城市(city): Santa Clara
省份(region): California
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
NetRange: 104.164.0.0 - 104.165.255.255
CIDR: 104.164.0.0/15
NetName: EGNL-1
NetHandle: NET-104-164-0-0-1
Parent: NET104 (NET-104-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: EGIHosting (EGNL-1)
RegDate: 2014-07-22
Updated: 2023-05-09
Comment: Geofeed https://geofeed.egihosting.com/geofeed.csv
Ref: https://rdap.arin.net/registry/ip/104.164.0.0
OrgName: EGIHosting
OrgId: EGNL-1
Address: 3223 Kenneth Street
City: Santa Clara
StateProv: CA
PostalCode: 95054
Country: US
RegDate: 2007-07-23
Updated: 2025-04-01
Comment: http://egihosting.com
Comment: Geofeed https://geofeed.egihosting.com/geofeed.csv
Ref: https://rdap.arin.net/registry/entity/EGNL-1
OrgTechHandle: KUMAR396-ARIN
OrgTechName: kumar, Indhira
OrgTechPhone: +1-408-228-4448
OrgTechEmail: indra.kumar@egihosting.com
OrgTechRef: https://rdap.arin.net/registry/entity/KUMAR396-ARIN
OrgTechHandle: TRANR22-ARIN
OrgTechName: Tran, Ryan
OrgTechPhone: +1-408-228-4448
OrgTechEmail: rtran@egihosting.com
OrgTechRef: https://rdap.arin.net/registry/entity/TRANR22-ARIN
OrgTechHandle: SIMKI10-ARIN
OrgTechName: Simkiss, John
OrgTechPhone: +1-408-228-4448
OrgTechEmail: jas3@egihosting.com
OrgTechRef: https://rdap.arin.net/registry/entity/SIMKI10-ARIN
OrgNOCHandle: NOC2660-ARIN
OrgNOCName: Network Operations Center
OrgNOCPhone: +1-888-808-8806
OrgNOCEmail: noc@egihosting.com
OrgNOCRef: https://rdap.arin.net/registry/entity/NOC2660-ARIN
OrgAbuseHandle: ABUSE1715-ARIN
OrgAbuseName: Abuse Department
OrgAbusePhone: +1-888-808-8806
OrgAbuseEmail: abuse@egihosting.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE1715-ARIN
OrgRoutingHandle: NOC2660-ARIN
OrgRoutingName: Network Operations Center
OrgRoutingPhone: +1-888-808-8806
OrgRoutingEmail: noc@egihosting.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/NOC2660-ARIN
OrgTechHandle: CHENJ-ARIN
OrgTechName: Chen, James
OrgTechPhone: +1-408-228-4448
OrgTechEmail: james@egihosting.com
OrgTechRef: https://rdap.arin.net/registry/entity/CHENJ-ARIN
OrgTechHandle: HERNA1269-ARIN
OrgTechName: Hernandez, Aaron
OrgTechPhone: +1-408-228-4448
OrgTechEmail: aaron@egihosting.com
OrgTechRef: https://rdap.arin.net/registry/entity/HERNA1269-ARIN
OrgTechHandle: KTBIJ-ARIN
OrgTechName: KT, Bijoy
OrgTechPhone: +1-888-808-8806
OrgTechEmail: egni@egihosting.com
OrgTechRef: https://rdap.arin.net/registry/entity/KTBIJ-ARIN
OrgTechHandle: TRANH54-ARIN
OrgTechName: Tran, Hung
OrgTechPhone: +1-408-581-1984
OrgTechEmail: htran@egihosting.com
OrgTechRef: https://rdap.arin.net/registry/entity/TRANH54-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.164.126.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33912
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.164.126.69. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025112901 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 30 01:30:12 CST 2025
;; MSG SIZE rcvd: 107
Host 69.126.164.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 69.126.164.104.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 115.60.168.180 | attack | Sep 6 18:51:11 localhost sshd[49475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.60.168.180 user=root Sep 6 18:51:13 localhost sshd[49475]: Failed password for root from 115.60.168.180 port 18317 ssh2 Sep 6 18:55:32 localhost sshd[49784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.60.168.180 user=root Sep 6 18:55:34 localhost sshd[49784]: Failed password for root from 115.60.168.180 port 17661 ssh2 Sep 6 19:00:36 localhost sshd[50203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.60.168.180 user=root Sep 6 19:00:38 localhost sshd[50203]: Failed password for root from 115.60.168.180 port 18845 ssh2 ... |
2020-09-07 07:07:18 |
| 221.8.12.143 | attackspambots | Attempted connection to port 22. |
2020-09-07 07:13:10 |
| 81.68.118.120 | attack | invalid user postgres from 81.68.118.120 port 58128 ssh2 |
2020-09-07 07:25:23 |
| 146.185.215.21 | attackbots | gcore scammer fraud bastard! day per DAY ! fake sender stolen identity ! Sun Sep 06 @ 6:37pm SPAM[from_blacklist] 146.185.215.21 bounce@magenta.de |
2020-09-07 07:14:33 |
| 46.229.168.163 | attackspambots | Unauthorized access detected from black listed ip! |
2020-09-07 07:24:00 |
| 92.222.74.255 | attackspambots | 2020-09-07T00:21:13.300830n23.at sshd[133043]: Failed password for root from 92.222.74.255 port 43812 ssh2 2020-09-07T00:25:41.954330n23.at sshd[136839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.74.255 user=root 2020-09-07T00:25:44.181498n23.at sshd[136839]: Failed password for root from 92.222.74.255 port 48368 ssh2 ... |
2020-09-07 06:57:52 |
| 186.94.233.162 | attackbotsspam | Honeypot attack, port: 445, PTR: 186-94-233-162.genericrev.cantv.net. |
2020-09-07 07:24:34 |
| 187.163.70.129 | attack | Automatic report - Port Scan |
2020-09-07 06:58:58 |
| 45.82.137.35 | attackspam | $f2bV_matches |
2020-09-07 07:21:41 |
| 72.221.232.144 | attackspambots | Searching for renamed config files |
2020-09-07 06:51:49 |
| 191.232.242.173 | attackspam | invalid user postgres from 191.232.242.173 port 48284 ssh2 |
2020-09-07 07:17:08 |
| 182.61.136.17 | attackspambots | (sshd) Failed SSH login from 182.61.136.17 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 6 14:29:24 server sshd[6237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.136.17 user=root Sep 6 14:29:27 server sshd[6237]: Failed password for root from 182.61.136.17 port 51986 ssh2 Sep 6 14:45:15 server sshd[16865]: Invalid user rails from 182.61.136.17 port 40536 Sep 6 14:45:17 server sshd[16865]: Failed password for invalid user rails from 182.61.136.17 port 40536 ssh2 Sep 6 14:48:56 server sshd[18934]: Invalid user webapp from 182.61.136.17 port 51138 |
2020-09-07 07:20:25 |
| 178.255.126.198 | attack | DATE:2020-09-06 19:22:26, IP:178.255.126.198, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc) |
2020-09-07 06:55:21 |
| 94.200.179.62 | attackspambots | 2020-09-06T19:47:42.411532snf-827550 sshd[5788]: Failed password for root from 94.200.179.62 port 45908 ssh2 2020-09-06T19:51:41.712169snf-827550 sshd[5796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.200.179.62 user=root 2020-09-06T19:51:43.797299snf-827550 sshd[5796]: Failed password for root from 94.200.179.62 port 51034 ssh2 ... |
2020-09-07 07:24:49 |
| 192.169.243.111 | attackbotsspam | C1,WP GET /daisuki/wp-login.php |
2020-09-07 07:12:26 |