城市(city): unknown
省份(region): New York
国家(country): United States
运营商(isp): Verizon
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 166.139.0.0 - 166.147.63.255
CIDR: 166.146.0.0/16, 166.139.0.0/16, 166.140.0.0/14, 166.147.0.0/18, 166.144.0.0/15
NetName: MCICS
NetHandle: NET-166-139-0-0-1
Parent: NET166 (NET-166-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Verizon Business (MCICS)
RegDate: 2025-03-25
Updated: 2025-03-25
Ref: https://rdap.arin.net/registry/ip/166.139.0.0
OrgName: Verizon Business
OrgId: MCICS
Address: 22001 Loudoun County Pkwy
City: Ashburn
StateProv: VA
PostalCode: 20147
Country: US
RegDate: 2006-05-30
Updated: 2025-10-28
Ref: https://rdap.arin.net/registry/entity/MCICS
OrgTechHandle: VIS1-ARIN
OrgTechName: Verizon Internet Services
OrgTechPhone: +1-800-243-6994
OrgTechEmail: IPMGMT@verizon.com
OrgTechRef: https://rdap.arin.net/registry/entity/VIS1-ARIN
OrgDNSHandle: VZDNS1-ARIN
OrgDNSName: VZ-DNSADMIN
OrgDNSPhone: +1-800-900-0241
OrgDNSEmail: dnsadmin@verizon.com
OrgDNSRef: https://rdap.arin.net/registry/entity/VZDNS1-ARIN
OrgAbuseHandle: ABUSE3-ARIN
OrgAbuseName: abuse
OrgAbusePhone: +1-800-900-0241
OrgAbuseEmail: abuse-mail@verizonbusiness.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3-ARIN
OrgAbuseHandle: ABUSE5603-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-800-900-0241
OrgAbuseEmail: abuse@verizon.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE5603-ARIN
OrgTechHandle: SWIPP9-ARIN
OrgTechName: SWIPPER
OrgTechPhone: +1-800-900-0241
OrgTechEmail: swipper@verizonbusiness.com
OrgTechRef: https://rdap.arin.net/registry/entity/SWIPP9-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.143.41.77
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14593
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;166.143.41.77. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032300 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 24 01:31:27 CST 2026
;; MSG SIZE rcvd: 106
Host 77.41.143.166.in-addr.arpa not found: 2(SERVFAIL)
server can't find 166.143.41.77.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 14.241.67.219 | attackspambots | Unauthorized connection attempt detected from IP address 14.241.67.219 to port 445 |
2019-12-25 21:27:00 |
| 86.42.230.158 | attackbotsspam | Dec 25 14:56:22 master sshd[19189]: Failed password for invalid user patrice from 86.42.230.158 port 46660 ssh2 |
2019-12-25 21:34:25 |
| 64.71.131.98 | attackbots | Unauthorized connection attempt detected from IP address 64.71.131.98 to port 445 |
2019-12-25 21:07:25 |
| 41.79.95.226 | attackbotsspam | Telnet/23 MH Probe, BF, Hack - |
2019-12-25 21:33:33 |
| 216.10.249.73 | attack | Dec 25 12:59:05 localhost sshd\[21398\]: Invalid user contactus from 216.10.249.73 port 50512 Dec 25 12:59:05 localhost sshd\[21398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.10.249.73 Dec 25 12:59:07 localhost sshd\[21398\]: Failed password for invalid user contactus from 216.10.249.73 port 50512 ssh2 |
2019-12-25 21:09:34 |
| 36.41.174.139 | attackbotsspam | Invalid user shieh from 36.41.174.139 port 37638 |
2019-12-25 21:31:42 |
| 14.169.159.225 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 25-12-2019 06:20:09. |
2019-12-25 21:05:13 |
| 181.63.245.127 | attackbotsspam | Dec 25 10:01:04 MK-Soft-VM7 sshd[3675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.63.245.127 Dec 25 10:01:06 MK-Soft-VM7 sshd[3675]: Failed password for invalid user ayse from 181.63.245.127 port 45505 ssh2 ... |
2019-12-25 21:21:04 |
| 37.235.183.244 | attackspam | Telnet/23 MH Probe, BF, Hack - |
2019-12-25 21:36:08 |
| 171.251.238.117 | attackbotsspam | Attempt to attack host OS, exploiting network vulnerabilities, on 25-12-2019 06:20:09. |
2019-12-25 21:04:06 |
| 45.238.232.42 | attackspambots | Invalid user guinard from 45.238.232.42 port 48172 |
2019-12-25 21:28:21 |
| 164.132.63.169 | attackbots | Scanning random ports - tries to find possible vulnerable services |
2019-12-25 21:00:57 |
| 106.13.7.186 | attackbotsspam | Dec 25 08:32:45 zeus sshd[5599]: Failed password for sync from 106.13.7.186 port 59672 ssh2 Dec 25 08:35:57 zeus sshd[5641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.7.186 Dec 25 08:35:59 zeus sshd[5641]: Failed password for invalid user apache from 106.13.7.186 port 54534 ssh2 |
2019-12-25 21:19:50 |
| 61.231.31.138 | attackbots | Scanning |
2019-12-25 21:06:11 |
| 207.236.200.70 | attack | Dec 25 13:17:07 silence02 sshd[26700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.236.200.70 Dec 25 13:17:09 silence02 sshd[26700]: Failed password for invalid user nsroot from 207.236.200.70 port 37688 ssh2 Dec 25 13:19:30 silence02 sshd[26790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.236.200.70 |
2019-12-25 21:16:57 |