城市(city): Greenwood
省份(region): South Carolina
国家(country): United States
运营商(isp): RTC Communications LLC
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 198.13.80.0 - 198.13.95.255
CIDR: 198.13.80.0/20
NetName: WCTEL-NET
NetHandle: NET-198-13-80-0-1
Parent: NET198 (NET-198-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: West Carolina Communications, LLC (WCCL-3)
RegDate: 2012-09-10
Updated: 2022-09-30
Ref: https://rdap.arin.net/registry/ip/198.13.80.0
OrgName: West Carolina Communications, LLC
OrgId: WCCL-3
Address: 229 Hwy 28 Bypass
City: Abbeville
StateProv: SC
PostalCode: 29620
Country: US
RegDate: 2012-05-18
Updated: 2026-01-27
Ref: https://rdap.arin.net/registry/entity/WCCL-3
OrgNOCHandle: ROBIN82-ARIN
OrgNOCName: Robinson, Jeff
OrgNOCPhone: +1-864-446-2111
OrgNOCEmail: jeff.robinson@wctel.com
OrgNOCRef: https://rdap.arin.net/registry/entity/ROBIN82-ARIN
OrgTechHandle: TWN1-ARIN
OrgTechName: Nickles, Thomas W.
OrgTechPhone: +1-864-446-2111
OrgTechEmail: tom.nickles@wctel.com
OrgTechRef: https://rdap.arin.net/registry/entity/TWN1-ARIN
OrgRoutingHandle: TWN1-ARIN
OrgRoutingName: Nickles, Thomas W.
OrgRoutingPhone: +1-864-446-2111
OrgRoutingEmail: tom.nickles@wctel.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/TWN1-ARIN
OrgNOCHandle: TWN1-ARIN
OrgNOCName: Nickles, Thomas W.
OrgNOCPhone: +1-864-446-2111
OrgNOCEmail: tom.nickles@wctel.com
OrgNOCRef: https://rdap.arin.net/registry/entity/TWN1-ARIN
OrgAbuseHandle: ROBIN82-ARIN
OrgAbuseName: Robinson, Jeff
OrgAbusePhone: +1-864-446-2111
OrgAbuseEmail: jeff.robinson@wctel.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ROBIN82-ARIN
OrgTechHandle: WCTEL1-ARIN
OrgTechName: WCTEL-ADMIN
OrgTechPhone: +1-864-446-2111
OrgTechEmail: jeff.robinson@wctel.com
OrgTechRef: https://rdap.arin.net/registry/entity/WCTEL1-ARIN
OrgTechHandle: BED39-ARIN
OrgTechName: Dean, Brian Edward
OrgTechPhone: +1-864-323-6963
OrgTechEmail: brian.dean@wctel.com
OrgTechRef: https://rdap.arin.net/registry/entity/BED39-ARIN
OrgRoutingHandle: ROUTI68-ARIN
OrgRoutingName: Routing
OrgRoutingPhone: +1-864-446-2111
OrgRoutingEmail: routing@wctel.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/ROUTI68-ARIN
OrgNOCHandle: NOC33911-ARIN
OrgNOCName: NOC
OrgNOCPhone: +1-864-446-3111
OrgNOCEmail: noc@wctel.com
OrgNOCRef: https://rdap.arin.net/registry/entity/NOC33911-ARIN
OrgTechHandle: ROBIN82-ARIN
OrgTechName: Robinson, Jeff
OrgTechPhone: +1-864-446-2111
OrgTechEmail: jeff.robinson@wctel.com
OrgTechRef: https://rdap.arin.net/registry/entity/ROBIN82-ARIN
OrgAbuseHandle: ABUSE9204-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-864-446-2111
OrgAbuseEmail: abuse@wctel.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE9204-ARIN
OrgDNSHandle: TWN1-ARIN
OrgDNSName: Nickles, Thomas W.
