城市(city): unknown
省份(region): unknown
国家(country): Switzerland
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 57.0.0.0 - 57.255.255.255
CIDR: 57.0.0.0/8
NetName: RIPE-ERX-57
NetHandle: NET-57-0-0-0-1
Parent: ()
NetType: Early Registrations, Maintained by RIPE NCC
OriginAS:
Organization: RIPE Network Coordination Centre (RIPE)
RegDate: 1993-06-21
Updated: 2025-02-10
Comment: These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref: https://rdap.arin.net/registry/ip/57.0.0.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois.ripe.net
OrgName: RIPE Network Coordination Centre
OrgId: RIPE
Address: P.O. Box 10096
City: Amsterdam
StateProv:
PostalCode: 1001EB
Country: NL
RegDate:
Updated: 2013-07-29
Ref: https://rdap.arin.net/registry/entity/RIPE
ReferralServer: whois.ripe.net
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName: Abuse Contact
OrgAbusePhone: +31205354444
OrgAbuseEmail: abuse@ripe.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3850-ARIN
OrgTechHandle: RNO29-ARIN
OrgTechName: RIPE NCC Operations
OrgTechPhone: +31 20 535 4444
OrgTechEmail: hostmaster@ripe.net
OrgTechRef: https://rdap.arin.net/registry/entity/RNO29-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 57.2.133.47
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50387
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;57.2.133.47. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032400 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 24 14:26:16 CST 2026
;; MSG SIZE rcvd: 104
Host 47.133.2.57.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 47.133.2.57.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 178.33.234.234 | attackspambots | [Aegis] @ 2019-09-15 03:51:21 0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack |
2019-09-15 17:21:30 |
| 183.13.15.68 | attack | $f2bV_matches |
2019-09-15 17:49:04 |
| 185.38.3.138 | attackbots | Sep 14 18:59:05 lcdev sshd\[26683\]: Invalid user designer from 185.38.3.138 Sep 14 18:59:05 lcdev sshd\[26683\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=pan0138.panoulu.net Sep 14 18:59:07 lcdev sshd\[26683\]: Failed password for invalid user designer from 185.38.3.138 port 45574 ssh2 Sep 14 19:03:08 lcdev sshd\[27088\]: Invalid user ftpadmin from 185.38.3.138 Sep 14 19:03:08 lcdev sshd\[27088\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=pan0138.panoulu.net |
2019-09-15 17:26:14 |
| 131.221.131.104 | attack | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-15 02:48:54,962 INFO [amun_request_handler] PortScan Detected on Port: 445 (131.221.131.104) |
2019-09-15 18:50:41 |
| 151.80.41.64 | attackbotsspam | $f2bV_matches_ltvn |
2019-09-15 18:46:00 |
| 178.93.18.43 | attack | Sep 15 01:03:56 our-server-hostname postfix/smtpd[18080]: connect from unknown[178.93.18.43] Sep x@x Sep x@x Sep x@x Sep x@x Sep x@x Sep 15 01:04:00 our-server-hostname postfix/smtpd[18080]: lost connection after RCPT from unknown[178.93.18.43] Sep 15 01:04:00 our-server-hostname postfix/smtpd[18080]: disconnect from unknown[178.93.18.43] Sep 15 01:32:00 our-server-hostname postfix/smtpd[9160]: connect from unknown[178.93.18.43] Sep x@x Sep 15 01:32:04 our-server-hostname postfix/smtpd[9160]: lost connection after RCPT from unknown[178.93.18.43] Sep 15 01:32:04 our-server-hostname postfix/smtpd[9160]: disconnect from unknown[178.93.18.43] Sep 15 04:06:52 our-server-hostname postfix/smtpd[3646]: connect from unknown[178.93.18.43] Sep x@x Sep x@x Sep x@x Sep 15 04:06:57 our-server-hostname postfix/smtpd[3646]: lost connection after RCPT from unknown[178.93.18.43] Sep 15 04:06:57 our-server-hostname postfix/smtpd[3646]: disconnect from unknown[178.93.18.43] Sep 15 05:05:28........ ------------------------------- |
2019-09-15 18:10:19 |
| 121.131.16.150 | attack | this IP tried to log into my Google account and other accounts |
2019-09-15 18:24:56 |
| 60.172.32.198 | attack | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-15 00:44:01,777 INFO [amun_request_handler] PortScan Detected on Port: 3389 (60.172.32.198) |
2019-09-15 18:23:53 |
| 23.241.82.132 | attackspam | Automatic report - Port Scan Attack |
2019-09-15 17:18:12 |
| 138.68.218.135 | attackspam | Hits on port : 8080 |
2019-09-15 17:40:19 |
| 93.115.151.232 | attackspam | Sep 15 02:50:19 thevastnessof sshd[32033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.115.151.232 ... |
2019-09-15 18:18:08 |
| 92.38.163.15 | attackspam | Sep 15 02:14:50 rb06 sshd[17737]: reveeclipse mapping checking getaddrinfo for lux.vps [92.38.163.15] failed - POSSIBLE BREAK-IN ATTEMPT! Sep 15 02:14:52 rb06 sshd[17737]: Failed password for invalid user awghamdany from 92.38.163.15 port 43040 ssh2 Sep 15 02:14:52 rb06 sshd[17737]: Received disconnect from 92.38.163.15: 11: Bye Bye [preauth] Sep 15 02:26:51 rb06 sshd[17903]: reveeclipse mapping checking getaddrinfo for lux.vps [92.38.163.15] failed - POSSIBLE BREAK-IN ATTEMPT! Sep 15 02:26:53 rb06 sshd[17903]: Failed password for invalid user user from 92.38.163.15 port 34780 ssh2 Sep 15 02:26:53 rb06 sshd[17903]: Received disconnect from 92.38.163.15: 11: Bye Bye [preauth] Sep 15 02:30:36 rb06 sshd[18347]: reveeclipse mapping checking getaddrinfo for lux.vps [92.38.163.15] failed - POSSIBLE BREAK-IN ATTEMPT! Sep 15 02:30:38 rb06 sshd[18347]: Failed password for invalid user cuser from 92.38.163.15 port 54116 ssh2 Sep 15 02:30:38 rb06 sshd[18347]: Received disconnect f........ ------------------------------- |
2019-09-15 17:37:13 |
| 178.62.4.64 | attack | Invalid user mc from 178.62.4.64 port 59046 |
2019-09-15 18:57:29 |
| 51.68.46.156 | attackspambots | $f2bV_matches |
2019-09-15 18:05:27 |
| 193.70.114.154 | attackbotsspam | Sep 15 04:37:59 Ubuntu-1404-trusty-64-minimal sshd\[1442\]: Invalid user kody from 193.70.114.154 Sep 15 04:37:59 Ubuntu-1404-trusty-64-minimal sshd\[1442\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.114.154 Sep 15 04:38:01 Ubuntu-1404-trusty-64-minimal sshd\[1442\]: Failed password for invalid user kody from 193.70.114.154 port 42126 ssh2 Sep 15 04:50:09 Ubuntu-1404-trusty-64-minimal sshd\[12412\]: Invalid user ug from 193.70.114.154 Sep 15 04:50:09 Ubuntu-1404-trusty-64-minimal sshd\[12412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.114.154 |
2019-09-15 18:25:04 |