城市(city): Los Angeles
省份(region): California
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b'#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 107.148.0.0 - 107.149.255.255
CIDR: 107.148.0.0/15
NetName: PT-82-10
NetHandle: NET-107-148-0-0-1
Parent: NET107 (NET-107-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: PEG TECH INC (PT-82)
RegDate: 2013-11-08
Updated: 2024-07-17
Comment: Geofeed https://www.raksmart.com/ip2location.csv
Ref: https://rdap.arin.net/registry/ip/107.148.0.0
OrgName: PEG TECH INC
OrgId: PT-82
Address: 2805 Mission College Blvd
City: Santa Clara
StateProv: CA
PostalCode: 95054
Country: US
RegDate: 2012-03-27
Updated: 2024-11-25
Ref: https://rdap.arin.net/registry/entity/PT-82
OrgTechHandle: NOC12550-ARIN
OrgTechName: NOC
OrgTechPhone: +1-408-692-5581
OrgTechEmail: noc@petaexpress.com
OrgTechRef: https://rdap.arin.net/registry/entity/NOC12550-ARIN
OrgNOCHandle: NOC12550-ARIN
OrgNOCName: NOC
OrgNOCPhone: +1-408-692-5581
OrgNOCEmail: noc@petaexpress.com
OrgNOCRef: https://rdap.arin.net/registry/entity/NOC12550-ARIN
OrgAbuseHandle: ABUSE3497-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-408-692-5581
OrgAbuseEmail: abuse@petaexpress.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3497-ARIN
# end
# start
NetRange: 107.148.84.0 - 107.148.85.255
CIDR: 107.148.84.0/23
NetName: PEG-LA-202505
NetHandle: NET-107-148-84-0-1
Parent: PT-82-10 (NET-107-148-0-0-1)
NetType: Reassigned
OriginAS:
Customer: PEG-LA (C10854280)
RegDate: 2024-05-24
Updated: 2024-05-24
Ref: https://rdap.arin.net/registry/ip/107.148.84.0
CustName: PEG-LA
Address: 624 S Grand Ave
City: Los Angeles
StateProv: CA
PostalCode: 90017
Country: US
RegDate: 2024-05-24
Updated: 2024-05-24
Ref: https://rdap.arin.net/registry/entity/C10854280
OrgTechHandle: NOC12550-ARIN
OrgTechName: NOC
OrgTechPhone: +1-408-692-5581
OrgTechEmail: noc@petaexpress.com
OrgTechRef: https://rdap.arin.net/registry/entity/NOC12550-ARIN
OrgNOCHandle: NOC12550-ARIN
OrgNOCName: NOC
OrgNOCPhone: +1-408-692-5581
OrgNOCEmail: noc@petaexpress.com
OrgNOCRef: https://rdap.arin.net/registry/entity/NOC12550-ARIN
OrgAbuseHandle: ABUSE3497-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-408-692-5581
OrgAbuseEmail: abuse@petaexpress.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3497-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#'
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.148.84.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33162
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;107.148.84.143. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026050300 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 03 22:00:10 CST 2026
;; MSG SIZE rcvd: 107
Host 143.84.148.107.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 143.84.148.107.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 54.38.139.210 | attackbots | Repeated brute force against a port |
2020-10-14 00:55:15 |
| 162.142.125.68 | attackspambots | 3270/tcp 9899/tcp 22345/tcp... [2020-09-15/10-13]199pkt,192pt.(tcp) |
2020-10-14 01:30:38 |
| 46.163.32.30 | attackbots | Automatic report - Port Scan Attack |
2020-10-14 01:23:35 |
| 114.86.188.50 | attackspambots | Port probing on unauthorized port 445 |
2020-10-14 01:28:42 |
| 49.235.41.58 | attackspambots | Oct 13 13:52:23 xeon sshd[17157]: Failed password for root from 49.235.41.58 port 16763 ssh2 |
2020-10-14 01:38:06 |
| 12.32.37.130 | attackspambots | various type of attack |
2020-10-14 01:07:52 |
| 118.25.24.146 | attackbots | $f2bV_matches |
2020-10-14 01:10:41 |
| 49.234.91.78 | attackspam | Oct 14 02:25:37 localhost sshd[2245515]: Invalid user server2 from 49.234.91.78 port 39768 ... |
2020-10-14 01:01:15 |
| 211.109.11.227 | attack | Invalid user pi from 211.109.11.227 port 60206 |
2020-10-14 00:56:55 |
| 103.131.89.2 | attackspambots | 2020-10-13T17:35:58+0200 Failed SSH Authentication/Brute Force Attack. (Server 4) |
2020-10-14 00:59:20 |
| 159.65.154.48 | attackbots | Oct 13 16:44:19 ourumov-web sshd\[19162\]: Invalid user scott from 159.65.154.48 port 49628 Oct 13 16:44:19 ourumov-web sshd\[19162\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.154.48 Oct 13 16:44:22 ourumov-web sshd\[19162\]: Failed password for invalid user scott from 159.65.154.48 port 49628 ssh2 ... |
2020-10-14 00:56:11 |
| 68.183.12.80 | attack | Oct 13 14:06:35 ws22vmsma01 sshd[219481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.12.80 Oct 13 14:06:37 ws22vmsma01 sshd[219481]: Failed password for invalid user workshop from 68.183.12.80 port 49190 ssh2 ... |
2020-10-14 01:09:34 |
| 114.67.168.0 | attack | SMTP Bruteforce attempt |
2020-10-14 01:08:39 |
| 194.5.207.189 | attackbotsspam | 194.5.207.189 (DE/Germany/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Oct 13 12:54:56 server2 sshd[3605]: Failed password for root from 60.196.69.234 port 52453 ssh2 Oct 13 12:56:08 server2 sshd[3877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.5.207.189 user=root Oct 13 12:54:53 server2 sshd[3605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.196.69.234 user=root Oct 13 12:49:28 server2 sshd[2064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.249.55.68 user=root Oct 13 12:48:53 server2 sshd[1880]: Failed password for root from 123.207.74.24 port 36820 ssh2 Oct 13 12:48:51 server2 sshd[1880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.74.24 user=root IP Addresses Blocked: 60.196.69.234 (KR/South Korea/-) |
2020-10-14 01:22:14 |
| 182.208.252.91 | attackbotsspam | Oct 13 14:15:22 monitoring sshd[62656]: Invalid user antonio from 182.208.252.91 port 35654 Oct 13 14:15:22 monitoring sshd[62656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.208.252.91 Oct 13 14:15:22 monitoring sshd[62656]: Invalid user antonio from 182.208.252.91 port 35654 Oct 13 14:15:24 monitoring sshd[62656]: Failed password for invalid user antonio from 182.208.252.91 port 35654 ssh2 Oct 13 14:19:23 monitoring sshd[63434]: User root from 182.208.252.91 not allowed because none of user's groups are listed in AllowGroups Oct 13 14:19:23 monitoring sshd[63434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.208.252.91 user=root Oct 13 14:19:23 monitoring sshd[63434]: User root from 182.208.252.91 not allowed because none of user's groups are listed in AllowGroups Oct 13 14:19:25 monitoring sshd[63434]: Failed password for invalid user root from 182.208.252.91 port 37602 ssh2 Oct 13 14:2 ... |
2020-10-14 01:26:10 |