城市(city): San Jose
省份(region): California
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b'#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 128.241.0.0 - 128.241.255.255
CIDR: 128.241.0.0/16
NetName: NTTA-128-241
NetHandle: NET-128-241-0-0-1
Parent: NET128 (NET-128-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: NTT America, Inc. (NTTAM-1)
RegDate: 2000-07-26
Updated: 2026-04-27
Comment: Geofeed https://geo.ip.gin.ntt.net/geofeeds/geofeeds.csv
Comment:
Comment: Reassignment information for this block is
Comment: available at rwhois.gin.ntt.net port 4321
Ref: https://rdap.arin.net/registry/ip/128.241.0.0
OrgName: NTT America, Inc.
OrgId: NTTAM-1
Address: 15809 Bear Creek Pkwy
Address: Suite 320
City: Redmond
StateProv: WA
PostalCode: 98052
Country: US
RegDate: 2005-12-08
Updated: 2024-03-04
Ref: https://rdap.arin.net/registry/entity/NTTAM-1
ReferralServer: rwhois://rwhois.gin.ntt.net:4321
OrgNOCHandle: NASC-ARIN
OrgNOCName: NTT America Support Contact
OrgNOCPhone: +1-877-688-6625
OrgNOCEmail: ce-support@gin.ntt.net
OrgNOCRef: https://rdap.arin.net/registry/entity/NASC-ARIN
OrgRoutingHandle: PEERI-ARIN
OrgRoutingName: Peering
OrgRoutingPhone: +1-877-688-6625
OrgRoutingEmail: peering@ntt.net
OrgRoutingRef: https://rdap.arin.net/registry/entity/PEERI-ARIN
OrgTechHandle: VIPAR-ARIN
OrgTechName: VIPAR
OrgTechPhone: +1-877-688-6625
OrgTechEmail: ipr@gin.ntt.net
OrgTechRef: https://rdap.arin.net/registry/entity/VIPAR-ARIN
OrgAbuseHandle: NAAC-ARIN
OrgAbuseName: NTT America Abuse Contact
OrgAbusePhone: +1-877-688-6625
OrgAbuseEmail: abuse@ntt.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/NAAC-ARIN
OrgTechHandle: CANDE70-ARIN
OrgTechName: Candela, Massimo
OrgTechPhone: +1-214-915-1366
OrgTechEmail: massimo@ntt.net
OrgTechRef: https://rdap.arin.net/registry/entity/CANDE70-ARIN
RTechHandle: VIA4-ORG-ARIN
RTechName: VIPAR
RTechPhone: +1-877-688-6625
RTechEmail: ipr@gin.ntt.net
RTechRef: https://rdap.arin.net/registry/entity/VIA4-ORG-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to rwhois.gin.ntt.net:4321.
%rwhois V-1.5:0078b6:00 rwhois.gin.ntt.net (Vipar 0.1a. Comments to ipr@gin.ntt.net)
network:Class-Name:network
network:Auth-Area:128.241.0.0/16
network:ID:USV4-128-241-224-0.127.0.0.1/32
network:Handle:USV4-128-241-224-0
network:Network-Name:USV4-128-241-224-0
network:IP-Network:128.241.224.0/19
network:In-Addr-Server;I:GIN1-HST.127.0.0.1/32
network:In-Addr-Server;I:GIN2-HST.127.0.0.1/32
network:In-Addr-Server;I:GIN3-HST.127.0.0.1/32
network:In-Addr-Server;I:GIN4-HST.127.0.0.1/32
network:In-Addr-Server;I:GIN5-HST.127.0.0.1/32
network:IP-Network-Block:128.241.224.0 - 128.241.255.255
network:Org-Name:TianFeng (Hong Kong) Communications Ltd
network:Street-Address:39 Lung Sum Rd
network:City:Sheung Shui
network:State:
network:Postal-Code:
network:Country-Code:HK
network:Tech-Contact;I:TIANFENG-NTT.127.0.0.1/32
network:Created:2025-06-06 08:46:17.496285+00
network:Updated:2025-06-06 08:46:17.496285+00
network:Class-Name:network
network:Auth-Area:128.241.0.0/16
network:ID:NETBLK-VRIO-128-241.127.0.0.1/32
network:Handle:NETBLK-VRIO-128-241
network:Network-Name:VRIO-128-241
network:IP-Network:128.241.0.0/16
network:In-Addr-Server;I:AUTH21-GIN-HST.127.0.0.1/32
network:In-Addr-Server;I:AUTH22-GIN-HST.127.0.0.1/32
network:In-Addr-Server;I:AUTH23-GIN-HST.127.0.0.1/32
network:In-Addr-Server;I:AUTH24-GIN-HST.127.0.0.1/32
network:In-Addr-Server;I:AUTH25-GIN-HST.127.0.0.1/32
network:IP-Network-Block:128.241.0.0 - 128.241.255.255
network:Org-Name:NTT America, Inc.
