城市(city): Toronto
省份(region): Ontario
国家(country): Canada
运营商(isp): Bell
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 142.189.0.0 - 142.189.255.255
CIDR: 142.189.0.0/16
NetName: STEN-BELL-189
NetHandle: NET-142-189-0-0-1
Parent: NET142 (NET-142-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Bell Canada (LINX)
RegDate: 1992-08-27
Updated: 2021-07-21
Ref: https://rdap.arin.net/registry/ip/142.189.0.0
OrgName: Bell Canada
OrgId: LINX
Address: 160 Elgin Street
City: Ottawa
StateProv: ON
PostalCode: K1G-3J4
Country: CA
RegDate: 1990-03-09
Updated: 2026-04-09
Ref: https://rdap.arin.net/registry/entity/LINX
OrgTechHandle: SOCEV-ARIN
OrgTechName: SOC-Events
OrgTechPhone: +1-888-570-8125
OrgTechEmail: IP.admin@bell.ca
OrgTechRef: https://rdap.arin.net/registry/entity/SOCEV-ARIN
OrgTechHandle: ANR1-ARIN
OrgTechName: Automated Network Resolution
OrgTechPhone: +1-877-877-2426
OrgTechEmail: bwnteam@bell.ca
OrgTechRef: https://rdap.arin.net/registry/entity/ANR1-ARIN
OrgTechHandle: DHANJ1-ARIN
OrgTechName: Dhanji, Shaffiq
OrgTechPhone: +1-416-353-9801
OrgTechEmail: shaffiq.dhanji@bell.ca
OrgTechRef: https://rdap.arin.net/registry/entity/DHANJ1-ARIN
OrgAbuseHandle: ABUSE1127-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-877-877-2426
OrgAbuseEmail: abuse@sympatico.ca
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE1127-ARIN
OrgRoutingHandle: IRRAD-ARIN
OrgRoutingName: IRR Admin
OrgRoutingPhone: +1-888-788-2355
OrgRoutingEmail: irr-admin@bell.ca
OrgRoutingRef: https://rdap.arin.net/registry/entity/IRRAD-ARIN
OrgAbuseHandle: ABAI1-ARIN
OrgAbuseName: Abuse Business abuse issues
OrgAbusePhone: +1-877-877-2426
OrgAbuseEmail: abuse@bell.ca
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABAI1-ARIN
# end
# start
NetRange: 142.189.34.0 - 142.189.34.255
CIDR: 142.189.34.0/24
NetName: HSE-DYNAMIC-1689872194-CA
NetHandle: NET-142-189-34-0-1
Parent: STEN-BELL-189 (NET-142-189-0-0-1)
NetType: Reassigned
OriginAS:
Customer: Sympatico HSE (C09847421)
RegDate: 2023-07-20
Updated: 2023-07-20
Comment: For Abuse issues contact our abuse groups
Ref: https://rdap.arin.net/registry/ip/142.189.34.0
CustName: Sympatico HSE
Address: 130 RIDELLE AVENUE
City: TORONTO
StateProv: ON
PostalCode: M6B 1J8
Country: CA
RegDate: 2023-07-20
Updated: 2023-07-20
Ref: https://rdap.arin.net/registry/entity/C09847421
OrgTechHandle: SOCEV-ARIN
OrgTechName: SOC-Events
OrgTechPhone: +1-888-570-8125
OrgTechEmail: IP.admin@bell.ca
OrgTechRef: https://rdap.arin.net/registry/entity/SOCEV-ARIN
OrgTechHandle: ANR1-ARIN
OrgTechName: Automated Network Resolution
OrgTechPhone: +1-877-877-2426
OrgTechEmail: bwnteam@bell.ca
OrgTechRef: https://rdap.arin.net/registry/entity/ANR1-ARIN
OrgTechHandle: DHANJ1-ARIN
OrgTechName: Dhanji, Shaffiq
OrgTechPhone: +1-416-353-9801
OrgTechEmail: shaffiq.dhanji@bell.ca
OrgTechRef: https://rdap.arin.net/registry/entity/DHANJ1-ARIN
OrgAbuseHandle: ABUSE1127-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-877-877-2426
OrgAbuseEmail: abuse@sympatico.ca
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE1127-ARIN
OrgRoutingHandle: IRRAD-ARIN
OrgRoutingName: IRR Admin
OrgRoutingPhone: +1-888-788-2355
OrgRoutingEmail: irr-admin@bell.ca
OrgRoutingRef: https://rdap.arin.net/registry/entity/IRRAD-ARIN
OrgAbuseHandle: ABAI1-ARIN
OrgAbuseName: Abuse Business abuse issues
OrgAbusePhone: +1-877-877-2426
OrgAbuseEmail: abuse@bell.ca
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABAI1-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.189.34.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28462
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.189.34.124. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026050701 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 08 06:03:06 CST 2026
