城市(city): unknown
省份(region): unknown
国家(country): Hong Kong
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 207.56.0.0 - 207.57.255.255
CIDR: 207.56.0.0/15
NetName: NTTA-207-56
NetHandle: NET-207-56-0-0-1
Parent: NET207 (NET-207-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: NTT America, Inc. (NTTAM-1)
RegDate: 1996-02-16
Updated: 2026-02-10
Comment: Geofeed https://geo.ip.gin.ntt.net/geofeeds/geofeeds.csv
Comment: Reassignment information for this block is
Comment: available at rwhois.gin.ntt.net port 4321
Ref: https://rdap.arin.net/registry/ip/207.56.0.0
OrgName: NTT America, Inc.
OrgId: NTTAM-1
Address: 15809 Bear Creek Pkwy
Address: Suite 320
City: Redmond
StateProv: WA
PostalCode: 98052
Country: US
RegDate: 2005-12-08
Updated: 2024-03-04
Ref: https://rdap.arin.net/registry/entity/NTTAM-1
ReferralServer: rwhois://rwhois.gin.ntt.net:4321
OrgNOCHandle: NASC-ARIN
OrgNOCName: NTT America Support Contact
OrgNOCPhone: +1-877-688-6625
OrgNOCEmail: ce-support@gin.ntt.net
OrgNOCRef: https://rdap.arin.net/registry/entity/NASC-ARIN
OrgRoutingHandle: PEERI-ARIN
OrgRoutingName: Peering
OrgRoutingPhone: +1-877-688-6625
OrgRoutingEmail: peering@ntt.net
OrgRoutingRef: https://rdap.arin.net/registry/entity/PEERI-ARIN
OrgTechHandle: VIPAR-ARIN
OrgTechName: VIPAR
OrgTechPhone: +1-877-688-6625
OrgTechEmail: ipr@gin.ntt.net
OrgTechRef: https://rdap.arin.net/registry/entity/VIPAR-ARIN
OrgAbuseHandle: NAAC-ARIN
OrgAbuseName: NTT America Abuse Contact
OrgAbusePhone: +1-877-688-6625
OrgAbuseEmail: abuse@ntt.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/NAAC-ARIN
OrgTechHandle: CANDE70-ARIN
OrgTechName: Candela, Massimo
OrgTechPhone: +1-214-915-1366
OrgTechEmail: massimo@ntt.net
OrgTechRef: https://rdap.arin.net/registry/entity/CANDE70-ARIN
RTechHandle: VIA4-ORG-ARIN
RTechName: VIPAR
RTechPhone: +1-877-688-6625
RTechEmail: ipr@gin.ntt.net
RTechRef: https://rdap.arin.net/registry/entity/VIA4-ORG-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to rwhois.gin.ntt.net:4321.
%rwhois V-1.5:0078b6:00 rwhois.gin.ntt.net (Vipar 0.1a. Comments to ipr@gin.ntt.net)
network:Class-Name:network
network:Auth-Area:207.56.0.0/15
network:ID:NETBLK-VRIO-207-056.127.0.0.1/32
network:Handle:NETBLK-VRIO-207-056
network:Network-Name:VRIO-207-056
network:IP-Network:207.56.0.0/15
network:In-Addr-Server;I:AUTH21-GIN-HST.127.0.0.1/32
network:In-Addr-Server;I:AUTH22-GIN-HST.127.0.0.1/32
network:In-Addr-Server;I:AUTH23-GIN-HST.127.0.0.1/32
network:In-Addr-Server;I:AUTH24-GIN-HST.127.0.0.1/32
network:In-Addr-Server;I:AUTH25-GIN-HST.127.0.0.1/32
network:IP-Network-Block:207.56.0.0 - 207.57.255.255
network:Org-Name:NTT America, Inc.
