城市(city): Wyoming
省份(region): Illinois
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 198.100.48.0 - 198.100.63.255
CIDR: 198.100.48.0/20
NetName: NEXTLINK
NetHandle: NET-198-100-48-0-1
Parent: NET198 (NET-198-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Nextlink Broadband (ATIGL)
RegDate: 2012-07-05
Updated: 2026-03-24
Comment: Geofeed: https://geofeed2.nxlink.com/geofeed.csv
Ref: https://rdap.arin.net/registry/ip/198.100.48.0
OrgName: Nextlink Broadband
OrgId: ATIGL
Address: 95 Parker Oaks Lane
City: Hudson Oaks
StateProv: TX
PostalCode: 76087
Country: US
RegDate: 2012-04-04
Updated: 2025-09-10
Ref: https://rdap.arin.net/registry/entity/ATIGL
OrgDNSHandle: PMR12-ARIN
OrgDNSName: Robbins, Peter Michael
OrgDNSPhone: +1-855-698-5465
OrgDNSEmail: probbins@team.nxlink.com
OrgDNSRef: https://rdap.arin.net/registry/entity/PMR12-ARIN
OrgAbuseHandle: ABUSE5264-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-855-698-5465
OrgAbuseEmail: abuse@team.nxlink.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE5264-ARIN
OrgTechHandle: ANDER2361-ARIN
OrgTechName: Anderson, Cody
OrgTechPhone: +1-817-771-6540
OrgTechEmail: canderson@team.nxlink.com
OrgTechRef: https://rdap.arin.net/registry/entity/ANDER2361-ARIN
OrgRoutingHandle: PMR12-ARIN
OrgRoutingName: Robbins, Peter Michael
OrgRoutingPhone: +1-855-698-5465
OrgRoutingEmail: probbins@team.nxlink.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/PMR12-ARIN
OrgTechHandle: PMR12-ARIN
OrgTechName: Robbins, Peter Michael
OrgTechPhone: +1-855-698-5465
OrgTechEmail: probbins@team.nxlink.com
OrgTechRef: https://rdap.arin.net/registry/entity/PMR12-ARIN
OrgRoutingHandle: ANDER2361-ARIN
OrgRoutingName: Anderson, Cody
OrgRoutingPhone: +1-817-771-6540
OrgRoutingEmail: canderson@team.nxlink.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/ANDER2361-ARIN
OrgNOCHandle: DNO96-ARIN
OrgNOCName: Director of network operations
OrgNOCPhone: +1-855-698-5465
OrgNOCEmail: netops@team.nxlink.com
OrgNOCRef: https://rdap.arin.net/registry/entity/DNO96-ARIN
OrgTechHandle: DNO96-ARIN
OrgTechName: Director of network operations
OrgTechPhone: +1-855-698-5465
OrgTechEmail: netops@team.nxlink.com
OrgTechRef: https://rdap.arin.net/registry/entity/DNO96-ARIN
OrgNOCHandle: PMR12-ARIN
OrgNOCName: Robbins, Peter Michael
OrgNOCPhone: +1-855-698-5465
OrgNOCEmail: probbins@team.nxlink.com
OrgNOCRef: https://rdap.arin.net/registry/entity/PMR12-ARIN
OrgDNSHandle: ANDER2361-ARIN
OrgDNSName: Anderson, Cody
OrgDNSPhone: +1-817-771-6540
OrgDNSEmail: canderson@team.nxlink.com
OrgDNSRef: https://rdap.arin.net/registry/entity/ANDER2361-ARIN
OrgTechHandle: CCK6-ARIN
OrgTechName: Kilton, Cameron C
OrgTechPhone: +1-207-210-3654
OrgTechEmail: cam@nextlink.team
OrgTechRef: https://rdap.arin.net/registry/entity/CCK6-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.100.58.65
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62781
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;198.100.58.65. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026051301 1800 900 604800 86400
;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 14 07:24:40 CST 2026
;; MSG SIZE rcvd: 106
Host 65.58.100.198.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 65.58.100.198.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 106.13.90.78 | attackbotsspam | Invalid user testuser from 106.13.90.78 port 34114 |
2020-02-22 07:29:52 |
| 43.252.212.87 | attack | IP: 43.252.212.87
Ports affected
http protocol over TLS/SSL (443)
World Wide Web HTTP (80)
Abuse Confidence rating 36%
Found in DNSBL('s)
ASN Details
AS46015 Exa Bytes Network Sdn.Bhd.
Malaysia (MY)
CIDR 43.252.212.0/22
Log Date: 21/02/2020 8:34:28 PM UTC |
2020-02-22 07:18:22 |
| 189.179.164.140 | attackbots | Unauthorized connection attempt from IP address 189.179.164.140 on Port 445(SMB) |
2020-02-22 07:21:11 |
| 128.199.219.108 | attackbots | LGS,WP GET /wp-login.php |
2020-02-22 07:29:36 |
| 218.92.0.145 | attackbots | Feb 21 23:48:26 eventyay sshd[18154]: Failed password for root from 218.92.0.145 port 5331 ssh2 Feb 21 23:48:38 eventyay sshd[18154]: error: maximum authentication attempts exceeded for root from 218.92.0.145 port 5331 ssh2 [preauth] Feb 21 23:49:00 eventyay sshd[18158]: Failed password for root from 218.92.0.145 port 46840 ssh2 ... |
2020-02-22 07:33:44 |
| 167.114.36.165 | attackbotsspam | Feb 21 22:20:02 xeon sshd[29516]: Failed password for invalid user ts3srv from 167.114.36.165 port 35522 ssh2 |
2020-02-22 07:37:22 |
| 178.57.114.101 | attackspambots | Unauthorized connection attempt from IP address 178.57.114.101 on Port 445(SMB) |
2020-02-22 07:10:06 |
| 194.61.27.240 | attackbotsspam | Feb 21 23:19:07 debian-2gb-nbg1-2 kernel: \[4582754.671857\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.61.27.240 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=8498 PROTO=TCP SPT=43327 DPT=23390 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-02-22 07:17:07 |
| 45.80.189.19 | attack | IP: 45.80.189.19
Ports affected
World Wide Web HTTP (80)
Abuse Confidence rating 31%
Found in DNSBL('s)
ASN Details
AS3214 xTom Limited
Germany (DE)
CIDR 45.80.189.0/24
Log Date: 21/02/2020 8:37:13 PM UTC |
2020-02-22 07:17:37 |
| 177.102.55.24 | attackspambots | 1582320631 - 02/21/2020 22:30:31 Host: 177.102.55.24/177.102.55.24 Port: 445 TCP Blocked |
2020-02-22 07:05:27 |
| 27.78.14.83 | attackbots | Invalid user user from 27.78.14.83 port 45782 |
2020-02-22 07:01:54 |
| 101.231.146.36 | attackbots | Invalid user testftp from 101.231.146.36 port 46820 |
2020-02-22 07:11:23 |
| 103.216.112.204 | attack | Invalid user ocadmin from 103.216.112.204 port 39862 |
2020-02-22 07:02:08 |
| 144.217.15.221 | attackbots | Invalid user wetserver from 144.217.15.221 port 60478 |
2020-02-22 07:03:40 |
| 176.32.39.161 | attackspambots | Brute force attack against VPN service |
2020-02-22 07:10:33 |