城市(city): Hong Kong
省份(region): unknown
国家(country): Hong Kong
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 149.40.0.0 - 149.40.255.255
CIDR: 149.40.0.0/16
NetName: COGENT-149-40-16
NetHandle: NET-149-40-0-0-1
Parent: NET149 (NET-149-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Cogent Communications, LLC (COGC)
RegDate: 1992-01-28
Updated: 2025-09-23
Ref: https://rdap.arin.net/registry/ip/149.40.0.0
OrgName: Cogent Communications, LLC
OrgId: COGC
Address: 2450 N Street NW
City: Washington
StateProv: DC
PostalCode: 20037
Country: US
RegDate: 2000-05-30
Updated: 2025-09-23
Comment: Geofeed https://geofeed.cogentco.com/geofeed.csv
Ref: https://rdap.arin.net/registry/entity/COGC
ReferralServer: rwhois://rwhois.cogentco.com:4321
OrgAbuseHandle: COGEN-ARIN
OrgAbuseName: Cogent Abuse
OrgAbusePhone: +1-877-875-4311
OrgAbuseEmail: abuse@cogentco.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/COGEN-ARIN
OrgTechHandle: IPALL-ARIN
OrgTechName: IP Allocation
OrgTechPhone: +1-877-875-4311
OrgTechEmail: ipalloc@cogentco.com
OrgTechRef: https://rdap.arin.net/registry/entity/IPALL-ARIN
OrgNOCHandle: ZC108-ARIN
OrgNOCName: Cogent Communications
OrgNOCPhone: +1-877-875-4311
OrgNOCEmail: noc@cogentco.com
OrgNOCRef: https://rdap.arin.net/registry/entity/ZC108-ARIN
# end
# start
NetRange: 149.40.48.0 - 149.40.63.255
CIDR: 149.40.48.0/20
NetName: DATACAMP-CGNT-NET-6
NetHandle: NET-149-40-48-0-1
Parent: COGENT-149-40-16 (NET-149-40-0-0-1)
NetType: Reallocated
OriginAS:
Organization: CDN77 (DL-807)
RegDate: 2023-07-18
Updated: 2023-07-18
Ref: https://rdap.arin.net/registry/ip/149.40.48.0
OrgName: CDN77
OrgId: DL-807
Address: 207 Regent Street
City: London
StateProv:
PostalCode: W1B 3HH
Country: GB
RegDate: 2022-03-28
Updated: 2022-12-01
Ref: https://rdap.arin.net/registry/entity/DL-807
OrgTechHandle: PROCH16-ARIN
OrgTechName: Prochazka, Jiri
OrgTechPhone: +443308081648
OrgTechEmail: support@cdn77.com
OrgTechRef: https://rdap.arin.net/registry/entity/PROCH16-ARIN
OrgAbuseHandle: CAC96-ARIN
OrgAbuseName: CDN77 Abuse contact
OrgAbusePhone: +443308081648
OrgAbuseEmail: abuse@cdn77.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/CAC96-ARIN
OrgNOCHandle: PROCH16-ARIN
OrgNOCName: Prochazka, Jiri
OrgNOCPhone: +443308081648
OrgNOCEmail: support@cdn77.com
OrgNOCRef: https://rdap.arin.net/registry/entity/PROCH16-ARIN
OrgRoutingHandle: CDNNO-ARIN
OrgRoutingName: CDN77 NOC
OrgRoutingPhone: +443308081648
OrgRoutingEmail: network@cdn77.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/CDNNO-ARIN
# end
# start
NetRange: 149.40.54.0 - 149.40.55.255
CIDR: 149.40.54.0/23
NetName: CDNEXT-HKG
NetHandle: NET-149-40-54-0-1
Parent: DATACAMP-CGNT-NET-6 (NET-149-40-48-0-1)
NetType: Reassigned
OriginAS:
Customer: Datacamp Limited (C09878190)
RegDate: 2023-07-26
Updated: 2023-07-26
Ref: https://rdap.arin.net/registry/ip/149.40.54.0
CustName: Datacamp Limited
Address: 207 Regent Street
City: London
StateProv:
PostalCode: W1B3HH
Country: GB
RegDate: 2023-07-26
Updated: 2023-07-26
Ref: https://rdap.arin.net/registry/entity/C09878190
OrgTechHandle: PROCH16-ARIN
OrgTechName: Prochazka, Jiri
OrgTechPhone: +443308081648
OrgTechEmail: support@cdn77.com
OrgTechRef: https://rdap.arin.net/registry/entity/PROCH16-ARIN
OrgAbuseHandle: CAC96-ARIN
OrgAbuseName: CDN
