城市(city): unknown
省份(region): unknown
国家(country): Portugal
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 45.156.129.32 | attack | Malicious IP |
2024-06-11 21:03:25 |
| 45.156.129.23 | attack | hacking |
2024-02-21 16:21:38 |
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 45.154.220.0 - 45.157.167.255
CIDR: 45.154.224.0/19, 45.155.0.0/16, 45.156.0.0/16, 45.157.160.0/21, 45.157.0.0/17, 45.157.128.0/19, 45.154.220.0/22
NetName: RIPE
NetHandle: NET-45-154-220-0-1
Parent: NET45 (NET-45-0-0-0-0)
NetType: Early Registrations, Transferred to RIPE NCC
OriginAS:
Organization: RIPE Network Coordination Centre (RIPE)
RegDate: 2014-05-22
Updated: 2025-02-10
Comment: These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref: https://rdap.arin.net/registry/ip/45.154.220.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois.ripe.net
OrgName: RIPE Network Coordination Centre
OrgId: RIPE
Address: P.O. Box 10096
City: Amsterdam
StateProv:
PostalCode: 1001EB
Country: NL
RegDate:
Updated: 2013-07-29
Ref: https://rdap.arin.net/registry/entity/RIPE
ReferralServer: whois.ripe.net
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName: Abuse Contact
OrgAbusePhone: +31205354444
OrgAbuseEmail: abuse@ripe.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3850-ARIN
OrgTechHandle: RNO29-ARIN
OrgTechName: RIPE NCC Operations
OrgTechPhone: +31 20 535 4444
OrgTechEmail: hostmaster@ripe.net
OrgTechRef: https://rdap.arin.net/registry/entity/RNO29-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.156.129.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28019
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;45.156.129.161. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026051802 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 19 13:30:08 CST 2026
;; MSG SIZE rcvd: 107
161.129.156.45.in-addr.arpa domain name pointer sh-chi-us-gp6-wk126b.internet-census.org.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
161.129.156.45.in-addr.arpa name = sh-chi-us-gp6-wk126b.internet-census.org.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 116.0.20.107 | attackspambots | Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools |
2019-10-08 19:07:17 |
| 111.207.49.186 | attackspambots | Jul 2 03:06:57 dallas01 sshd[12368]: Failed password for invalid user cloudcloud from 111.207.49.186 port 47854 ssh2 Jul 2 03:09:00 dallas01 sshd[12603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.207.49.186 Jul 2 03:09:02 dallas01 sshd[12603]: Failed password for invalid user 111111 from 111.207.49.186 port 36042 ssh2 |
2019-10-08 18:58:09 |
| 111.225.216.6 | attackbotsspam | Apr 14 12:53:17 ubuntu sshd[32665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.225.216.6 Apr 14 12:53:20 ubuntu sshd[32665]: Failed password for invalid user firefart from 111.225.216.6 port 16013 ssh2 Apr 14 12:55:23 ubuntu sshd[544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.225.216.6 Apr 14 12:55:25 ubuntu sshd[544]: Failed password for invalid user files from 111.225.216.6 port 35375 ssh2 |
2019-10-08 18:50:01 |
| 2.191.201.202 | attackbotsspam | Automatic report - Port Scan Attack |
2019-10-08 19:00:22 |
| 222.186.180.8 | attack | Oct 8 12:48:06 tux-35-217 sshd\[12446\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.8 user=root Oct 8 12:48:09 tux-35-217 sshd\[12446\]: Failed password for root from 222.186.180.8 port 50218 ssh2 Oct 8 12:48:14 tux-35-217 sshd\[12446\]: Failed password for root from 222.186.180.8 port 50218 ssh2 Oct 8 12:48:18 tux-35-217 sshd\[12446\]: Failed password for root from 222.186.180.8 port 50218 ssh2 ... |
2019-10-08 18:48:47 |
| 198.108.67.91 | attackbots | " " |
2019-10-08 19:05:11 |
| 193.56.28.173 | attackspambots | postfix-failedauth jail [ma] |
2019-10-08 19:03:40 |
| 68.183.54.37 | attackbots | Oct 6 16:57:15 server3 sshd[780649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.54.37 user=r.r Oct 6 16:57:17 server3 sshd[780649]: Failed password for r.r from 68.183.54.37 port 36938 ssh2 Oct 6 16:57:17 server3 sshd[780649]: Received disconnect from 68.183.54.37: 11: Bye Bye [preauth] Oct 6 17:16:53 server3 sshd[781167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.54.37 user=r.r Oct 6 17:16:55 server3 sshd[781167]: Failed password for r.r from 68.183.54.37 port 52518 ssh2 Oct 6 17:16:55 server3 sshd[781167]: Received disconnect from 68.183.54.37: 11: Bye Bye [preauth] Oct 6 17:20:41 server3 sshd[781261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.54.37 user=r.r Oct 6 17:20:43 server3 sshd[781261]: Failed password for r.r from 68.183.54.37 port 36640 ssh2 Oct 6 23:32:25 server3 sshd[793419]: pam_unix(sshd........ ------------------------------- |
2019-10-08 19:01:48 |
| 122.162.11.78 | attack | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/122.162.11.78/ US - 1H : (246) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : US NAME ASN : ASN24560 IP : 122.162.11.78 CIDR : 122.162.0.0/20 PREFIX COUNT : 1437 UNIQUE IP COUNT : 2610176 WYKRYTE ATAKI Z ASN24560 : 1H - 1 3H - 3 6H - 3 12H - 4 24H - 7 DateTime : 2019-10-08 05:51:10 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-10-08 18:53:56 |
| 171.99.253.119 | attackbotsspam | " " |
2019-10-08 19:12:43 |
| 111.204.26.202 | attackspambots | Sep 15 02:30:32 dallas01 sshd[4061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.204.26.202 Sep 15 02:30:34 dallas01 sshd[4061]: Failed password for invalid user distccd from 111.204.26.202 port 13360 ssh2 Sep 15 02:34:47 dallas01 sshd[4627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.204.26.202 |
2019-10-08 19:11:44 |
| 125.212.192.140 | attack | FTP/21 MH Probe, BF, Hack - |
2019-10-08 19:19:53 |
| 111.230.112.37 | attack | vps1:pam-generic |
2019-10-08 18:45:18 |
| 111.207.105.199 | attackspam | 2019-10-07 21:53:47,646 fail2ban.actions [843]: NOTICE [sshd] Ban 111.207.105.199 2019-10-08 00:58:04,554 fail2ban.actions [843]: NOTICE [sshd] Ban 111.207.105.199 2019-10-08 04:05:15,186 fail2ban.actions [843]: NOTICE [sshd] Ban 111.207.105.199 ... |
2019-10-08 19:04:21 |
| 171.84.2.31 | attackbotsspam | May 20 03:48:52 ubuntu sshd[9588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.84.2.31 May 20 03:48:54 ubuntu sshd[9588]: Failed password for invalid user upload from 171.84.2.31 port 60226 ssh2 May 20 03:53:01 ubuntu sshd[9809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.84.2.31 May 20 03:53:03 ubuntu sshd[9809]: Failed password for invalid user twofirst from 171.84.2.31 port 20136 ssh2 |
2019-10-08 19:15:13 |