城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 129.46.0.0 - 129.46.255.255
CIDR: 129.46.0.0/16
NetName: QUALNET
NetHandle: NET-129-46-0-0-1
Parent: NET129 (NET-129-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Qualcomm, Inc. (QUALCO)
RegDate: 1987-07-31
Updated: 2021-12-14
Ref: https://rdap.arin.net/registry/ip/129.46.0.0
OrgName: Qualcomm, Inc.
OrgId: QUALCO
Address: 5775 Morehouse Drive
City: San Diego
StateProv: CA
PostalCode: 92121-1714
Country: US
RegDate:
Updated: 2026-02-11
Ref: https://rdap.arin.net/registry/entity/QUALCO
OrgAbuseHandle: IPMAN39-ARIN
OrgAbuseName: IP Management
OrgAbusePhone: +1-858-658-4357
OrgAbuseEmail: arin@qualcomm.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/IPMAN39-ARIN
OrgNOCHandle: IPMAN39-ARIN
OrgNOCName: IP Management
OrgNOCPhone: +1-858-658-4357
OrgNOCEmail: arin@qualcomm.com
OrgNOCRef: https://rdap.arin.net/registry/entity/IPMAN39-ARIN
OrgTechHandle: IPMAN39-ARIN
OrgTechName: IP Management
OrgTechPhone: +1-858-658-4357
OrgTechEmail: arin@qualcomm.com
OrgTechRef: https://rdap.arin.net/registry/entity/IPMAN39-ARIN
OrgRoutingHandle: IPMAN39-ARIN
OrgRoutingName: IP Management
OrgRoutingPhone: +1-858-658-4357
OrgRoutingEmail: arin@qualcomm.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/IPMAN39-ARIN
OrgDNSHandle: IPMAN39-ARIN
OrgDNSName: IP Management
OrgDNSPhone: +1-858-658-4357
OrgDNSEmail: arin@qualcomm.com
OrgDNSRef: https://rdap.arin.net/registry/entity/IPMAN39-ARIN
OrgAbuseHandle: ABUSE9538-ARIN
OrgAbuseName: ABUSE
OrgAbusePhone: +1-858-845-7857
OrgAbuseEmail: abuse@qualcomm.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE9538-ARIN
RTechHandle: ZQ3-ARIN
RTechName: Hostmaster
RTechPhone: +1-858-651-0209
RTechEmail: hostmast@qualcomm.com
RTechRef: https://rdap.arin.net/registry/entity/ZQ3-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.46.42.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21306
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;129.46.42.145. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032201 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 07:28:10 CST 2026
;; MSG SIZE rcvd: 106
Host 145.42.46.129.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 145.42.46.129.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 125.166.127.110 | attackbotsspam | Attempt to attack host OS, exploiting network vulnerabilities, on 13-10-2019 04:45:21. |
2019-10-13 19:00:41 |
| 122.155.108.130 | attackspambots | Oct 13 11:09:34 * sshd[18155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.155.108.130 Oct 13 11:09:36 * sshd[18155]: Failed password for invalid user !@#$QWE from 122.155.108.130 port 54169 ssh2 |
2019-10-13 18:52:24 |
| 181.129.14.218 | attackbots | Oct 13 11:48:25 pornomens sshd\[31311\]: Invalid user Virginie!23 from 181.129.14.218 port 2904 Oct 13 11:48:25 pornomens sshd\[31311\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.129.14.218 Oct 13 11:48:27 pornomens sshd\[31311\]: Failed password for invalid user Virginie!23 from 181.129.14.218 port 2904 ssh2 ... |
2019-10-13 18:47:01 |
| 66.240.236.119 | attackbots | port scan and connect, tcp 119 (nntp) |
2019-10-13 19:18:14 |
| 183.131.82.99 | attack | Oct 13 13:09:09 jane sshd[17007]: Failed password for root from 183.131.82.99 port 42046 ssh2 Oct 13 13:09:16 jane sshd[17007]: Failed password for root from 183.131.82.99 port 42046 ssh2 ... |
2019-10-13 19:11:10 |
| 193.227.20.148 | attackbotsspam | Attempt to attack host OS, exploiting network vulnerabilities, on 13-10-2019 04:45:21. |
2019-10-13 19:00:11 |
| 123.207.36.159 | attackbotsspam | Automatic report - XMLRPC Attack |
2019-10-13 18:48:57 |
| 180.76.163.98 | attackbots | Oct 13 14:05:12 pkdns2 sshd\[22316\]: Failed password for root from 180.76.163.98 port 53409 ssh2Oct 13 14:05:22 pkdns2 sshd\[22316\]: Failed password for root from 180.76.163.98 port 53409 ssh2Oct 13 14:05:27 pkdns2 sshd\[22323\]: Failed password for root from 180.76.163.98 port 56586 ssh2Oct 13 14:05:29 pkdns2 sshd\[22323\]: Failed password for root from 180.76.163.98 port 56586 ssh2Oct 13 14:05:30 pkdns2 sshd\[22323\]: Failed password for root from 180.76.163.98 port 56586 ssh2Oct 13 14:05:39 pkdns2 sshd\[22333\]: Failed password for root from 180.76.163.98 port 59241 ssh2 ... |
2019-10-13 19:07:34 |
| 89.97.203.35 | attackspam | Port 1433 Scan |
2019-10-13 19:02:01 |
| 59.93.198.142 | attack | Automatic report - Port Scan Attack |
2019-10-13 19:04:44 |
| 118.169.244.59 | attackspam | Unauthorised access (Oct 13) SRC=118.169.244.59 LEN=40 PREC=0x20 TTL=51 ID=36547 TCP DPT=23 WINDOW=34681 SYN |
2019-10-13 19:15:19 |
| 182.61.109.92 | attackbotsspam | Oct 13 13:09:26 ns381471 sshd[30766]: Failed password for root from 182.61.109.92 port 35026 ssh2 Oct 13 13:13:23 ns381471 sshd[30867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.109.92 Oct 13 13:13:25 ns381471 sshd[30867]: Failed password for invalid user 123 from 182.61.109.92 port 45604 ssh2 |
2019-10-13 19:20:18 |
| 180.94.157.195 | attackspam | Automatic report - Port Scan Attack |
2019-10-13 18:57:34 |
| 67.205.172.59 | attackspam | Automatic report - XMLRPC Attack |
2019-10-13 18:42:23 |
| 103.90.203.251 | attack | Malicious brute force vulnerability hacking attacks |
2019-10-13 19:06:31 |