城市(city): Calgary
省份(region): Alberta
国家(country): Canada
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 207.54.96.0 - 207.54.125.255
CIDR: 207.54.112.0/21, 207.54.124.0/23, 207.54.96.0/20, 207.54.120.0/22
NetName: TERAGO-1
NetHandle: NET-207-54-96-0-1
Parent: NET207 (NET-207-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: TeraGo Networks Inc. (TRGO)
RegDate: 2001-03-22
Updated: 2023-09-13
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://rdap.arin.net/registry/ip/207.54.96.0
OrgName: TeraGo Networks Inc.
OrgId: TRGO
Address: Suite 800, 55 Commerce Valley Dr. West
City: Thornhill
StateProv: ON
PostalCode: L3T-7V9
Country: CA
RegDate: 2001-03-22
Updated: 2023-03-01
Comment: http://www.terago.ca
Comment: NOC hours 24/7
Ref: https://rdap.arin.net/registry/entity/TRGO
ReferralServer: rwhois://rwhois.rackforce.com:4321
OrgNOCHandle: TIN1-ARIN
OrgNOCName: PTP NOC
OrgNOCPhone: +1-866-837-2462
OrgNOCEmail: ipnoc@terago.ca
OrgNOCRef: https://rdap.arin.net/registry/entity/TIN1-ARIN
OrgAbuseHandle: TIN1-ARIN
OrgAbuseName: PTP NOC
OrgAbusePhone: +1-866-837-2462
OrgAbuseEmail: ipnoc@terago.ca
OrgAbuseRef: https://rdap.arin.net/registry/entity/TIN1-ARIN
OrgTechHandle: JAINM16-ARIN
OrgTechName: Jain, Manoj
OrgTechPhone: +1-647-291-4847
OrgTechEmail: manoj.jain@terago.ca
OrgTechRef: https://rdap.arin.net/registry/entity/JAINM16-ARIN
OrgTechHandle: TIP2-ARIN
OrgTechName: TeraGo Internet Peering
OrgTechPhone: +1-866-837-2462
OrgTechEmail: ipnoc@terago.ca
OrgTechRef: https://rdap.arin.net/registry/entity/TIP2-ARIN
RNOCHandle: TIN1-ARIN
RNOCName: PTP NOC
RNOCPhone: +1-866-837-2462
RNOCEmail: ipnoc@terago.ca
RNOCRef: https://rdap.arin.net/registry/entity/TIN1-ARIN
RAbuseHandle: TIN1-ARIN
RAbuseName: PTP NOC
RAbusePhone: +1-866-837-2462
RAbuseEmail: ipnoc@terago.ca
RAbuseRef: https://rdap.arin.net/registry/entity/TIN1-ARIN
RTechHandle: TIP2-ARIN
RTechName: TeraGo Internet Peering
RTechPhone: +1-866-837-2462
RTechEmail: ipnoc@terago.ca
RTechRef: https://rdap.arin.net/registry/entity/TIP2-ARIN
# end
# start
NetRange: 207.54.113.224 - 207.54.113.255
CIDR: 207.54.113.224/27
NetName: T-207054113224-021903
NetHandle: NET-207-54-113-224-1
Parent: TERAGO-1 (NET-207-54-96-0-1)
NetType: Reassigned
OriginAS:
Organization: National Gas Exchange (NGX) (NGEN)
RegDate: 2003-02-19
Updated: 2003-02-19
Ref: https://rdap.arin.net/registry/ip/207.54.113.224
OrgName: National Gas Exchange (NGX)
OrgId: NGEN
Address: #2330 140 4th Ave SW
City: Calgary
StateProv: AB
PostalCode: T2P-3N3
Country: CA
RegDate: 2003-02-19
Updated: 2011-09-24
Ref: https://rdap.arin.net/registry/entity/NGEN
OrgTechHandle: CMI6-ARIN
OrgTechName: Middleton, Corinne
OrgTechPhone: +1-403-974-1700
OrgTechEmail: corinne.middleton@ngx.com
OrgTechRef: https://rdap.arin.net/registry/entity/CMI6-ARIN
OrgAbuseHandle: CMI6-ARIN
OrgAbuseName: Middleton, Corinne
OrgAbusePhone: +1-403-974-1700
OrgAbuseEmail: corinne.middleton@ngx.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/CMI6-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to rwhois.rackforce.com:4321.
