城市(city): Los Angeles
省份(region): California
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 45.43.32.0 - 45.43.63.255
CIDR: 45.43.32.0/19
NetName: ZEN-X-002
NetHandle: NET-45-43-32-0-1
Parent: NET45 (NET-45-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Zenlayer Inc (ZENLA-7)
RegDate: 2015-03-27
Updated: 2018-02-27
Ref: https://rdap.arin.net/registry/ip/45.43.32.0
OrgName: Zenlayer Inc
OrgId: ZENLA-7
Address: 21680 Gateway Center Dr. Suite 350
City: Diamond Bar
StateProv: CA
PostalCode: 91765
Country: US
RegDate: 2017-12-27
Updated: 2025-09-04
Ref: https://rdap.arin.net/registry/entity/ZENLA-7
OrgNOCHandle: IPNOC27-ARIN
OrgNOCName: IPNOC
OrgNOCPhone: +1-800-858-7986
OrgNOCEmail: ipnoc-t3@zenlayer.com
OrgNOCRef: https://rdap.arin.net/registry/entity/IPNOC27-ARIN
OrgAbuseHandle: SOCOP-ARIN
OrgAbuseName: SOC Ops
OrgAbusePhone: +1-909-718-3558
OrgAbuseEmail: abuse@zenlayer.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/SOCOP-ARIN
OrgTechHandle: IPADM641-ARIN
OrgTechName: IP ADMIN
OrgTechPhone: +1-909-718-3558
OrgTechEmail: ipadmin@zenlayer.com
OrgTechRef: https://rdap.arin.net/registry/entity/IPADM641-ARIN
OrgNOCHandle: IPADM641-ARIN
OrgNOCName: IP ADMIN
OrgNOCPhone: +1-909-718-3558
OrgNOCEmail: ipadmin@zenlayer.com
OrgNOCRef: https://rdap.arin.net/registry/entity/IPADM641-ARIN
OrgTechHandle: TANGR16-ARIN
OrgTechName: Tang, Ruifan
OrgTechPhone: +1-800-858-7986
OrgTechEmail: ruifan.tang@zenlayer.com
OrgTechRef: https://rdap.arin.net/registry/entity/TANGR16-ARIN
OrgTechHandle: IPNOC27-ARIN
OrgTechName: IPNOC
OrgTechPhone: +1-800-858-7986
OrgTechEmail: ipnoc-t3@zenlayer.com
OrgTechRef: https://rdap.arin.net/registry/entity/IPNOC27-ARIN
# end
# start
NetRange: 45.43.58.0 - 45.43.58.255
CIDR: 45.43.58.0/24
NetName: ZL-HKG-UCLOUD-0056
NetHandle: NET-45-43-58-0-1
Parent: ZEN-X-002 (NET-45-43-32-0-1)
NetType: Reassigned
OriginAS:
Organization: UCLOUD (UCLOU-1)
RegDate: 2019-03-29
Updated: 2019-03-29
Comment: Abuse please contact:unoc@ucloud.cn ,unom@ucloud.cn,hegui@ucloud.cn
Ref: https://rdap.arin.net/registry/ip/45.43.58.0
OrgName: UCLOUD
OrgId: UCLOU-1
Address: FLAT/RM 603 6/ FLAWS COMMERCIAL PLAZA 788 CHEUNG SHA WAN ROAD KL
City: Hong Kong
StateProv:
PostalCode:
Country: HK
RegDate: 2019-02-28
Updated: 2019-02-28
Ref: https://rdap.arin.net/registry/entity/UCLOU-1
OrgTechHandle: IAU2-ARIN
OrgTechName: IP ABUSE Ucloud
OrgTechPhone: +86 17721465033
OrgTechEmail: unoc@ucloud.cn
OrgTechRef: https://rdap.arin.net/registry/entity/IAU2-ARIN
OrgAbuseHandle: IAU2-ARIN
OrgAbuseName: IP ABUSE Ucloud
OrgAbusePhone: +86 17721465033
OrgAbuseEmail: unoc@ucloud.cn
OrgAbuseRef: https://rdap.arin.net/registry/entity/IAU2-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.43.58.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43369
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;45.43.58.106. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026050400 1800 900 604800 86400
;; Query time: 152 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 04 17:30:16 CST 2026
;; MSG SIZE rcvd: 105
106.58.43.45.in-addr.arpa domain name pointer ojcgfg.cn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
106.58.43.45.in-addr.arpa name = ojcgfg.cn.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 111.231.113.236 | attack | Dec 9 18:07:59 v22018086721571380 sshd[19489]: Failed password for invalid user black from 111.231.113.236 port 43428 ssh2 Dec 9 18:16:32 v22018086721571380 sshd[20087]: Failed password for invalid user vipers from 111.231.113.236 port 44726 ssh2 |
2019-12-10 06:03:00 |
| 212.129.128.249 | attackspam | Dec 9 22:16:35 pkdns2 sshd\[19044\]: Invalid user luat from 212.129.128.249Dec 9 22:16:37 pkdns2 sshd\[19044\]: Failed password for invalid user luat from 212.129.128.249 port 54549 ssh2Dec 9 22:19:58 pkdns2 sshd\[19212\]: Invalid user test1 from 212.129.128.249Dec 9 22:20:00 pkdns2 sshd\[19212\]: Failed password for invalid user test1 from 212.129.128.249 port 40946 ssh2Dec 9 22:23:34 pkdns2 sshd\[19457\]: Invalid user vic from 212.129.128.249Dec 9 22:23:37 pkdns2 sshd\[19457\]: Failed password for invalid user vic from 212.129.128.249 port 55583 ssh2 ... |
2019-12-10 05:39:51 |
| 104.190.223.19 | attack | Portscan or hack attempt detected by psad/fwsnort |
2019-12-10 06:01:58 |
