城市(city): San Jose
省份(region): California
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 149.104.0.0 - 149.104.255.255
CIDR: 149.104.0.0/16
NetName: COGENT-149-104-16
NetHandle: NET-149-104-0-0-1
Parent: NET149 (NET-149-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Cogent Communications, LLC (COGC)
RegDate: 1992-02-03
Updated: 2025-09-23
Ref: https://rdap.arin.net/registry/ip/149.104.0.0
OrgName: Cogent Communications, LLC
OrgId: COGC
Address: 2450 N Street NW
City: Washington
StateProv: DC
PostalCode: 20037
Country: US
RegDate: 2000-05-30
Updated: 2025-09-23
Comment: Geofeed https://geofeed.cogentco.com/geofeed.csv
Ref: https://rdap.arin.net/registry/entity/COGC
ReferralServer: rwhois://rwhois.cogentco.com:4321
OrgTechHandle: IPALL-ARIN
OrgTechName: IP Allocation
OrgTechPhone: +1-877-875-4311
OrgTechEmail: ipalloc@cogentco.com
OrgTechRef: https://rdap.arin.net/registry/entity/IPALL-ARIN
OrgAbuseHandle: COGEN-ARIN
OrgAbuseName: Cogent Abuse
OrgAbusePhone: +1-877-875-4311
OrgAbuseEmail: abuse@cogentco.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/COGEN-ARIN
OrgNOCHandle: ZC108-ARIN
OrgNOCName: Cogent Communications
OrgNOCPhone: +1-877-875-4311
OrgNOCEmail: noc@cogentco.com
OrgNOCRef: https://rdap.arin.net/registry/entity/ZC108-ARIN
# end
# start
NetRange: 149.104.64.0 - 149.104.127.255
CIDR: 149.104.64.0/18
NetName: BEDGE-CGNT-NET-1
NetHandle: NET-149-104-64-0-1
Parent: COGENT-149-104-16 (NET-149-104-0-0-1)
NetType: Reallocated
OriginAS:
Organization: BEDGE CO LIMITED (BL-1081)
RegDate: 2023-05-26
Updated: 2023-05-26
Ref: https://rdap.arin.net/registry/ip/149.104.64.0
OrgName: BEDGE CO LIMITED
OrgId: BL-1081
Address: 1117 CUSTIS PL
Address: PHILADELPHIA, PA 19122-4141
City: PHILADELPHIA
StateProv: PA
PostalCode: 19122-4141
Country: US
RegDate: 2023-03-22
Updated: 2024-03-25
Comment: Geofeed https://www.bedge.com/geofeed.csv
Ref: https://rdap.arin.net/registry/entity/BL-1081
OrgTechHandle: FELIC24-ARIN
OrgTechName: Felicia, Felicia
OrgTechPhone: +1-267-670-0790
OrgTechEmail: NOC@bedge.com
OrgTechRef: https://rdap.arin.net/registry/entity/FELIC24-ARIN
OrgAbuseHandle: FELIC24-ARIN
OrgAbuseName: Felicia, Felicia
OrgAbusePhone: +1-267-670-0790
OrgAbuseEmail: NOC@bedge.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/FELIC24-ARIN
# end
# start
NetRange: 149.104.111.0 - 149.104.111.255
CIDR: 149.104.111.0/24
NetName: KAOPUCLOUD-TW
NetHandle: NET-149-104-111-0-1
Parent: BEDGE-CGNT-NET-1 (NET-149-104-64-0-1)
NetType: Reassigned
OriginAS:
Customer: KaopuCloud-TW (C09926226)
RegDate: 2023-08-04
Updated: 2025-09-05
Ref: https://rdap.arin.net/registry/ip/149.104.111.0
CustName: KaopuCloud-TW
Address: Taiwan,Taipei
City: Taipei
StateProv:
PostalCode:
Country: TW
RegDate: 2023-08-04
Updated: 2025-09-05
Ref: https://rdap.arin.net/registry/entity/C09926226
OrgTechHandle: FELIC24-ARIN
OrgTechName: Felicia, Felicia
OrgTechPhone: +1-267-670-0790
OrgTechEmail: NOC@bedge.com
OrgTechRef: https://rdap.arin.net/registry/entity/FELIC24-ARIN
OrgAbuseHandle: FELIC24-ARIN
OrgAbuseName: Felicia, Felicia
OrgAbusePhone: +1-267-670-0790
OrgAbuseEmail: NOC@bedge.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/FELIC24-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.104.111.60
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58135
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;149.104.111.60. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026033103 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 01 14:49:19 CST 2026
;; MSG SIZE rcvd: 107
Host 60.111.104.149.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 60.111.104.149.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 2.56.207.101 | attack | Attempted Email Sync. Password Hacking/Probing. |
2020-09-09 22:44:28 |
| 157.44.175.149 | attackbotsspam | 1599583990 - 09/08/2020 18:53:10 Host: 157.44.175.149/157.44.175.149 Port: 445 TCP Blocked ... |
2020-09-09 22:14:03 |
| 175.24.72.167 | attackbotsspam | " " |
2020-09-09 22:45:27 |
| 193.169.253.173 | attackspambots | 2020-09-09T01:43:01.194538lavrinenko.info sshd[28565]: Failed password for root from 193.169.253.173 port 55828 ssh2 2020-09-09T01:44:18.659762lavrinenko.info sshd[28611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.169.253.173 user=root 2020-09-09T01:44:20.328611lavrinenko.info sshd[28611]: Failed password for root from 193.169.253.173 port 32816 ssh2 2020-09-09T01:45:37.673990lavrinenko.info sshd[28661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.169.253.173 user=root 2020-09-09T01:45:39.854743lavrinenko.info sshd[28661]: Failed password for root from 193.169.253.173 port 38172 ssh2 ... |
2020-09-09 22:14:47 |
| 211.189.132.54 | attackbotsspam | Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root |
2020-09-09 22:55:18 |
| 27.72.98.116 | attackspambots | CMS (WordPress or Joomla) login attempt. |
2020-09-09 22:19:47 |
| 157.230.163.6 | attackbotsspam | $f2bV_matches |
2020-09-09 22:22:28 |
| 170.239.108.74 | attack | 2020-09-09T16:40:32.003186+02:00 |
2020-09-09 22:51:47 |
| 39.96.82.174 | attackbotsspam | Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): |
2020-09-09 22:38:42 |
| 114.67.82.217 | attack | Sep 9 15:36:17 vps sshd[24603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.82.217 Sep 9 15:36:19 vps sshd[24603]: Failed password for invalid user build from 114.67.82.217 port 42510 ssh2 Sep 9 15:54:34 vps sshd[25810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.82.217 ... |
2020-09-09 22:52:34 |
| 3.222.125.72 | attack | https://rebrand.ly/designing-best-c52c5 |
2020-09-09 22:20:17 |
| 103.105.67.146 | attackbotsspam | $f2bV_matches |
2020-09-09 22:48:49 |
| 3.131.82.158 | attack | Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root |
2020-09-09 22:49:06 |
| 46.32.252.84 | attack | Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root |
2020-09-09 22:31:03 |
| 207.155.193.201 | attack | port scan and connect, tcp 443 (https) |
2020-09-09 22:31:21 |