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.40.55.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16049
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;149.40.55.20. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025111002 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Nov 11 10:51:15 CST 2025
;; MSG SIZE rcvd: 105
20.55.40.149.in-addr.arpa domain name pointer unn-149-40-55-20.datapacket.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
20.55.40.149.in-addr.arpa name = unn-149-40-55-20.datapacket.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 77.247.110.237 | attackbots | TCP port 80 (HTTP) attempt blocked by firewall. [2019-07-27 17:59:10] |
2019-07-28 00:16:30 |
| 24.50.242.231 | attackbotsspam | Automatic report - Port Scan Attack |
2019-07-28 01:20:38 |
| 200.70.56.204 | attack | Jul 27 23:35:58 webhost01 sshd[4744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.70.56.204 Jul 27 23:36:00 webhost01 sshd[4744]: Failed password for invalid user icon from 200.70.56.204 port 33134 ssh2 ... |
2019-07-28 00:45:36 |
| 211.38.244.205 | attackbotsspam | Automatic report - Banned IP Access |
2019-07-28 01:21:56 |
| 5.135.182.185 | attackspambots | Jul 27 19:16:17 mintao sshd\[26468\]: Invalid user biz from 5.135.182.185\ Jul 27 19:17:31 mintao sshd\[26476\]: Invalid user bk from 5.135.182.185\ |
2019-07-28 01:36:03 |
| 206.189.80.125 | attackspam | Automatic report - Banned IP Access |
2019-07-28 01:16:22 |
| 37.24.143.134 | attack | Jul 27 20:02:17 server sshd\[5695\]: User root from 37.24.143.134 not allowed because listed in DenyUsers Jul 27 20:02:17 server sshd\[5695\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.24.143.134 user=root Jul 27 20:02:19 server sshd\[5695\]: Failed password for invalid user root from 37.24.143.134 port 50166 ssh2 Jul 27 20:10:55 server sshd\[21333\]: User root from 37.24.143.134 not allowed because listed in DenyUsers Jul 27 20:10:55 server sshd\[21333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.24.143.134 user=root |
2019-07-28 01:16:46 |
| 210.183.21.48 | attackspam | Jul 27 18:26:25 cp sshd[25155]: Failed password for root from 210.183.21.48 port 26195 ssh2 Jul 27 18:26:25 cp sshd[25155]: Failed password for root from 210.183.21.48 port 26195 ssh2 |
2019-07-28 00:34:03 |
| 24.248.12.194 | attackbots | 445/tcp 445/tcp [2019-05-28/07-27]2pkt |
2019-07-28 01:10:50 |
| 176.109.235.220 | attack | scan z |
2019-07-28 00:15:22 |
| 205.145.146.214 | attackspambots | Automatic report - Port Scan Attack |
2019-07-28 01:33:36 |
| 133.130.97.118 | attackbotsspam | Jul 27 15:59:57 MK-Soft-VM5 sshd\[31814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.97.118 user=root Jul 27 15:59:59 MK-Soft-VM5 sshd\[31814\]: Failed password for root from 133.130.97.118 port 37524 ssh2 Jul 27 16:04:48 MK-Soft-VM5 sshd\[31835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.97.118 user=root ... |
2019-07-28 00:59:24 |
| 145.239.131.228 | attack | Jul 27 18:05:29 vps647732 sshd[32641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.131.228 Jul 27 18:05:30 vps647732 sshd[32641]: Failed password for invalid user GARENA from 145.239.131.228 port 45478 ssh2 ... |
2019-07-28 00:27:12 |
| 76.169.123.67 | attack | Telnet brute force |
2019-07-28 01:17:24 |
| 201.149.27.139 | attack | 445/tcp 445/tcp 445/tcp... [2019-05-27/07-27]20pkt,1pt.(tcp) |
2019-07-28 01:02:22 |