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 207.54.113.238
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32354
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;207.54.113.238. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031701 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 18 04:52:41 CST 2026
;; MSG SIZE rcvd: 107
238.113.54.207.in-addr.arpa domain name pointer static-207-54-113-238.ptr.terago.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
238.113.54.207.in-addr.arpa name = static-207-54-113-238.ptr.terago.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 222.186.30.218 | attack | Failed password for invalid user from 222.186.30.218 port 55691 ssh2 |
2020-07-19 05:12:53 |
| 118.27.4.225 | attackspam | Jul 18 23:06:07 server sshd[55554]: Failed password for invalid user admin from 118.27.4.225 port 42504 ssh2 Jul 18 23:14:55 server sshd[62981]: Failed password for invalid user snehal from 118.27.4.225 port 52110 ssh2 Jul 18 23:17:59 server sshd[434]: Failed password for invalid user produkcja from 118.27.4.225 port 48420 ssh2 |
2020-07-19 05:21:04 |
| 222.186.173.142 | attack | Jul 18 22:51:07 vps sshd[641509]: Failed password for root from 222.186.173.142 port 65466 ssh2 Jul 18 22:51:10 vps sshd[641509]: Failed password for root from 222.186.173.142 port 65466 ssh2 Jul 18 22:51:12 vps sshd[641509]: Failed password for root from 222.186.173.142 port 65466 ssh2 Jul 18 22:51:16 vps sshd[641509]: Failed password for root from 222.186.173.142 port 65466 ssh2 Jul 18 22:51:19 vps sshd[641509]: Failed password for root from 222.186.173.142 port 65466 ssh2 ... |
2020-07-19 04:54:07 |
| 178.21.164.90 | attackbots | Port scan: Attack repeated for 24 hours |
2020-07-19 05:27:11 |
| 93.38.114.55 | attackspam | Invalid user xl from 93.38.114.55 port 21302 |
2020-07-19 05:10:57 |
| 181.48.120.220 | attackbotsspam | Jul 19 02:10:42 gw1 sshd[11343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.120.220 Jul 19 02:10:45 gw1 sshd[11343]: Failed password for invalid user fan from 181.48.120.220 port 40945 ssh2 ... |
2020-07-19 05:16:49 |
| 176.31.251.177 | attack | Jul 18 21:58:48 ArkNodeAT sshd\[6809\]: Invalid user jerry from 176.31.251.177 Jul 18 21:58:48 ArkNodeAT sshd\[6809\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.251.177 Jul 18 21:58:50 ArkNodeAT sshd\[6809\]: Failed password for invalid user jerry from 176.31.251.177 port 49966 ssh2 |
2020-07-19 05:20:49 |
| 223.243.4.9 | attackbots | WordPress XMLRPC scan :: 223.243.4.9 0.180 BYPASS [18/Jul/2020:19:51:09 0000] [censored_2] "POST //xmlrpc.php HTTP/1.1" 200 217 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.163 Safari/537.36" |
2020-07-19 05:01:36 |
| 106.13.70.63 | attackspambots | 2020-07-18T20:44:22.058018mail.csmailer.org sshd[8589]: Invalid user admin from 106.13.70.63 port 57292 2020-07-18T20:44:22.063260mail.csmailer.org sshd[8589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.70.63 2020-07-18T20:44:22.058018mail.csmailer.org sshd[8589]: Invalid user admin from 106.13.70.63 port 57292 2020-07-18T20:44:23.992175mail.csmailer.org sshd[8589]: Failed password for invalid user admin from 106.13.70.63 port 57292 ssh2 2020-07-18T20:48:21.042820mail.csmailer.org sshd[8911]: Invalid user ansible from 106.13.70.63 port 58268 ... |
2020-07-19 05:03:30 |
| 119.5.157.124 | attackspam | Jul 18 23:02:58 vps647732 sshd[16994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.5.157.124 Jul 18 23:03:00 vps647732 sshd[16994]: Failed password for invalid user student from 119.5.157.124 port 45984 ssh2 ... |
2020-07-19 05:15:44 |
| 106.12.119.1 | attackspambots | " " |
2020-07-19 04:56:37 |
| 64.225.47.162 | attackbots | SSH brute-force attempt |
2020-07-19 05:06:04 |
| 183.63.157.138 | attackspambots | 2020-07-18T22:21:50.170038+02:00 |
2020-07-19 04:57:24 |
| 159.65.152.201 | attackspam | (sshd) Failed SSH login from 159.65.152.201 (IN/India/-): 5 in the last 3600 secs |
2020-07-19 05:27:38 |
| 49.235.229.211 | attackspam | $f2bV_matches |
2020-07-19 04:59:43 |