城市(city): Hong Kong
省份(region): unknown
国家(country): Hong Kong
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 45.139.136.0 - 45.150.51.255
CIDR: 45.144.0.0/14, 45.150.48.0/22, 45.139.144.0/20, 45.139.160.0/19, 45.148.0.0/15, 45.139.136.0/21, 45.139.192.0/18, 45.140.0.0/14, 45.150.0.0/19, 45.150.32.0/20
NetName: RIPE
NetHandle: NET-45-139-136-0-1
Parent: NET45 (NET-45-0-0-0-0)
NetType: Early Registrations, Transferred to RIPE NCC
OriginAS:
Organization: RIPE Network Coordination Centre (RIPE)
RegDate: 2014-05-22
Updated: 2025-04-14
Comment: These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref: https://rdap.arin.net/registry/ip/45.139.136.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois.ripe.net
OrgName: RIPE Network Coordination Centre
OrgId: RIPE
Address: P.O. Box 10096
City: Amsterdam
StateProv:
PostalCode: 1001EB
Country: NL
RegDate:
Updated: 2013-07-29
Ref: https://rdap.arin.net/registry/entity/RIPE
ReferralServer: whois.ripe.net
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName: Abuse Contact
OrgAbusePhone: +31205354444
OrgAbuseEmail: abuse@ripe.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3850-ARIN
OrgTechHandle: RNO29-ARIN
OrgTechName: RIPE NCC Operations
OrgTechPhone: +31 20 535 4444
OrgTechEmail: hostmaster@ripe.net
OrgTechRef: https://rdap.arin.net/registry/entity/RNO29-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.142.154.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49749
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;45.142.154.103. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042500 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 25 21:00:11 CST 2026
;; MSG SIZE rcvd: 107
Host 103.154.142.45.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 103.154.142.45.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 92.63.197.61 | attack | [N1.H1.VM1] Port Scanner Detected Blocked by UFW |
2020-09-27 22:32:56 |
| 167.172.156.12 | attackbots | Sep 27 11:26:26 |
2020-09-27 22:36:55 |
| 51.116.112.29 | attack | 2020-09-26 UTC: (2x) - 13.251.1.166,admin |
2020-09-27 22:46:46 |
| 192.241.217.152 | attackspam | 192.241.217.152 - - [27/Sep/2020:15:13:51 +0100] "GET /owa/auth/logon.aspx?url=https%3a%2f%2f1%2fecp%2f HTTP/1.1" 401 188 "-" "Mozilla/5.0 zgrab/0.x" |
2020-09-27 22:59:31 |
| 211.238.147.200 | attackspam | Sep 27 13:08:51 vps-51d81928 sshd[422678]: Invalid user ela from 211.238.147.200 port 50316 Sep 27 13:08:51 vps-51d81928 sshd[422678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.238.147.200 Sep 27 13:08:51 vps-51d81928 sshd[422678]: Invalid user ela from 211.238.147.200 port 50316 Sep 27 13:08:53 vps-51d81928 sshd[422678]: Failed password for invalid user ela from 211.238.147.200 port 50316 ssh2 Sep 27 13:12:37 vps-51d81928 sshd[422711]: Invalid user scaner from 211.238.147.200 port 53462 ... |
2020-09-27 23:07:35 |
| 60.209.24.197 | attack | 11211/udp [2020-09-26]1pkt |
2020-09-27 22:52:05 |
| 176.88.31.44 | attack | 53458/udp [2020-09-26]1pkt |
2020-09-27 22:30:37 |
| 59.23.248.85 | attackbotsspam | 23/tcp [2020-09-26]1pkt |
2020-09-27 23:04:49 |
| 193.41.131.40 | attackbots | 445/tcp [2020-09-26]1pkt |
2020-09-27 22:55:30 |
| 222.186.15.62 | attackspambots | 2020-09-27T14:40:04.800614abusebot-2.cloudsearch.cf sshd[32208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62 user=root 2020-09-27T14:40:06.617853abusebot-2.cloudsearch.cf sshd[32208]: Failed password for root from 222.186.15.62 port 54458 ssh2 2020-09-27T14:40:08.765275abusebot-2.cloudsearch.cf sshd[32208]: Failed password for root from 222.186.15.62 port 54458 ssh2 2020-09-27T14:40:04.800614abusebot-2.cloudsearch.cf sshd[32208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62 user=root 2020-09-27T14:40:06.617853abusebot-2.cloudsearch.cf sshd[32208]: Failed password for root from 222.186.15.62 port 54458 ssh2 2020-09-27T14:40:08.765275abusebot-2.cloudsearch.cf sshd[32208]: Failed password for root from 222.186.15.62 port 54458 ssh2 2020-09-27T14:40:04.800614abusebot-2.cloudsearch.cf sshd[32208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruse ... |
2020-09-27 22:43:08 |
| 13.68.147.197 | attack | Invalid user bitrix from 13.68.147.197 port 64307 |
2020-09-27 22:57:41 |
| 218.92.0.165 | attack | Sep 27 16:30:28 prod4 sshd\[24018\]: Failed password for root from 218.92.0.165 port 36070 ssh2 Sep 27 16:30:31 prod4 sshd\[24018\]: Failed password for root from 218.92.0.165 port 36070 ssh2 Sep 27 16:30:34 prod4 sshd\[24018\]: Failed password for root from 218.92.0.165 port 36070 ssh2 ... |
2020-09-27 22:37:21 |
| 180.232.81.71 | attack | 445/tcp [2020-09-26]1pkt |
2020-09-27 22:36:37 |
| 52.247.66.65 | attackbotsspam | Invalid user 252 from 52.247.66.65 port 57228 |
2020-09-27 22:50:03 |
| 178.128.51.253 | attack | (sshd) Failed SSH login from 178.128.51.253 (SG/Singapore/-): 5 in the last 3600 secs |
2020-09-27 22:34:10 |