City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 10.0.0.0 - 10.255.255.255
CIDR: 10.0.0.0/8
NetName: PRIVATE-ADDRESS-ABLK-RFC1918-IANA-RESERVED
NetHandle: NET-10-0-0-0-1
Parent: ()
NetType: IANA Special Use
OriginAS:
Organization: Internet Assigned Numbers Authority (IANA)
RegDate:
Updated: 2024-05-24
Comment: These addresses are in use by many millions of independently operated networks, which might be as small as a single computer connected to a home gateway, and are automatically configured in hundreds of millions of devices. They are only intended for use within a private context and traffic that needs to cross the Internet will need to use a different, unique address.
Comment:
Comment: These addresses can be used by anyone without any need to coordinate with IANA or an Internet registry. The traffic from these addresses does not come from ICANN or IANA. We are not the source of activity you may see on logs or in e-mail records. Please refer to http://www.iana.org/abuse/answers
Comment:
Comment: These addresses were assigned by the IETF, the organization that develops Internet protocols, in the Best Current Practice document, RFC 1918 which can be found at:
Comment: http://datatracker.ietf.org/doc/rfc1918
Ref: https://rdap.arin.net/registry/ip/10.0.0.0
OrgName: Internet Assigned Numbers Authority
OrgId: IANA
Address: 12025 Waterfront Drive
Address: Suite 300
City: Los Angeles
StateProv: CA
PostalCode: 90292
Country: US
RegDate:
Updated: 2024-05-24
Ref: https://rdap.arin.net/registry/entity/IANA
OrgTechHandle: IANA-IP-ARIN
OrgTechName: ICANN
OrgTechPhone: +1-310-301-5820
OrgTechEmail: abuse@iana.org
OrgTechRef: https://rdap.arin.net/registry/entity/IANA-IP-ARIN
OrgAbuseHandle: IANA-IP-ARIN
OrgAbuseName: ICANN
OrgAbusePhone: +1-310-301-5820
OrgAbuseEmail: abuse@iana.org
OrgAbuseRef: https://rdap.arin.net/registry/entity/IANA-IP-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 10.192.112.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4228
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;10.192.112.139. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026033000 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 19:44:42 CST 2026
;; MSG SIZE rcvd: 107
Host 139.112.192.10.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 139.112.192.10.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 138.68.45.164 | attackspambots | 138.68.45.164 - - [06/Oct/2020:12:16:54 +0100] "POST /wp-login.php HTTP/1.1" 200 2426 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 138.68.45.164 - - [06/Oct/2020:12:17:01 +0100] "POST /wp-login.php HTTP/1.1" 200 2407 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 138.68.45.164 - - [06/Oct/2020:12:17:03 +0100] "POST /wp-login.php HTTP/1.1" 200 2405 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-10-06 21:24:16 |
| 36.81.203.211 | attackspam | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-10-06T10:59:37Z and 2020-10-06T11:09:14Z |
2020-10-06 21:14:41 |
| 112.85.42.53 | attackspam | 2020-10-06T13:09:40.824151vps1033 sshd[20767]: Failed password for root from 112.85.42.53 port 41474 ssh2 2020-10-06T13:09:44.212268vps1033 sshd[20767]: Failed password for root from 112.85.42.53 port 41474 ssh2 2020-10-06T13:09:46.708278vps1033 sshd[20767]: Failed password for root from 112.85.42.53 port 41474 ssh2 2020-10-06T13:09:50.266782vps1033 sshd[20767]: Failed password for root from 112.85.42.53 port 41474 ssh2 2020-10-06T13:09:53.233252vps1033 sshd[20767]: Failed password for root from 112.85.42.53 port 41474 ssh2 ... |
2020-10-06 21:20:17 |
| 85.209.0.101 | attackspam | Honeypot hit. |
2020-10-06 21:06:13 |
| 190.205.234.200 | attackbotsspam | 20/10/5@16:43:39: FAIL: Alarm-Network address from=190.205.234.200 ... |
2020-10-06 21:34:47 |
| 177.107.68.26 | attack | Dovecot Invalid User Login Attempt. |
2020-10-06 21:03:33 |
| 78.128.113.121 | attackbotsspam | 2020-09-22 14:30:55,068 fail2ban.actions \[2657\]: NOTICE \[qpsmtpd\] Ban 78.128.113.121 2020-09-23 01:39:50,049 fail2ban.actions \[2657\]: NOTICE \[qpsmtpd\] Ban 78.128.113.121 2020-09-23 04:58:18,143 fail2ban.actions \[2657\]: NOTICE \[qpsmtpd\] Ban 78.128.113.121 2020-09-23 06:49:19,792 fail2ban.actions \[2657\]: NOTICE \[qpsmtpd\] Ban 78.128.113.121 2020-09-23 13:29:44,888 fail2ban.actions \[2657\]: NOTICE \[qpsmtpd\] Ban 78.128.113.121 ... |