| 122.174.40.167 | attack | WordPress wp-login brute force :: 122.174.40.167 0.292 - [09/Dec/2019:15:00:01 0000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 1805 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1" |
2019-12-10 05:45:34 |
| 151.66.46.30 | attack | Automatic report - Port Scan Attack |
2019-12-10 05:33:27 |
| 183.239.44.164 | attack | Dec 9 20:19:38 [host] sshd[28506]: Invalid user ching from 183.239.44.164 Dec 9 20:19:38 [host] sshd[28506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.239.44.164 Dec 9 20:19:40 [host] sshd[28506]: Failed password for invalid user ching from 183.239.44.164 port 33956 ssh2 |
2019-12-10 05:33:59 |
| 130.207.54.137 | attackspambots | Port scan on 1 port(s): 53 |
2019-12-10 05:42:33 |
| 104.168.219.7 | attack | Dec 9 16:58:31 linuxvps sshd\[38308\]: Invalid user alchemie from 104.168.219.7 Dec 9 16:58:31 linuxvps sshd\[38308\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.219.7 Dec 9 16:58:33 linuxvps sshd\[38308\]: Failed password for invalid user alchemie from 104.168.219.7 port 48058 ssh2 Dec 9 17:05:26 linuxvps sshd\[42903\]: Invalid user nfs from 104.168.219.7 Dec 9 17:05:26 linuxvps sshd\[42903\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.219.7 |
2019-12-10 06:12:23 |
| 91.214.83.202 | attackspam | Unauthorized connection attempt detected from IP address 91.214.83.202 to port 445 |
2019-12-10 05:33:06 |
| 152.136.134.111 | attackbotsspam | Dec 9 18:12:13 server sshd\[31210\]: Invalid user admin from 152.136.134.111 Dec 9 18:12:13 server sshd\[31210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.134.111 Dec 9 18:12:15 server sshd\[31210\]: Failed password for invalid user admin from 152.136.134.111 port 50722 ssh2 Dec 9 18:42:24 server sshd\[7548\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.134.111 user=root Dec 9 18:42:26 server sshd\[7548\]: Failed password for root from 152.136.134.111 port 33290 ssh2 ... |
2019-12-10 05:45:18 |
| 104.206.128.18 | attack | 52311/tcp 8444/tcp 10443/tcp... [2019-10-09/12-09]54pkt,11pt.(tcp),1pt.(udp) |
2019-12-10 05:37:58 |
| 171.244.18.14 | attackbots | Failed password for root from 171.244.18.14 port 50370 ssh2 |
2019-12-10 05:50:59 |
| 116.196.81.5 | attackspambots | Dec 9 10:38:57 home sshd[1712]: Invalid user satou from 116.196.81.5 port 38358 Dec 9 10:38:57 home sshd[1712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.81.5 Dec 9 10:38:57 home sshd[1712]: Invalid user satou from 116.196.81.5 port 38358 Dec 9 10:38:59 home sshd[1712]: Failed password for invalid user satou from 116.196.81.5 port 38358 ssh2 Dec 9 10:45:40 home sshd[3687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.81.5 user=root Dec 9 10:45:42 home sshd[3687]: Failed password for root from 116.196.81.5 port 38252 ssh2 Dec 9 10:52:21 home sshd[3724]: Invalid user ingelin from 116.196.81.5 port 38176 Dec 9 10:52:21 home sshd[3724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.81.5 Dec 9 10:52:21 home sshd[3724]: Invalid user ingelin from 116.196.81.5 port 38176 Dec 9 10:52:22 home sshd[3724]: Failed password for invalid user ingelin from 116.19 |
2019-12-10 05:46:24 |
| 87.120.36.152 | attackbotsspam | 87.120.36.152 has been banned for [spam] ... |
2019-12-10 05:56:52 |
| 221.125.165.59 | attackbotsspam | Dec 9 18:57:34 wh01 sshd[31148]: Failed password for root from 221.125.165.59 port 40730 ssh2 Dec 9 18:57:34 wh01 sshd[31148]: Received disconnect from 221.125.165.59 port 40730:11: Bye Bye [preauth] Dec 9 18:57:34 wh01 sshd[31148]: Disconnected from 221.125.165.59 port 40730 [preauth] Dec 9 19:12:59 wh01 sshd[399]: Failed password for root from 221.125.165.59 port 57544 ssh2 Dec 9 19:12:59 wh01 sshd[399]: Received disconnect from 221.125.165.59 port 57544:11: Bye Bye [preauth] Dec 9 19:12:59 wh01 sshd[399]: Disconnected from 221.125.165.59 port 57544 [preauth] Dec 9 19:18:43 wh01 sshd[931]: Failed password for root from 221.125.165.59 port 46778 ssh2 Dec 9 19:18:43 wh01 sshd[931]: Received disconnect from 221.125.165.59 port 46778:11: Bye Bye [preauth] Dec 9 19:18:43 wh01 sshd[931]: Disconnected from 221.125.165.59 port 46778 [preauth] Dec 9 19:42:12 wh01 sshd[2997]: Invalid user ceo from 221.125.165.59 port 58394 Dec 9 19:42:12 wh01 sshd[2997]: Failed password for invalid |
2019-12-10 06:03:15 |