network:Street-Address:8300 E Maplewood Ave. Suite 400
network:City:Greenwood Village
network:State:CO
network:Postal-Code:80111
network:Country-Code:US
network:Tech-Contact;I:VIA4-ORG-ARIN.127.0.0.1/32
network:Created:1999-12-15 00:19:19+00
network:Updated:2025-07-24 13:54:38.791836+00
%ok
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 207.56.13.96
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17747
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;207.56.13.96. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040201 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 03 04:30:16 CST 2026
;; MSG SIZE rcvd: 105
Host 96.13.56.207.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 96.13.56.207.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 206.167.33.17 | attackbots | Aug 23 08:09:28 web9 sshd\[9562\]: Invalid user raiz from 206.167.33.17 Aug 23 08:09:28 web9 sshd\[9562\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.167.33.17 Aug 23 08:09:29 web9 sshd\[9562\]: Failed password for invalid user raiz from 206.167.33.17 port 32890 ssh2 Aug 23 08:15:51 web9 sshd\[10713\]: Invalid user mantis from 206.167.33.17 Aug 23 08:15:51 web9 sshd\[10713\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.167.33.17 |
2019-08-24 02:26:50 |
| 182.61.185.77 | attackspam | Aug 23 06:35:40 aiointranet sshd\[31142\]: Invalid user ftphome from 182.61.185.77 Aug 23 06:35:40 aiointranet sshd\[31142\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.185.77 Aug 23 06:35:42 aiointranet sshd\[31142\]: Failed password for invalid user ftphome from 182.61.185.77 port 44446 ssh2 Aug 23 06:40:34 aiointranet sshd\[32008\]: Invalid user ubnt from 182.61.185.77 Aug 23 06:40:34 aiointranet sshd\[32008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.185.77 |
2019-08-24 02:12:11 |
| 209.17.96.210 | attackbots | 4567/tcp 9000/tcp 8081/tcp... [2019-06-22/08-23]80pkt,13pt.(tcp),1pt.(udp) |
2019-08-24 02:06:10 |
| 195.84.49.20 | attack | SSH Brute Force, server-1 sshd[2827]: Failed password for invalid user debby from 195.84.49.20 port 48464 ssh2 |
2019-08-24 02:17:02 |
| 147.135.209.139 | attack | SSH Brute Force, server-1 sshd[3020]: Failed password for invalid user redmin from 147.135.209.139 port 36870 ssh2 |
2019-08-24 02:22:59 |
| 27.115.56.138 | attackbots | Aug 23 19:52:15 localhost sshd\[21224\]: Invalid user tli from 27.115.56.138 port 47464 Aug 23 19:52:15 localhost sshd\[21224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.115.56.138 Aug 23 19:52:17 localhost sshd\[21224\]: Failed password for invalid user tli from 27.115.56.138 port 47464 ssh2 |
2019-08-24 02:08:28 |
| 133.130.117.241 | attack | 2019-08-23T18:27:51.372218abusebot-6.cloudsearch.cf sshd\[1588\]: Invalid user bufor from 133.130.117.241 port 58764 |
2019-08-24 02:27:55 |
| 93.95.56.130 | attackspam | Aug 23 13:43:33 xtremcommunity sshd\[21070\]: Invalid user kamil from 93.95.56.130 port 59624 Aug 23 13:43:33 xtremcommunity sshd\[21070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.95.56.130 Aug 23 13:43:36 xtremcommunity sshd\[21070\]: Failed password for invalid user kamil from 93.95.56.130 port 59624 ssh2 Aug 23 13:49:12 xtremcommunity sshd\[21334\]: Invalid user jewish from 93.95.56.130 port 54032 Aug 23 13:49:12 xtremcommunity sshd\[21334\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.95.56.130 ... |
2019-08-24 01:56:38 |
| 138.68.87.0 | attack | Aug 23 19:57:34 mout sshd[26686]: Invalid user ap from 138.68.87.0 port 32800 |
2019-08-24 02:03:04 |
| 183.146.209.68 | attack | SSH Brute Force, server-1 sshd[3104]: Failed password for root from 183.146.209.68 port 42223 ssh2 |
2019-08-24 02:18:33 |
| 190.13.129.34 | attackspambots | Aug 23 17:54:31 hcbbdb sshd\[25699\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.13.129.34 user=root Aug 23 17:54:33 hcbbdb sshd\[25699\]: Failed password for root from 190.13.129.34 port 40356 ssh2 Aug 23 18:00:15 hcbbdb sshd\[26354\]: Invalid user terraria from 190.13.129.34 Aug 23 18:00:15 hcbbdb sshd\[26354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.13.129.34 Aug 23 18:00:17 hcbbdb sshd\[26354\]: Failed password for invalid user terraria from 190.13.129.34 port 57366 ssh2 |
2019-08-24 02:07:23 |
| 51.15.131.232 | attackspambots | 2019-08-23T19:56:17.773201lon01.zurich-datacenter.net sshd\[9950\]: Invalid user ftptest from 51.15.131.232 port 55781 2019-08-23T19:56:17.779716lon01.zurich-datacenter.net sshd\[9950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.131.232 2019-08-23T19:56:19.861484lon01.zurich-datacenter.net sshd\[9950\]: Failed password for invalid user ftptest from 51.15.131.232 port 55781 ssh2 2019-08-23T20:00:12.432395lon01.zurich-datacenter.net sshd\[10040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.131.232 user=root 2019-08-23T20:00:14.444586lon01.zurich-datacenter.net sshd\[10040\]: Failed password for root from 51.15.131.232 port 49947 ssh2 ... |
2019-08-24 02:05:35 |
| 222.184.233.222 | attackbots | Aug 23 19:50:57 dedicated sshd[23250]: Invalid user password from 222.184.233.222 port 37494 |
2019-08-24 02:00:48 |
| 51.254.222.6 | attackbots | Aug 23 08:04:55 lcprod sshd\[26395\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=6.ip-51-254-222.eu user=proxy Aug 23 08:04:57 lcprod sshd\[26395\]: Failed password for proxy from 51.254.222.6 port 46231 ssh2 Aug 23 08:08:52 lcprod sshd\[26723\]: Invalid user ftp from 51.254.222.6 Aug 23 08:08:52 lcprod sshd\[26723\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=6.ip-51-254-222.eu Aug 23 08:08:54 lcprod sshd\[26723\]: Failed password for invalid user ftp from 51.254.222.6 port 40325 ssh2 |
2019-08-24 02:13:04 |
| 59.10.5.156 | attack | SSH Brute Force, server-1 sshd[2979]: Failed password for invalid user teamspeak5 from 59.10.5.156 port 48558 ssh2 |
2019-08-24 02:24:12 |