network:Street-Address:8300 E Maplewood Ave. Suite 400
network:City:Greenwood Village
network:State:CO
network:Postal-Code:80111
network:Country-Code:US
network:Tech-Contact;I:VIA4-ORG-ARIN.127.0.0.1/32
network:Created:2000-05-16 19:18:41+00
network:Updated:2007-07-18 22:17:51+00
%ok'
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 128.241.235.26
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47403
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;128.241.235.26. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026051701 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 18 08:00:10 CST 2026
;; MSG SIZE rcvd: 107
Host 26.235.241.128.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 26.235.241.128.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 78.128.113.88 | attackbotsspam | Jan 20 11:49:06 xzibhostname postfix/smtpd[4119]: warning: hostname ip-113-88.4vendeta.com does not resolve to address 78.128.113.88: Name or service not known Jan 20 11:49:06 xzibhostname postfix/smtpd[4119]: connect from unknown[78.128.113.88] Jan 20 11:49:11 xzibhostname postfix/smtpd[4119]: warning: unknown[78.128.113.88]: SASL PLAIN authentication failed: authentication failure Jan 20 11:49:12 xzibhostname postfix/smtpd[4119]: lost connection after AUTH from unknown[78.128.113.88] Jan 20 11:49:12 xzibhostname postfix/smtpd[4119]: disconnect from unknown[78.128.113.88] Jan 20 11:49:12 xzibhostname postfix/smtpd[7371]: warning: hostname ip-113-88.4vendeta.com does not resolve to address 78.128.113.88: Name or service not known Jan 20 11:49:12 xzibhostname postfix/smtpd[7371]: connect from unknown[78.128.113.88] Jan 20 11:49:14 xzibhostname postfix/smtpd[7371]: warning: unknown[78.128.113.88]: SASL PLAIN authentication failed: authentication failure Jan 20 11:49:15 xz........ ------------------------------- |
2020-01-21 06:18:40 |
| 186.179.100.246 | attackbotsspam | 2019-09-04T20:30:53.584539-07:00 suse-nuc sshd[26654]: Invalid user admin from 186.179.100.246 port 24776 ... |
2020-01-21 06:29:43 |
| 178.130.130.200 | attack | 2020-01-20T21:57:04.802983shield sshd\[21795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.130.130.200 user=mail 2020-01-20T21:57:06.484762shield sshd\[21795\]: Failed password for mail from 178.130.130.200 port 40472 ssh2 2020-01-20T22:00:13.761879shield sshd\[23002\]: Invalid user loes from 178.130.130.200 port 43602 2020-01-20T22:00:13.771531shield sshd\[23002\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.130.130.200 2020-01-20T22:00:15.402934shield sshd\[23002\]: Failed password for invalid user loes from 178.130.130.200 port 43602 ssh2 |
2020-01-21 06:09:29 |
| 187.75.145.66 | attack | 2019-12-26T02:56:21.808684suse-nuc sshd[2575]: Invalid user admin from 187.75.145.66 port 7121 ... |
2020-01-21 06:38:54 |
| 188.131.169.24 | attackspambots | 2019-12-01T09:14:19.370171suse-nuc sshd[23357]: Invalid user test from 188.131.169.24 port 59756 ... |
2020-01-21 06:23:07 |
| 182.16.103.34 | attackbots | Unauthorized connection attempt detected from IP address 182.16.103.34 to port 2220 [J] |
2020-01-21 06:08:57 |
| 188.116.46.133 | attackspambots | 2019-12-01T06:21:55.332425suse-nuc sshd[29914]: Invalid user ann from 188.116.46.133 port 56056 ... |
2020-01-21 06:32:11 |
| 167.71.226.158 | attackbotsspam | Unauthorized connection attempt detected from IP address 167.71.226.158 to port 2220 [J] |
2020-01-21 06:26:58 |
| 188.114.173.169 | attack | 2019-09-09T16:55:47.864997suse-nuc sshd[27996]: error: maximum authentication attempts exceeded for root from 188.114.173.169 port 56502 ssh2 [preauth] ... |
2020-01-21 06:33:39 |
| 188.131.238.91 | attack | 2020-01-07T17:08:27.464238suse-nuc sshd[14232]: Invalid user zng from 188.131.238.91 port 35066 ... |
2020-01-21 06:16:57 |
| 188.165.55.33 | attackbots | Unauthorized connection attempt detected from IP address 188.165.55.33 to port 2220 [J] |
2020-01-21 06:12:56 |
| 35.187.173.200 | attackspam | Jan 20 19:07:06 ws24vmsma01 sshd[203770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.187.173.200 Jan 20 19:07:08 ws24vmsma01 sshd[203770]: Failed password for invalid user postgres from 35.187.173.200 port 39732 ssh2 ... |
2020-01-21 06:39:54 |
| 222.186.180.223 | attackspambots | Jan 20 23:16:50 silence02 sshd[8389]: Failed password for root from 222.186.180.223 port 56822 ssh2 Jan 20 23:17:02 silence02 sshd[8389]: Failed password for root from 222.186.180.223 port 56822 ssh2 Jan 20 23:17:02 silence02 sshd[8389]: error: maximum authentication attempts exceeded for root from 222.186.180.223 port 56822 ssh2 [preauth] |
2020-01-21 06:20:34 |
| 186.210.241.112 | attackbotsspam | 2019-09-08T06:09:56.893834-07:00 suse-nuc sshd[23738]: Invalid user admin from 186.210.241.112 port 46455 ... |
2020-01-21 06:23:28 |
| 163.172.164.135 | attack | Automatic report - XMLRPC Attack |
2020-01-21 06:04:07 |