城市(city): Los Angeles
省份(region): California
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 148.153.0.0 - 148.153.255.255
CIDR: 148.153.0.0/16
NetName: CDSC-1
NetHandle: NET-148-153-0-0-1
Parent: NET148 (NET-148-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: CDS Global Cloud Co., Ltd (CDSC-1)
RegDate: 2016-01-12
Updated: 2016-01-12
Ref: https://rdap.arin.net/registry/ip/148.153.0.0
OrgName: CDS Global Cloud Co., Ltd
OrgId: CDSC-1
Address: 4105 W Spring Creek Pkwy,#606
City: Plano
StateProv: TX
PostalCode: 75024
Country: US
RegDate: 2014-06-02
Updated: 2026-01-09
Ref: https://rdap.arin.net/registry/entity/CDSC-1
OrgTechHandle: LAWRE323-ARIN
OrgTechName: Lawrence, Leo
OrgTechPhone: +1-213-375-3998
OrgTechEmail: llawrence@urbanconnectedcloud.com
OrgTechRef: https://rdap.arin.net/registry/entity/LAWRE323-ARIN
OrgNOCHandle: ARINS11-ARIN
OrgNOCName: ARIN Support
OrgNOCPhone: +1-817-846-4492
OrgNOCEmail: lijun.zhang@capitalonline.net
OrgNOCRef: https://rdap.arin.net/registry/entity/ARINS11-ARIN
OrgTechHandle: LILIN8-ARIN
OrgTechName: Li, Lin
OrgTechPhone: +1-469-744-2718
OrgTechEmail: lin.li@capitalonline.net
OrgTechRef: https://rdap.arin.net/registry/entity/LILIN8-ARIN
OrgAbuseHandle: ABUSE8407-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-617-545-4603
OrgAbuseEmail: abuse@urbanconnectedcloud.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE8407-ARIN
OrgTechHandle: LINGT4-ARIN
OrgTechName: Ling, Tao
OrgTechPhone: +86-1051997733
OrgTechEmail: tao.ling@capitalonline.net
OrgTechRef: https://rdap.arin.net/registry/entity/LINGT4-ARIN
OrgTechHandle: MASHA9-ARIN
OrgTechName: ma, shaoju
OrgTechPhone: +1-213-375-3998
OrgTechEmail: shaoju.ma@capitalonline.net
OrgTechRef: https://rdap.arin.net/registry/entity/MASHA9-ARIN
OrgTechHandle: ARINS11-ARIN
OrgTechName: ARIN Support
OrgTechPhone: +1-817-846-4492
OrgTechEmail: lijun.zhang@capitalonline.net
OrgTechRef: https://rdap.arin.net/registry/entity/ARINS11-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.153.56.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17671
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;148.153.56.18. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026022801 1800 900 604800 86400
;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 01 00:33:11 CST 2026
;; MSG SIZE rcvd: 106
Host 18.56.153.148.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 18.56.153.148.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 106.75.231.107 | attackbotsspam | Invalid user admin from 106.75.231.107 port 34206 |
2020-09-25 19:03:12 |
| 77.68.20.140 | attackbots | Sep 25 12:45:26 cp sshd[20393]: Failed password for root from 77.68.20.140 port 54602 ssh2 Sep 25 12:45:26 cp sshd[20393]: Failed password for root from 77.68.20.140 port 54602 ssh2 |
2020-09-25 19:08:18 |
| 41.239.105.224 | attack | Honeypot attack, port: 445, PTR: host-41.239.105.224.tedata.net. |
2020-09-25 19:33:13 |
| 110.19.169.86 | attackspam | Brute force blocker - service: proftpd1 - aantal: 141 - Mon Aug 20 13:25:19 2018 |
2020-09-25 19:41:43 |
| 106.13.225.60 | attackbotsspam | 2020-09-25T08:08:58.730056ionos.janbro.de sshd[157583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.225.60 user=root 2020-09-25T08:09:00.641898ionos.janbro.de sshd[157583]: Failed password for root from 106.13.225.60 port 57238 ssh2 2020-09-25T08:13:16.825756ionos.janbro.de sshd[157594]: Invalid user tibco from 106.13.225.60 port 53422 2020-09-25T08:13:17.006413ionos.janbro.de sshd[157594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.225.60 2020-09-25T08:13:16.825756ionos.janbro.de sshd[157594]: Invalid user tibco from 106.13.225.60 port 53422 2020-09-25T08:13:19.153960ionos.janbro.de sshd[157594]: Failed password for invalid user tibco from 106.13.225.60 port 53422 ssh2 2020-09-25T08:17:58.361552ionos.janbro.de sshd[157604]: Invalid user wang from 106.13.225.60 port 49638 2020-09-25T08:17:58.487176ionos.janbro.de sshd[157604]: pam_unix(sshd:auth): authentication failure; logname= uid ... |
2020-09-25 19:05:53 |
| 35.247.205.152 | attackbotsspam | SSH Honeypot -> SSH Bruteforce / Login |
2020-09-25 19:01:10 |
| 123.207.92.183 | attackspam | Sep 25 12:41:14 inter-technics sshd[26047]: Invalid user zte from 123.207.92.183 port 45184 Sep 25 12:41:14 inter-technics sshd[26047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.92.183 Sep 25 12:41:14 inter-technics sshd[26047]: Invalid user zte from 123.207.92.183 port 45184 Sep 25 12:41:16 inter-technics sshd[26047]: Failed password for invalid user zte from 123.207.92.183 port 45184 ssh2 Sep 25 12:45:37 inter-technics sshd[26428]: Invalid user ts3srv from 123.207.92.183 port 41890 ... |
2020-09-25 19:02:11 |
| 14.169.99.179 | attack | $f2bV_matches |
2020-09-25 19:06:11 |
| 142.93.37.178 | attack | Scan or attack attempt on email service. |
2020-09-25 19:11:06 |
| 103.25.21.34 | attack | SSH invalid-user multiple login try |
2020-09-25 18:55:09 |
| 218.92.0.251 | attack | Sep 25 14:24:40 dignus sshd[15800]: Failed password for root from 218.92.0.251 port 52848 ssh2 Sep 25 14:24:43 dignus sshd[15800]: Failed password for root from 218.92.0.251 port 52848 ssh2 Sep 25 14:24:46 dignus sshd[15800]: Failed password for root from 218.92.0.251 port 52848 ssh2 Sep 25 14:24:50 dignus sshd[15800]: Failed password for root from 218.92.0.251 port 52848 ssh2 Sep 25 14:24:53 dignus sshd[15800]: Failed password for root from 218.92.0.251 port 52848 ssh2 ... |
2020-09-25 19:28:15 |
| 74.120.14.78 | attackbotsspam | firewall-block, port(s): 1337/tcp |
2020-09-25 19:36:27 |
| 173.212.193.150 | attackspambots | Invalid user franco from 173.212.193.150 port 53930 |
2020-09-25 19:35:29 |
| 211.20.23.114 | attackbotsspam | Honeypot attack, port: 81, PTR: 211-20-23-114.HINET-IP.hinet.net. |
2020-09-25 19:36:57 |
| 221.229.196.33 | attackbotsspam | malicious Brute-Force reported by https://www.patrick-binder.de ... |
2020-09-25 18:56:43 |