;; MSG SIZE rcvd: 107
Host 124.34.189.142.in-addr.arpa not found: 2(SERVFAIL)
server can't find 142.189.34.124.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 189.176.22.197 | attack | 37215/tcp 37215/tcp 37215/tcp... [2020-04-10/12]4pkt,1pt.(tcp) |
2020-04-13 07:28:23 |
| 103.145.12.68 | attackbots | [2020-04-12 19:21:52] NOTICE[12114][C-00004f4e] chan_sip.c: Call from '' (103.145.12.68:60649) to extension '01146132660954' rejected because extension not found in context 'public'. [2020-04-12 19:21:52] SECURITY[12128] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-12T19:21:52.018-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="01146132660954",SessionID="0x7f020c0db748",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/103.145.12.68/60649",ACLName="no_extension_match" [2020-04-12 19:21:57] NOTICE[12114][C-00004f4f] chan_sip.c: Call from '' (103.145.12.68:51898) to extension '+46132660954' rejected because extension not found in context 'public'. [2020-04-12 19:21:57] SECURITY[12128] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-12T19:21:57.531-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="+46132660954",SessionID="0x7f020c167898",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/103. ... |
2020-04-13 07:38:59 |
| 78.184.126.240 | attackspambots | 23/tcp [2020-04-12]1pkt |
2020-04-13 07:41:59 |
| 177.11.136.4 | attackspambots | 445/tcp [2020-04-12]1pkt |
2020-04-13 07:48:09 |
| 80.81.0.94 | attackspambots | Apr 13 00:35:29 pve sshd[10014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.81.0.94 Apr 13 00:35:31 pve sshd[10014]: Failed password for invalid user test from 80.81.0.94 port 42486 ssh2 Apr 13 00:40:31 pve sshd[13722]: Failed password for root from 80.81.0.94 port 5538 ssh2 |
2020-04-13 07:19:58 |
| 145.239.137.248 | attack | 20037/tcp [2020-04-12]1pkt |
2020-04-13 07:38:03 |
| 120.233.171.6 | attackbotsspam | port |
2020-04-13 07:17:01 |
| 104.131.121.25 | attackbotsspam | Apr 13 02:22:52 taivassalofi sshd[186017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.121.25 Apr 13 02:22:54 taivassalofi sshd[186017]: Failed password for invalid user schagerer from 104.131.121.25 port 49083 ssh2 ... |
2020-04-13 07:36:34 |
| 177.6.86.56 | attackbotsspam | 23/tcp [2020-04-12]1pkt |
2020-04-13 07:32:57 |
| 144.217.242.247 | attack | Apr 12 23:42:37 sshgateway sshd\[3758\]: Invalid user garduno from 144.217.242.247 Apr 12 23:42:37 sshgateway sshd\[3758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=247.ip-144-217-242.net Apr 12 23:42:39 sshgateway sshd\[3758\]: Failed password for invalid user garduno from 144.217.242.247 port 43244 ssh2 |
2020-04-13 07:50:11 |
| 114.118.7.153 | attack | 2020-04-12T22:47:24.671469shield sshd\[28826\]: Invalid user apache2 from 114.118.7.153 port 48146 2020-04-12T22:47:24.675067shield sshd\[28826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.118.7.153 2020-04-12T22:47:26.812650shield sshd\[28826\]: Failed password for invalid user apache2 from 114.118.7.153 port 48146 ssh2 2020-04-12T22:51:04.532833shield sshd\[29713\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.118.7.153 user=root 2020-04-12T22:51:06.208390shield sshd\[29713\]: Failed password for root from 114.118.7.153 port 43740 ssh2 |
2020-04-13 07:38:29 |
| 198.40.56.50 | attack | Icarus honeypot on github |
2020-04-13 07:14:20 |
| 128.199.38.162 | attackspam | 20229/tcp 20229/tcp [2020-04-12]2pkt |
2020-04-13 07:36:47 |
| 151.127.0.151 | attackspambots | Invalid user pi from 151.127.0.151 port 60736 |
2020-04-13 07:15:40 |
| 121.134.202.22 | attack | ssh brute force |
2020-04-13 07:33:35 |