城市(city): Marietta
省份(region): Ohio
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 24.231.16.0 - 24.231.31.255
CIDR: 24.231.16.0/20
NetName: CASNET
NetHandle: NET-24-231-16-0-1
Parent: NET24 (NET-24-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Community Antenna Service, Inc. (CAS-80)
RegDate: 2009-02-02
Updated: 2012-03-02
Ref: https://rdap.arin.net/registry/ip/24.231.16.0
OrgName: Community Antenna Service, Inc.
OrgId: CAS-80
Address: CAS Cable
Address: 1525 Dupont Road
City: Parkersburg
StateProv: WV
PostalCode: 26101
Country: US
RegDate: 2006-05-25
Updated: 2011-09-24
Ref: https://rdap.arin.net/registry/entity/CAS-80
OrgTechHandle: CASNO-ARIN
OrgTechName: CAS NOC
OrgTechPhone: +1-304-420-2470
OrgTechEmail: noc@cascable.com
OrgTechRef: https://rdap.arin.net/registry/entity/CASNO-ARIN
OrgAbuseHandle: CASNO-ARIN
OrgAbuseName: CAS NOC
OrgAbusePhone: +1-304-420-2470
OrgAbuseEmail: noc@cascable.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/CASNO-ARIN
RTechHandle: CASNO-ARIN
RTechName: CAS NOC
RTechPhone: +1-304-420-2470
RTechEmail: noc@cascable.com
RTechRef: https://rdap.arin.net/registry/entity/CASNO-ARIN
RNOCHandle: CASNO-ARIN
RNOCName: CAS NOC
RNOCPhone: +1-304-420-2470
RNOCEmail: noc@cascable.com
RNOCRef: https://rdap.arin.net/registry/entity/CASNO-ARIN
RAbuseHandle: CASNO-ARIN
RAbuseName: CAS NOC
RAbusePhone: +1-304-420-2470
RAbuseEmail: noc@cascable.com
RAbuseRef: https://rdap.arin.net/registry/entity/CASNO-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 24.231.22.217
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52908
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;24.231.22.217. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032300 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 19:26:08 CST 2026
;; MSG SIZE rcvd: 106
b'Host 217.22.231.24.in-addr.arpa not found: 2(SERVFAIL)
'
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
*** Can't find 217.22.231.24.in-addr.arpa.: No answer
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 180.76.57.58 | attack | SSH Login Bruteforce |
2020-05-08 13:06:15 |
| 49.234.83.240 | attackbots | May 8 06:49:26 mout sshd[20223]: Invalid user na from 49.234.83.240 port 46986 |
2020-05-08 13:44:06 |
| 51.75.255.250 | attack | May 8 06:35:22 163-172-32-151 sshd[26897]: Invalid user qs from 51.75.255.250 port 60520 ... |
2020-05-08 13:55:51 |
| 88.102.249.203 | attackspam | May 8 06:11:18 home sshd[24034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.102.249.203 May 8 06:11:20 home sshd[24034]: Failed password for invalid user elasticsearch from 88.102.249.203 port 48799 ssh2 May 8 06:17:06 home sshd[24904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.102.249.203 ... |
2020-05-08 13:50:17 |
| 49.234.150.207 | attack | May 8 06:59:51 vps639187 sshd\[3945\]: Invalid user carl from 49.234.150.207 port 48760 May 8 06:59:51 vps639187 sshd\[3945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.150.207 May 8 06:59:52 vps639187 sshd\[3945\]: Failed password for invalid user carl from 49.234.150.207 port 48760 ssh2 ... |
2020-05-08 13:07:10 |
| 200.109.65.219 | attackspambots | 2020-05-08T07:45:35.1163361240 sshd\[16192\]: Invalid user redminer from 200.109.65.219 port 56983 2020-05-08T07:45:35.1203591240 sshd\[16192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.109.65.219 2020-05-08T07:45:36.5286151240 sshd\[16192\]: Failed password for invalid user redminer from 200.109.65.219 port 56983 ssh2 ... |
2020-05-08 13:49:36 |
| 187.163.116.123 | attackspambots | Automatic report - Port Scan Attack |
2020-05-08 14:04:31 |
| 103.209.147.75 | attack | May 8 06:48:06 localhost sshd\[22435\]: Invalid user dux from 103.209.147.75 May 8 06:48:06 localhost sshd\[22435\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.209.147.75 May 8 06:48:08 localhost sshd\[22435\]: Failed password for invalid user dux from 103.209.147.75 port 35774 ssh2 May 8 06:52:57 localhost sshd\[22691\]: Invalid user nd from 103.209.147.75 May 8 06:52:57 localhost sshd\[22691\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.209.147.75 ... |
2020-05-08 13:09:55 |
| 217.163.30.151 | attack | hi |
2020-05-08 13:08:27 |
| 211.159.150.41 | attackspambots | May 8 06:19:15 vps687878 sshd\[14920\]: Failed password for invalid user ftp from 211.159.150.41 port 42976 ssh2 May 8 06:22:51 vps687878 sshd\[15430\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.159.150.41 user=root May 8 06:22:53 vps687878 sshd\[15430\]: Failed password for root from 211.159.150.41 port 35204 ssh2 May 8 06:26:24 vps687878 sshd\[16494\]: Invalid user kms from 211.159.150.41 port 55648 May 8 06:26:24 vps687878 sshd\[16494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.159.150.41 ... |
2020-05-08 13:24:01 |
| 217.113.10.250 | attackbotsspam | CMS (WordPress or Joomla) login attempt. |
2020-05-08 13:55:22 |
| 14.161.27.96 | attack | CMS (WordPress or Joomla) login attempt. |
2020-05-08 14:00:31 |
| 222.186.180.8 | attackbotsspam | May 8 05:56:34 sshgateway sshd\[914\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.8 user=root May 8 05:56:35 sshgateway sshd\[914\]: Failed password for root from 222.186.180.8 port 43296 ssh2 May 8 05:56:50 sshgateway sshd\[914\]: error: maximum authentication attempts exceeded for root from 222.186.180.8 port 43296 ssh2 \[preauth\] |
2020-05-08 13:57:52 |
| 122.51.213.140 | attack | May 8 09:50:17 gw1 sshd[1995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.213.140 May 8 09:50:19 gw1 sshd[1995]: Failed password for invalid user viktor from 122.51.213.140 port 55652 ssh2 ... |
2020-05-08 13:15:39 |
| 222.186.175.23 | attackspam | May 8 07:24:03 plex sshd[4101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.23 user=root May 8 07:24:05 plex sshd[4101]: Failed password for root from 222.186.175.23 port 50353 ssh2 |
2020-05-08 13:26:17 |