城市(city): Fredericton
省份(region): New Brunswick
国家(country): Canada
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 204.81.0.0 - 204.82.255.255
CIDR: 204.82.0.0/16, 204.81.0.0/16
NetName: NBED-NB-CA
NetHandle: NET-204-81-0-0-1
Parent: NET204 (NET-204-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: New Brunswick Department of Education and Early Childhood Development (NBDE-Z)
RegDate: 1994-06-29
Updated: 2022-11-03
Ref: https://rdap.arin.net/registry/ip/204.81.0.0
OrgName: New Brunswick Department of Education and Early Childhood Development
OrgId: NBDE-Z
Address: 250 King Street
City: Fredericton
StateProv: NB
PostalCode: E3B-5H1
Country: CA
RegDate: 2022-09-15
Updated: 2025-10-22
Ref: https://rdap.arin.net/registry/entity/NBDE-Z
OrgRoutingHandle: GNOC11-ARIN
OrgRoutingName: GNB Network Operations Center
OrgRoutingPhone: +1-877-746-2926
OrgRoutingEmail: gnbnoc@snb.ca
OrgRoutingRef: https://rdap.arin.net/registry/entity/GNOC11-ARIN
OrgTechHandle: JDM135-ARIN
OrgTechName: Munroe, James D
OrgTechPhone: +1-506-292-1692
OrgTechEmail: james.munroe@gnb.ca
OrgTechRef: https://rdap.arin.net/registry/entity/JDM135-ARIN
OrgTechHandle: YANGA11-ARIN
OrgTechName: Yang, Alvin
OrgTechPhone: +1-506-230-2236
OrgTechEmail: alvin.yang@snb.ca
OrgTechRef: https://rdap.arin.net/registry/entity/YANGA11-ARIN
OrgTechHandle: CRAIG325-ARIN
OrgTechName: Craig, Beth
OrgTechPhone: +1-506-651-2731
OrgTechEmail: beth.craig@snb.ca
OrgTechRef: https://rdap.arin.net/registry/entity/CRAIG325-ARIN
OrgNOCHandle: GNOC11-ARIN
OrgNOCName: GNB Network Operations Center
OrgNOCPhone: +1-877-746-2926
OrgNOCEmail: gnbnoc@snb.ca
OrgNOCRef: https://rdap.arin.net/registry/entity/GNOC11-ARIN
OrgTechHandle: TOBIN8-ARIN
OrgTechName: Tobin, Russ
OrgTechPhone: +1-506-292-2868
OrgTechEmail: russ.tobin@gnb.ca
OrgTechRef: https://rdap.arin.net/registry/entity/TOBIN8-ARIN
OrgAbuseHandle: GAN51-ARIN
OrgAbuseName: GNB Abuse Notifications
OrgAbusePhone: +1-877-746-2926
OrgAbuseEmail: abuse@gnb.ca
OrgAbuseRef: https://rdap.arin.net/registry/entity/GAN51-ARIN
OrgDNSHandle: GNOC11-ARIN
OrgDNSName: GNB Network Operations Center
OrgDNSPhone: +1-877-746-2926
OrgDNSEmail: gnbnoc@snb.ca
OrgDNSRef: https://rdap.arin.net/registry/entity/GNOC11-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 204.81.125.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25283
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;204.81.125.44. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026043000 1800 900 604800 86400
;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 30 18:59:23 CST 2026
;; MSG SIZE rcvd: 106
Host 44.125.81.204.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 44.125.81.204.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 106.12.130.189 | attackbots | SSH Brute-Force reported by Fail2Ban |
2020-07-05 15:46:49 |
| 2.228.87.194 | attackspam | Jul 5 06:14:26 ajax sshd[32188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.228.87.194 Jul 5 06:14:28 ajax sshd[32188]: Failed password for invalid user iaw from 2.228.87.194 port 56451 ssh2 |
2020-07-05 16:06:38 |
| 51.77.135.89 | attackspam | Unauthorized access to SSH at 5/Jul/2020:07:55:13 +0000. Attempted HTTP over SSH port. Received: (GET / HTTP/1.1 Host: 52.53.213.12:22 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gec) |
2020-07-05 16:05:32 |
| 222.186.175.212 | attackspambots | Jul 5 10:27:40 server sshd[20833]: Failed none for root from 222.186.175.212 port 35888 ssh2 Jul 5 10:27:42 server sshd[20833]: Failed password for root from 222.186.175.212 port 35888 ssh2 Jul 5 10:27:47 server sshd[20833]: Failed password for root from 222.186.175.212 port 35888 ssh2 |
2020-07-05 16:29:33 |
| 51.254.129.170 | attackspam | Jul 5 09:19:05 rancher-0 sshd[139370]: Invalid user gjl from 51.254.129.170 port 58490 ... |
2020-07-05 15:47:12 |
| 109.162.242.177 | attackspambots | VNC brute force attack detected by fail2ban |
2020-07-05 16:11:43 |
| 196.206.254.240 | attackbotsspam | Jul 5 05:16:24 ws24vmsma01 sshd[55112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.206.254.240 Jul 5 05:16:26 ws24vmsma01 sshd[55112]: Failed password for invalid user dk from 196.206.254.240 port 34422 ssh2 ... |
2020-07-05 16:21:57 |
| 166.62.80.109 | attackspam | 166.62.80.109 - - [05/Jul/2020:09:59:35 +0200] "GET /wp-login.php HTTP/1.1" 200 6310 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 166.62.80.109 - - [05/Jul/2020:09:59:36 +0200] "POST /wp-login.php HTTP/1.1" 200 6561 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 166.62.80.109 - - [05/Jul/2020:09:59:38 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-07-05 16:27:48 |
| 14.20.91.68 | attackbots | 20 attempts against mh-ssh on web2 |
2020-07-05 15:52:21 |
| 185.143.72.16 | attackbotsspam | 2020-07-05T01:55:13.534886linuxbox-skyline auth[593657]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=qweasd rhost=185.143.72.16 ... |
2020-07-05 16:02:33 |
| 45.14.224.139 | attackspambots | Unauthorized connection attempt detected from IP address 45.14.224.139 to port 8003 |
2020-07-05 16:15:16 |
| 167.99.75.240 | attack | 2020-07-05T06:38:48.754511server.espacesoutien.com sshd[9336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.75.240 2020-07-05T06:38:48.740905server.espacesoutien.com sshd[9336]: Invalid user roger from 167.99.75.240 port 50844 2020-07-05T06:38:50.321024server.espacesoutien.com sshd[9336]: Failed password for invalid user roger from 167.99.75.240 port 50844 ssh2 2020-07-05T06:42:17.377864server.espacesoutien.com sshd[9894]: Invalid user hadoop from 167.99.75.240 port 47900 ... |
2020-07-05 16:00:55 |
| 92.223.89.6 | attack | 0,19-02/28 [bc02/m24] PostRequest-Spammer scoring: zurich |
2020-07-05 15:48:10 |
| 134.0.10.177 | attackbots | Automatic report - XMLRPC Attack |
2020-07-05 16:04:37 |
| 1.6.163.237 | attack | 20/7/4@23:52:05: FAIL: Alarm-Network address from=1.6.163.237 20/7/4@23:52:06: FAIL: Alarm-Network address from=1.6.163.237 ... |
2020-07-05 16:29:15 |