2020-10-06 21:29:13 |
| 191.253.232.206 | attackbots | 1601930638 - 10/05/2020 22:43:58 Host: 191.253.232.206/191.253.232.206 Port: 22 TCP Blocked ... |
2020-10-06 21:19:06 |
| 218.92.0.248 | attack | 2020-10-06T13:18:17.886819abusebot-7.cloudsearch.cf sshd[27913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.248 user=root 2020-10-06T13:18:19.659725abusebot-7.cloudsearch.cf sshd[27913]: Failed password for root from 218.92.0.248 port 33779 ssh2 2020-10-06T13:18:23.416462abusebot-7.cloudsearch.cf sshd[27913]: Failed password for root from 218.92.0.248 port 33779 ssh2 2020-10-06T13:18:17.886819abusebot-7.cloudsearch.cf sshd[27913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.248 user=root 2020-10-06T13:18:19.659725abusebot-7.cloudsearch.cf sshd[27913]: Failed password for root from 218.92.0.248 port 33779 ssh2 2020-10-06T13:18:23.416462abusebot-7.cloudsearch.cf sshd[27913]: Failed password for root from 218.92.0.248 port 33779 ssh2 2020-10-06T13:18:17.886819abusebot-7.cloudsearch.cf sshd[27913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rho ... |
2020-10-06 21:32:40 |
| 106.124.130.114 | attackspam | Failed password for root from 106.124.130.114 port 37326 ssh2 pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.130.114 user=root Failed password for root from 106.124.130.114 port 46218 ssh2 pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.130.114 user=root Failed password for root from 106.124.130.114 port 36547 ssh2 |
2020-10-06 21:22:50 |
| 43.250.105.217 | attackspam | Oct 6 14:53:46 plg sshd[7091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.250.105.217 user=root Oct 6 14:53:49 plg sshd[7091]: Failed password for invalid user root from 43.250.105.217 port 37826 ssh2 Oct 6 14:57:27 plg sshd[7127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.250.105.217 user=root Oct 6 14:57:29 plg sshd[7127]: Failed password for invalid user root from 43.250.105.217 port 50872 ssh2 Oct 6 15:00:29 plg sshd[7151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.250.105.217 user=root Oct 6 15:00:31 plg sshd[7151]: Failed password for invalid user root from 43.250.105.217 port 59148 ssh2 ... |
2020-10-06 21:35:53 |
| 139.155.94.250 | attackspambots | Lines containing failures of 139.155.94.250 Oct 5 06:05:04 newdogma sshd[5943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.94.250 user=r.r Oct 5 06:05:06 newdogma sshd[5943]: Failed password for r.r from 139.155.94.250 port 49576 ssh2 Oct 5 06:05:07 newdogma sshd[5943]: Received disconnect from 139.155.94.250 port 49576:11: Bye Bye [preauth] Oct 5 06:05:07 newdogma sshd[5943]: Disconnected from authenticating user r.r 139.155.94.250 port 49576 [preauth] Oct 5 06:15:10 newdogma sshd[6663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.94.250 user=r.r Oct 5 06:15:12 newdogma sshd[6663]: Failed password for r.r from 139.155.94.250 port 46184 ssh2 Oct 5 06:15:14 newdogma sshd[6663]: Received disconnect from 139.155.94.250 port 46184:11: Bye Bye [preauth] Oct 5 06:15:14 newdogma sshd[6663]: Disconnected from authenticating user r.r 139.155.94.250 port 46184 [preaut........ ------------------------------ |
2020-10-06 21:37:55 |
| 80.90.82.70 | attackbotsspam | 80.90.82.70 - - [06/Oct/2020:01:50:27 +0200] "POST /wp-login.php HTTP/1.0" 200 4794 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-10-06 21:06:37 |
| 122.194.229.37 | attack | Oct 6 15:06:13 dev0-dcde-rnet sshd[3873]: Failed password for root from 122.194.229.37 port 49194 ssh2 Oct 6 15:06:29 dev0-dcde-rnet sshd[3873]: error: maximum authentication attempts exceeded for root from 122.194.229.37 port 49194 ssh2 [preauth] Oct 6 15:06:35 dev0-dcde-rnet sshd[3880]: Failed password for root from 122.194.229.37 port 37878 ssh2 |
2020-10-06 21:09:29 |
| 195.54.160.183 | attackspam | Invalid user ftp from 195.54.160.183 port 22214 |
2020-10-06 21:02:54 |