城市(city): Kuala Lumpur
省份(region): Kuala Lumpur
国家(country): Malaysia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 45.89.52.0 - 45.91.107.255
CIDR: 45.91.64.0/19, 45.91.0.0/18, 45.89.64.0/18, 45.90.0.0/16, 45.91.96.0/21, 45.89.56.0/21, 45.89.128.0/17, 45.89.52.0/22, 45.91.104.0/22
NetName: RIPE
NetHandle: NET-45-89-52-0-1
Parent: NET45 (NET-45-0-0-0-0)
NetType: Early Registrations, Transferred to RIPE NCC
OriginAS:
Organization: RIPE Network Coordination Centre (RIPE)
RegDate: 2014-09-05
Updated: 2025-02-10
Comment: These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref: https://rdap.arin.net/registry/ip/45.89.52.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois.ripe.net
OrgName: RIPE Network Coordination Centre
OrgId: RIPE
Address: P.O. Box 10096
City: Amsterdam
StateProv:
PostalCode: 1001EB
Country: NL
RegDate:
Updated: 2013-07-29
Ref: https://rdap.arin.net/registry/entity/RIPE
ReferralServer: whois.ripe.net
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
OrgTechHandle: RNO29-ARIN
OrgTechName: RIPE NCC Operations
OrgTechPhone: +31 20 535 4444
OrgTechEmail: hostmaster@ripe.net
OrgTechRef: https://rdap.arin.net/registry/entity/RNO29-ARIN
OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName: Abuse Contact
OrgAbusePhone: +31205354444
OrgAbuseEmail: abuse@ripe.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3850-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.89.107.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2985
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;45.89.107.64. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026020100 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 01 22:28:05 CST 2026
;; MSG SIZE rcvd: 105
64.107.89.45.in-addr.arpa domain name pointer u3es.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
64.107.89.45.in-addr.arpa name = u3es.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 194.26.29.10 | attack | Aug 5 01:04:10 vps339862 kernel: \[729614.004011\] \[iptables\] PORT DENIED: IN=eth0 OUT= MAC=fa:16:3e:65:a1:f6:32:a5:5e:0d:2c:d7:08:00 SRC=194.26.29.10 DST=51.254.206.43 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=58209 PROTO=TCP SPT=50174 DPT=2440 SEQ=1042949314 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 5 01:06:58 vps339862 kernel: \[729782.484590\] \[iptables\] PORT DENIED: IN=eth0 OUT= MAC=fa:16:3e:65:a1:f6:32:a5:5e:0d:2c:d7:08:00 SRC=194.26.29.10 DST=51.254.206.43 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=8357 PROTO=TCP SPT=50174 DPT=2015 SEQ=593160529 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 5 01:07:15 vps339862 kernel: \[729799.138277\] \[iptables\] PORT DENIED: IN=eth0 OUT= MAC=fa:16:3e:65:a1:f6:32:a5:5e:0d:2c:d7:08:00 SRC=194.26.29.10 DST=51.254.206.43 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=47041 PROTO=TCP SPT=50174 DPT=50900 SEQ=2107555646 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 5 01:08:01 vps339862 kernel: \[729844.941683\] \[iptables\] PORT DENIED: IN=eth0 OUT= MAC=fa:16:3e:65: ... |
2020-08-05 07:09:15 |
| 47.88.153.61 | attack | SSH brute force attempt |
2020-08-05 06:52:47 |
| 172.104.124.229 | attackspambots | trying to access non-authorized port |
2020-08-05 06:51:09 |
| 141.98.80.22 | attackbots | Multiport scan : 5 ports scanned 4910 6530 6531 6532 6533 |
2020-08-05 07:18:23 |
| 111.229.199.239 | attackbots | 2020-08-04T20:14:08.569115perso.[domain] sshd[2399321]: Failed password for root from 111.229.199.239 port 40534 ssh2 2020-08-04T20:20:13.257740perso.[domain] sshd[2402145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.199.239 user=root 2020-08-04T20:20:14.817127perso.[domain] sshd[2402145]: Failed password for root from 111.229.199.239 port 44862 ssh2 ... |
2020-08-05 07:06:33 |
| 106.52.240.160 | attack | $f2bV_matches |
2020-08-05 07:12:14 |
| 163.172.157.193 | attackbots | Aug 4 21:19:49 Ubuntu-1404-trusty-64-minimal sshd\[5818\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.157.193 user=root Aug 4 21:19:50 Ubuntu-1404-trusty-64-minimal sshd\[5818\]: Failed password for root from 163.172.157.193 port 52236 ssh2 Aug 4 22:00:15 Ubuntu-1404-trusty-64-minimal sshd\[11602\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.157.193 user=root Aug 4 22:00:17 Ubuntu-1404-trusty-64-minimal sshd\[11602\]: Failed password for root from 163.172.157.193 port 46232 ssh2 Aug 4 22:03:55 Ubuntu-1404-trusty-64-minimal sshd\[31128\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.157.193 user=root |
2020-08-05 07:19:22 |
| 111.207.91.146 | attackspambots | Aug 4 19:55:10 [host] kernel: [2230826.238639] [U Aug 4 19:55:10 [host] kernel: [2230826.238710] [U Aug 4 19:55:10 [host] kernel: [2230826.238721] [U Aug 4 19:55:10 [host] kernel: [2230826.238727] [U Aug 4 19:55:10 [host] kernel: [2230826.238733] [U Aug 4 19:55:10 [host] kernel: [2230826.238740] [U Aug 4 19:55:10 [host] kernel: [2230826.238748] [U Aug 4 19:55:10 [host] kernel: [2230826.238780] [U Aug 4 19:55:10 [host] kernel: [2230826.238791] [U |
2020-08-05 06:53:17 |
| 74.208.235.29 | attack | sshd jail - ssh hack attempt |
2020-08-05 06:44:53 |
| 185.220.101.19 | attackbotsspam | xmlrpc attack |
2020-08-05 06:44:25 |
| 156.96.47.37 | attackbots | Aug 4 22:30:07 mail postfix/smtpd[112782]: warning: unknown[156.96.47.37]: SASL LOGIN authentication failed: generic failure Aug 4 22:30:07 mail postfix/smtpd[112782]: warning: unknown[156.96.47.37]: SASL LOGIN authentication failed: generic failure Aug 4 22:30:07 mail postfix/smtpd[112782]: warning: unknown[156.96.47.37]: SASL LOGIN authentication failed: generic failure ... |
2020-08-05 06:52:10 |
| 172.104.62.98 | attackspam | 172.104.62.98 - - [05/Aug/2020:00:29:51 +0200] "POST /xmlrpc.php HTTP/1.1" 403 461 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 172.104.62.98 - - [05/Aug/2020:00:43:32 +0200] "POST /xmlrpc.php HTTP/1.1" 403 22623 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-08-05 06:46:26 |
| 192.144.226.142 | attack | SSH brute force attempt |
2020-08-05 07:16:16 |
| 43.243.214.42 | attackbotsspam | invalid user gs from 43.243.214.42 port 55424 ssh2 |
2020-08-05 06:55:34 |
| 159.203.74.227 | attack | Port scan: Attack repeated for 24 hours |
2020-08-05 07:16:33 |