OrgDNSPhone: +1-864-446-2111
OrgDNSEmail: tom.nickles@wctel.com
OrgDNSRef: https://rdap.arin.net/registry/entity/TWN1-ARIN
OrgDNSHandle: DNS1120-ARIN
OrgDNSName: DNS
OrgDNSPhone: +1-864-446-2111
OrgDNSEmail: dns@wctel.com
OrgDNSRef: https://rdap.arin.net/registry/entity/DNS1120-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.13.88.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50785
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;198.13.88.213. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032502 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 26 08:06:44 CST 2026
;; MSG SIZE rcvd: 106
b'Host 213.88.13.198.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 198.13.88.213.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 112.85.42.181 | attackspambots | Jul 17 23:43:37 vibhu-HP-Z238-Microtower-Workstation sshd\[3568\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.181 user=root Jul 17 23:43:39 vibhu-HP-Z238-Microtower-Workstation sshd\[3568\]: Failed password for root from 112.85.42.181 port 56929 ssh2 Jul 17 23:43:45 vibhu-HP-Z238-Microtower-Workstation sshd\[3568\]: Failed password for root from 112.85.42.181 port 56929 ssh2 Jul 17 23:43:48 vibhu-HP-Z238-Microtower-Workstation sshd\[3568\]: Failed password for root from 112.85.42.181 port 56929 ssh2 Jul 17 23:44:02 vibhu-HP-Z238-Microtower-Workstation sshd\[3582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.181 user=root ... |
2019-07-18 02:33:35 |
| 159.203.73.181 | attackbotsspam | 2019-07-17T18:16:03.124374abusebot-3.cloudsearch.cf sshd\[12963\]: Invalid user parking from 159.203.73.181 port 45201 |
2019-07-18 02:48:54 |
| 139.159.187.160 | attackbotsspam | port scan and connect, tcp 3306 (mysql) |
2019-07-18 02:39:05 |
| 103.28.57.86 | attackbots | Jul 17 20:46:44 vps647732 sshd[10890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.28.57.86 Jul 17 20:46:46 vps647732 sshd[10890]: Failed password for invalid user student from 103.28.57.86 port 40717 ssh2 ... |
2019-07-18 02:53:37 |
| 2.136.95.127 | attackspam | Jul 17 19:45:28 nextcloud sshd\[18647\]: Invalid user min from 2.136.95.127 Jul 17 19:45:28 nextcloud sshd\[18647\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.136.95.127 Jul 17 19:45:31 nextcloud sshd\[18647\]: Failed password for invalid user min from 2.136.95.127 port 40956 ssh2 ... |
2019-07-18 02:28:13 |
| 46.3.96.69 | attackspam | 17.07.2019 17:46:49 Connection to port 5777 blocked by firewall |
2019-07-18 02:33:10 |
| 78.129.83.98 | attackspambots | SASL Brute Force |
2019-07-18 02:36:25 |
| 137.63.184.100 | attackbotsspam | Jun 24 21:07:14 vtv3 sshd\[7039\]: Invalid user semik from 137.63.184.100 port 40246 Jun 24 21:07:14 vtv3 sshd\[7039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.63.184.100 Jun 24 21:07:16 vtv3 sshd\[7039\]: Failed password for invalid user semik from 137.63.184.100 port 40246 ssh2 Jun 24 21:09:47 vtv3 sshd\[7995\]: Invalid user test1 from 137.63.184.100 port 57768 Jun 24 21:09:47 vtv3 sshd\[7995\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.63.184.100 Jun 24 21:21:42 vtv3 sshd\[13781\]: Invalid user ez from 137.63.184.100 port 45796 Jun 24 21:21:42 vtv3 sshd\[13781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.63.184.100 Jun 24 21:21:44 vtv3 sshd\[13781\]: Failed password for invalid user ez from 137.63.184.100 port 45796 ssh2 Jun 24 21:23:48 vtv3 sshd\[14637\]: Invalid user zu from 137.63.184.100 port 34388 Jun 24 21:23:48 vtv3 sshd\[14637\]: pam_unix\( |
2019-07-18 02:42:06 |
| 185.189.23.87 | attackspambots | Brute forcing RDP port 3389 |
2019-07-18 02:28:44 |
| 113.200.25.24 | attack | Jul 17 20:14:14 localhost sshd\[27068\]: Invalid user cop from 113.200.25.24 port 59344 Jul 17 20:14:14 localhost sshd\[27068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.200.25.24 Jul 17 20:14:16 localhost sshd\[27068\]: Failed password for invalid user cop from 113.200.25.24 port 59344 ssh2 |
2019-07-18 02:24:56 |
| 175.98.115.247 | attackbotsspam | Jul 17 20:31:28 vps647732 sshd[10382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.98.115.247 Jul 17 20:31:29 vps647732 sshd[10382]: Failed password for invalid user wescott from 175.98.115.247 port 45400 ssh2 ... |
2019-07-18 02:47:31 |
| 148.70.223.53 | attack | Jul 17 18:50:42 microserver sshd[49410]: Invalid user ab from 148.70.223.53 port 49436 Jul 17 18:50:42 microserver sshd[49410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.223.53 Jul 17 18:50:43 microserver sshd[49410]: Failed password for invalid user ab from 148.70.223.53 port 49436 ssh2 Jul 17 18:57:38 microserver sshd[50216]: Invalid user cs from 148.70.223.53 port 47252 Jul 17 18:57:38 microserver sshd[50216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.223.53 Jul 17 19:11:32 microserver sshd[52284]: Invalid user admin from 148.70.223.53 port 42888 Jul 17 19:11:32 microserver sshd[52284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.223.53 Jul 17 19:11:34 microserver sshd[52284]: Failed password for invalid user admin from 148.70.223.53 port 42888 ssh2 Jul 17 19:18:40 microserver sshd[53118]: Invalid user navneet from 148.70.223.53 port 40708 Jul 17 19:18 |
2019-07-18 02:31:05 |
| 179.90.86.228 | attack | Jul 17 18:36:20 [munged] sshd[9193]: Invalid user admin from 179.90.86.228 port 45224 Jul 17 18:36:20 [munged] sshd[9193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.90.86.228 |
2019-07-18 02:42:36 |
| 185.137.111.123 | attackspam | Jul 17 19:08:35 mail postfix/smtpd\[23644\]: warning: unknown\[185.137.111.123\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Jul 17 19:08:59 mail postfix/smtpd\[23583\]: warning: unknown\[185.137.111.123\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Jul 17 19:09:31 mail postfix/smtpd\[23583\]: warning: unknown\[185.137.111.123\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Jul 17 19:39:35 mail postfix/smtpd\[24605\]: warning: unknown\[185.137.111.123\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ |
2019-07-18 02:29:02 |
| 188.40.63.40 | attack | VoIP Brute Force - 188.40.63.40 - Auto Report ... |
2019-07-18 02:20:19 |