城市(city): San Jose
省份(region): California
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 57.0.0.0 - 57.255.255.255
CIDR: 57.0.0.0/8
NetName: RIPE-ERX-57
NetHandle: NET-57-0-0-0-1
Parent: ()
NetType: Early Registrations, Maintained by RIPE NCC
OriginAS:
Organization: RIPE Network Coordination Centre (RIPE)
RegDate: 1993-06-21
Updated: 2025-02-10
Comment: These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref: https://rdap.arin.net/registry/ip/57.0.0.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois.ripe.net
OrgName: RIPE Network Coordination Centre
OrgId: RIPE
Address: P.O. Box 10096
City: Amsterdam
StateProv:
PostalCode: 1001EB
Country: NL
RegDate:
Updated: 2013-07-29
Ref: https://rdap.arin.net/registry/entity/RIPE
ReferralServer: whois.ripe.net
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName: Abuse Contact
OrgAbusePhone: +31205354444
OrgAbuseEmail: abuse@ripe.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3850-ARIN
OrgTechHandle: RNO29-ARIN
OrgTechName: RIPE NCC Operations
OrgTechPhone: +31 20 535 4444
OrgTechEmail: hostmaster@ripe.net
OrgTechRef: https://rdap.arin.net/registry/entity/RNO29-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 57.141.2.35
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62972
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;57.141.2.35. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026051301 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 14 10:21:32 CST 2026
;; MSG SIZE rcvd: 104
Host 35.2.141.57.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 35.2.141.57.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 124.29.236.163 | attackspambots | Mar 9 09:09:56 gw1 sshd[3969]: Failed password for root from 124.29.236.163 port 52208 ssh2 Mar 9 09:18:27 gw1 sshd[4193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.29.236.163 ... |
2020-03-09 12:36:13 |
| 185.175.93.27 | attackbots | 03/08/2020-23:55:37.621164 185.175.93.27 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-03-09 12:07:01 |
| 192.99.70.208 | attackspambots | 2020-03-09T04:46:50.940912vps751288.ovh.net sshd\[31266\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.ip-192-99-70.net user=root 2020-03-09T04:46:52.637527vps751288.ovh.net sshd\[31266\]: Failed password for root from 192.99.70.208 port 54336 ssh2 2020-03-09T04:55:11.578055vps751288.ovh.net sshd\[31330\]: Invalid user nodeserver from 192.99.70.208 port 60394 2020-03-09T04:55:11.587666vps751288.ovh.net sshd\[31330\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.ip-192-99-70.net 2020-03-09T04:55:13.730140vps751288.ovh.net sshd\[31330\]: Failed password for invalid user nodeserver from 192.99.70.208 port 60394 ssh2 |
2020-03-09 12:21:54 |
| 36.88.33.146 | attackbotsspam | 1583726139 - 03/09/2020 04:55:39 Host: 36.88.33.146/36.88.33.146 Port: 445 TCP Blocked |
2020-03-09 12:04:46 |
| 14.186.172.127 | attackbotsspam | Mar 9 04:55:26 odroid64 sshd\[30904\]: Invalid user admin from 14.186.172.127 Mar 9 04:55:26 odroid64 sshd\[30904\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.186.172.127 ... |
2020-03-09 12:10:53 |
| 46.101.81.143 | attack | 2020-03-09T04:07:11.269142shield sshd\[23526\]: Invalid user com from 46.101.81.143 port 41322 2020-03-09T04:07:11.273744shield sshd\[23526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.81.143 2020-03-09T04:07:13.588671shield sshd\[23526\]: Failed password for invalid user com from 46.101.81.143 port 41322 ssh2 2020-03-09T04:11:00.474819shield sshd\[24201\]: Invalid user P@ssword2000 from 46.101.81.143 port 50078 2020-03-09T04:11:00.478747shield sshd\[24201\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.81.143 |
2020-03-09 12:14:12 |
| 222.186.175.215 | attack | Mar 9 05:34:48 [host] sshd[26821]: pam_unix(sshd: Mar 9 05:34:50 [host] sshd[26821]: Failed passwor Mar 9 05:34:53 [host] sshd[26821]: Failed passwor |
2020-03-09 12:40:45 |
| 209.141.46.240 | attack | Mar 9 05:23:24 sd-53420 sshd\[17105\]: Invalid user 1q2a3z4w5s6x from 209.141.46.240 Mar 9 05:23:24 sd-53420 sshd\[17105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.46.240 Mar 9 05:23:27 sd-53420 sshd\[17105\]: Failed password for invalid user 1q2a3z4w5s6x from 209.141.46.240 port 40682 ssh2 Mar 9 05:27:00 sd-53420 sshd\[17467\]: Invalid user 123abC from 209.141.46.240 Mar 9 05:27:00 sd-53420 sshd\[17467\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.46.240 ... |
2020-03-09 12:41:41 |
| 51.178.78.153 | attack | firewall-block, port(s): 389/tcp, 2376/tcp, 5443/tcp, 5632/tcp, 6881/tcp, 8140/tcp |
2020-03-09 09:37:49 |
| 65.182.2.241 | attackbotsspam | 2020-03-08T21:55:39.571729linuxbox-skyline sshd[52110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.182.2.241 user=git 2020-03-08T21:55:41.555286linuxbox-skyline sshd[52110]: Failed password for git from 65.182.2.241 port 35286 ssh2 ... |
2020-03-09 12:03:14 |
| 93.119.205.44 | attack | port scan and connect, tcp 23 (telnet) |
2020-03-09 12:36:45 |
| 45.55.219.114 | attack | Mar 9 00:55:24 vps46666688 sshd[13116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.219.114 Mar 9 00:55:26 vps46666688 sshd[13116]: Failed password for invalid user mongodb from 45.55.219.114 port 51188 ssh2 ... |
2020-03-09 12:10:32 |
| 61.77.48.138 | attackspam | Mar 9 04:58:03 Ubuntu-1404-trusty-64-minimal sshd\[30256\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.77.48.138 user=root Mar 9 04:58:05 Ubuntu-1404-trusty-64-minimal sshd\[30256\]: Failed password for root from 61.77.48.138 port 38468 ssh2 Mar 9 05:04:55 Ubuntu-1404-trusty-64-minimal sshd\[5210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.77.48.138 user=root Mar 9 05:04:57 Ubuntu-1404-trusty-64-minimal sshd\[5210\]: Failed password for root from 61.77.48.138 port 43284 ssh2 Mar 9 05:08:16 Ubuntu-1404-trusty-64-minimal sshd\[6238\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.77.48.138 user=root |
2020-03-09 12:27:18 |
| 49.73.235.149 | attack | Mar 9 00:32:08 124388 sshd[11888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.73.235.149 Mar 9 00:32:08 124388 sshd[11888]: Invalid user chencaiping from 49.73.235.149 port 50980 Mar 9 00:32:09 124388 sshd[11888]: Failed password for invalid user chencaiping from 49.73.235.149 port 50980 ssh2 Mar 9 00:35:41 124388 sshd[11895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.73.235.149 user=root Mar 9 00:35:43 124388 sshd[11895]: Failed password for root from 49.73.235.149 port 51366 ssh2 |
2020-03-09 09:38:14 |
| 89.248.160.150 | attack | 89.248.160.150 was recorded 15 times by 9 hosts attempting to connect to the following ports: 40773,40767,40772. Incident counter (4h, 24h, all-time): 15, 104, 7103 |
2020-03-09 12:33:19 |