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 192.166.132.180 | attackspam | IP: 192.166.132.180 ASN: AS56526 PC Media Zmijov Port: Simple Mail Transfer 25 Found in one or more Blacklists Date: 29/07/2019 5:34:35 PM UTC |
2019-07-30 07:39:12 |
| 196.61.33.126 | attackbots | IP: 196.61.33.126 ASN: AS37012 Comsys (GH) Limited Port: Simple Mail Transfer 25 Found in one or more Blacklists Date: 29/07/2019 5:34:48 PM UTC |
2019-07-30 07:33:38 |
| 148.70.54.83 | attack | 2019-07-29T22:32:37.259887abusebot-2.cloudsearch.cf sshd\[3057\]: Invalid user usuario1 from 148.70.54.83 port 56590 |
2019-07-30 06:56:02 |
| 185.66.254.138 | attack | IP: 185.66.254.138 ASN: AS12997 OJSC Kyrgyztelecom Port: Simple Mail Transfer 25 Found in one or more Blacklists Date: 29/07/2019 5:34:26 PM UTC |
2019-07-30 07:43:34 |
| 58.42.238.216 | attackspam | IP: 58.42.238.216 ASN: AS4134 No.31 Jin-rong Street Port: Simple Mail Transfer 25 Found in one or more Blacklists Date: 29/07/2019 5:35:38 PM UTC |
2019-07-30 07:13:52 |
| 185.177.0.61 | attack | IP: 185.177.0.61 ASN: AS51346 Opened Joint Stock Company Tojiktelecom Port: Simple Mail Transfer 25 Found in one or more Blacklists Date: 29/07/2019 5:34:24 PM UTC |
2019-07-30 07:43:50 |
| 197.253.75.3 | attackbotsspam | 2019-07-29T17:36:14.013653abusebot-4.cloudsearch.cf sshd\[22844\]: Invalid user eg from 197.253.75.3 port 46802 |
2019-07-30 06:55:36 |
| 5.219.45.25 | attackbotsspam | IP: 5.219.45.25 ASN: AS58224 Iran Telecommunication Company PJS Port: Simple Mail Transfer 25 Found in one or more Blacklists Date: 29/07/2019 5:35:36 PM UTC |
2019-07-30 07:15:30 |
| 104.206.128.18 | attackbotsspam | Automatic report - Port Scan Attack |
2019-07-30 06:57:33 |
| 193.36.119.32 | attackspam | Jul 29 18:57:37 server378 sshd[2529450]: Invalid user alex from 193.36.119.32 Jul 29 18:57:37 server378 sshd[2529450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.36.119.32 Jul 29 18:57:40 server378 sshd[2529450]: Failed password for invalid user alex from 193.36.119.32 port 40608 ssh2 Jul 29 18:57:40 server378 sshd[2529450]: Received disconnect from 193.36.119.32: 11: Bye Bye [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=193.36.119.32 |
2019-07-30 07:10:44 |
| 45.31.122.143 | attackbots | Jul 30 00:50:07 srv-4 sshd\[18101\]: Invalid user pi from 45.31.122.143 Jul 30 00:50:07 srv-4 sshd\[18102\]: Invalid user pi from 45.31.122.143 Jul 30 00:50:07 srv-4 sshd\[18101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.31.122.143 ... |
2019-07-30 07:01:36 |
| 45.116.106.237 | attack | IP: 45.116.106.237 ASN: AS133647 ELXIRE DATA SERVICES PVT. LTD. Port: Simple Mail Transfer 25 Found in one or more Blacklists Date: 29/07/2019 5:35:31 PM UTC |
2019-07-30 07:17:58 |
| 59.167.178.41 | attack | 29.07.2019 23:00:35 SSH access blocked by firewall |
2019-07-30 07:10:10 |
| 77.87.98.174 | attackspambots | IP: 77.87.98.174 ASN: AS43182 ITT Ltd. Port: Simple Mail Transfer 25 Found in one or more Blacklists Date: 29/07/2019 5:35:53 PM UTC |
2019-07-30 07:06:42 |
| 1.180.64.86 | attack | Brute force attack stopped by firewall |
2019-07-30 07:25:33 |