城市(city): Chatham
省份(region): Ontario
国家(country): Canada
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 216.154.0.0 - 216.154.191.255
CIDR: 216.154.128.0/18, 216.154.0.0/17
NetName: TS-1
NetHandle: NET-216-154-0-0-1
Parent: NET216 (NET-216-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: TekSavvy Solutions Inc. (TS-1)
RegDate: 2016-03-30
Updated: 2016-03-30
Ref: https://rdap.arin.net/registry/ip/216.154.0.0
OrgName: TekSavvy Solutions Inc.
OrgId: TS-1
Address: 800 Richmond St.
City: Chatham
StateProv: ON
PostalCode: N7M 5J5
Country: CA
RegDate: 2010-10-15
Updated: 2019-03-29
Ref: https://rdap.arin.net/registry/entity/TS-1
ReferralServer: rwhois://rwhois.teksavvy.com:4321
OrgTechHandle: NOC1728-ARIN
OrgTechName: NOC
OrgTechPhone: +1-519-360-1575
OrgTechEmail: support@teksavvy.com
OrgTechRef: https://rdap.arin.net/registry/entity/NOC1728-ARIN
OrgAbuseHandle: ABUSE816-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-519-360-1575
OrgAbuseEmail: abuse@teksavvy.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE816-ARIN
OrgNOCHandle: TEKSA-ARIN
OrgNOCName: Teksavvy NOC
OrgNOCPhone: +1-519-360-1575
OrgNOCEmail: noc@teksavvy.com
OrgNOCRef: https://rdap.arin.net/registry/entity/TEKSA-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to rwhois.teksavvy.com:4321.
%rwhois V-1.5:002010:00 rwhois.teksavvy.com (by Network Solutions, Inc. V-1.5.9.6)
network:Auth-Area:.
network:Class-Name:network
network:IP-Network:216.154.0.0/17
network:Network-Name:LNS pools
network:Organization:Private Customer - TEKSAVVY SOLUTIONS
network:Street-Address:Toronto, ON
network:Country-Code:CA
%ok
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.154.72.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15335
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;216.154.72.216. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031600 1800 900 604800 86400
;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 16 22:43:11 CST 2026
;; MSG SIZE rcvd: 107
216.72.154.216.in-addr.arpa domain name pointer 216-154-72-216.cpe.teksavvy.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
216.72.154.216.in-addr.arpa name = 216-154-72-216.cpe.teksavvy.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 165.22.33.32 | attack | Sep 7 17:17:45 Tower sshd[20979]: Connection from 165.22.33.32 port 36340 on 192.168.10.220 port 22 rdomain "" Sep 7 17:17:45 Tower sshd[20979]: Failed password for root from 165.22.33.32 port 36340 ssh2 Sep 7 17:17:46 Tower sshd[20979]: Received disconnect from 165.22.33.32 port 36340:11: Bye Bye [preauth] Sep 7 17:17:46 Tower sshd[20979]: Disconnected from authenticating user root 165.22.33.32 port 36340 [preauth] |
2020-09-08 05:40:12 |
| 45.142.120.93 | attackspam | 2020-09-08 00:19:54 dovecot_login authenticator failed for \(User\) \[45.142.120.93\]: 535 Incorrect authentication data \(set_id=tatsuya@org.ua\)2020-09-08 00:20:31 dovecot_login authenticator failed for \(User\) \[45.142.120.93\]: 535 Incorrect authentication data \(set_id=animalplanet@org.ua\)2020-09-08 00:21:10 dovecot_login authenticator failed for \(User\) \[45.142.120.93\]: 535 Incorrect authentication data \(set_id=iy@org.ua\) ... |
2020-09-08 05:22:23 |
| 220.249.114.237 | attackbots | Too many connections or unauthorized access detected from Arctic banned ip |
2020-09-08 05:37:59 |
| 112.85.42.181 | attackspambots | Failed password for invalid user from 112.85.42.181 port 64492 ssh2 |
2020-09-08 05:25:15 |
| 79.137.72.171 | attackspambots | Sep 7 16:48:12 localhost sshd[51205]: Invalid user elision from 79.137.72.171 port 46671 Sep 7 16:48:12 localhost sshd[51205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.ip-79-137-72.eu Sep 7 16:48:12 localhost sshd[51205]: Invalid user elision from 79.137.72.171 port 46671 Sep 7 16:48:14 localhost sshd[51205]: Failed password for invalid user elision from 79.137.72.171 port 46671 ssh2 Sep 7 16:54:56 localhost sshd[52078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.ip-79-137-72.eu user=root Sep 7 16:54:57 localhost sshd[52078]: Failed password for root from 79.137.72.171 port 49889 ssh2 ... |
2020-09-08 05:26:19 |
| 45.142.120.89 | attackbots | 2020-09-08 00:20:19 auth_plain authenticator failed for (User) [45.142.120.89]: 535 Incorrect authentication data (set_id=surgery@lavrinenko.info) 2020-09-08 00:20:58 auth_plain authenticator failed for (User) [45.142.120.89]: 535 Incorrect authentication data (set_id=s4@lavrinenko.info) ... |
2020-09-08 05:24:49 |
| 172.105.28.132 | attackspam | Port Scan detected! ... |
2020-09-08 05:12:40 |
| 192.241.223.123 | attackbotsspam | *Port Scan* detected from 192.241.223.123 (US/United States/California/Visitacion Valley/zg-0823a-149.stretchoid.com). 4 hits in the last 155 seconds |
2020-09-08 05:13:54 |
| 129.211.73.2 | attackspam | $f2bV_matches |
2020-09-08 05:21:38 |
| 139.59.61.103 | attackspambots | Port Scan ... |
2020-09-08 05:17:04 |
| 37.59.55.14 | attackbotsspam | Sep 7 19:27:54 ns381471 sshd[30871]: Failed password for root from 37.59.55.14 port 42712 ssh2 |
2020-09-08 05:28:24 |
| 159.65.111.89 | attackspam | Sep 7 22:37:27 ns392434 sshd[5489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.111.89 user=root Sep 7 22:37:28 ns392434 sshd[5489]: Failed password for root from 159.65.111.89 port 41180 ssh2 Sep 7 23:03:05 ns392434 sshd[5966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.111.89 user=root Sep 7 23:03:07 ns392434 sshd[5966]: Failed password for root from 159.65.111.89 port 58336 ssh2 Sep 7 23:07:11 ns392434 sshd[6103]: Invalid user omcuser from 159.65.111.89 port 35496 Sep 7 23:07:11 ns392434 sshd[6103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.111.89 Sep 7 23:07:11 ns392434 sshd[6103]: Invalid user omcuser from 159.65.111.89 port 35496 Sep 7 23:07:13 ns392434 sshd[6103]: Failed password for invalid user omcuser from 159.65.111.89 port 35496 ssh2 Sep 7 23:11:02 ns392434 sshd[6252]: Invalid user admin from 159.65.111.89 port 40896 |
2020-09-08 05:40:26 |
| 123.207.250.132 | attackspam | Too many connections or unauthorized access detected from Arctic banned ip |
2020-09-08 05:38:20 |
| 115.159.153.180 | attackbots | malicious Brute-Force reported by https://www.patrick-binder.de ... |
2020-09-08 05:44:21 |
| 140.207.81.233 | attack | Sep 7 18:52:33 melroy-server sshd[32712]: Failed password for root from 140.207.81.233 port 59642 ssh2 ... |
2020-09-08 05:35:52 |