城市(city): Los Angeles
省份(region): California
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 64.81.0.0 - 64.81.255.255
CIDR: 64.81.0.0/16
NetName: MEGAPATH-BLK-50
NetHandle: NET-64-81-0-0-1
Parent: NET64 (NET-64-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: GTT Americas, LLC (GAL-104)
RegDate: 2000-04-28
Updated: 2025-05-07
Ref: https://rdap.arin.net/registry/ip/64.81.0.0
OrgName: GTT Americas, LLC
OrgId: GAL-104
Address: 4201 Wilson Blvd -Suite 504
City: Arlington
StateProv: VA
PostalCode: 22203
Country: US
RegDate: 2025-02-11
Updated: 2025-07-08
Ref: https://rdap.arin.net/registry/entity/GAL-104
OrgAbuseHandle: GAD46-ARIN
OrgAbuseName: GTT Abuse Department
OrgAbusePhone: +1-703-442-5501
OrgAbuseEmail: abuse@gtt.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/GAD46-ARIN
OrgTechHandle: GIT5-ARIN
OrgTechName: GTT IPAM Team
OrgTechPhone: +1-703-442-5500
OrgTechEmail: netguard@gtt.net
OrgTechRef: https://rdap.arin.net/registry/entity/GIT5-ARIN
OrgNOCHandle: GNOC16-ARIN
OrgNOCName: GTT Network Operations Center
OrgNOCPhone: +1-703-442-5500
OrgNOCEmail: noc@gtt.net
OrgNOCRef: https://rdap.arin.net/registry/entity/GNOC16-ARIN
OrgTechHandle: AS3251-ARIN
OrgTechName: AS3257 Netguard
OrgTechPhone: +49 69 48007422
OrgTechEmail: netguard@gtt.net
OrgTechRef: https://rdap.arin.net/registry/entity/AS3251-ARIN
OrgTechHandle: GLD5-ARIN
OrgTechName: GTT Legal Departement
OrgTechPhone: +359886606
OrgTechEmail: alexander.mutafchiyski@gtt.net
OrgTechRef: https://rdap.arin.net/registry/entity/GLD5-ARIN
# end
# start
NetRange: 64.81.112.0 - 64.81.119.255
CIDR: 64.81.112.0/21
NetName: GTT-JUNYUU-NET
NetHandle: NET-64-81-112-0-1
Parent: MEGAPATH-BLK-50 (NET-64-81-0-0-1)
NetType: Reallocated
OriginAS:
Organization: NetLab Global (HOSTH-5)
RegDate: 2025-08-06
Updated: 2025-08-06
Ref: https://rdap.arin.net/registry/ip/64.81.112.0
OrgName: NetLab Global
OrgId: HOSTH-5
Address: 110 W 40TH ST STE200
City: NEW YORK
StateProv: NY
PostalCode: 10018
Country: US
RegDate: 2022-02-26
Updated: 2025-07-30
Comment: Geofeed https://ip-allocation.as979.net/geofeed.csv
Ref: https://rdap.arin.net/registry/entity/HOSTH-5
OrgAbuseHandle: LIUFR3-ARIN
OrgAbuseName: Liu, Frid
OrgAbusePhone: +1-213-674-6718
OrgAbuseEmail: legal@as979.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/LIUFR3-ARIN
OrgTechHandle: LEERI36-ARIN
OrgTechName: Lee, Richard
OrgTechPhone: +1-213-674-6718
OrgTechEmail: noc@as979.net
OrgTechRef: https://rdap.arin.net/registry/entity/LEERI36-ARIN
# end
# start
NetRange: 64.81.112.0 - 64.81.119.255
CIDR: 64.81.112.0/21
NetName: GTT
NetHandle: NET-64-81-112-0-2
Parent: GTT-JUNYUU-NET (NET-64-81-112-0-1)
NetType: Reassigned
OriginAS:
Customer: GTT Communications Inc. (C11308730)
RegDate: 2025-08-06
Updated: 2025-08-06
Ref: https://rdap.arin.net/registry/ip/64.81.112.0
CustName: GTT Communications Inc.
Address: 900 N Alameda ST
City: Los Angeles
StateProv: CA
PostalCode: 90014
Country: US
RegDate: 2025-08-06
Updated: 2025-08-06
Ref: https://rdap.arin.net/registry/entity/C11308730
OrgAbuseHandle: LIUFR3-ARIN
OrgAbuseName: Liu, Frid
OrgAbusePhone: +1-213-674-6718
OrgAbuseEmail: legal@as979.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/LIUFR3-ARIN
OrgTechHandle: LEERI36-ARIN
OrgTechName: Lee, Richard
OrgTechPhone: +1-213-674-6718
OrgTechEmail: noc@as979.net
OrgTechRef: https://rdap.arin.net/registry/entity/LEERI36-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.81.114.38
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63701
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;64.81.114.38. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042601 1800 900 604800 86400
;; Query time: 149 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 27 09:32:01 CST 2026
;; MSG SIZE rcvd: 105
38.114.81.64.in-addr.arpa domain name pointer dsl081-114-038.dfw1.dsl.speakeasy.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
38.114.81.64.in-addr.arpa name = dsl081-114-038.dfw1.dsl.speakeasy.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 93.39.116.254 | attack | 2020-01-15T13:06:43.365787shield sshd\[26839\]: Invalid user wj from 93.39.116.254 port 34239 2020-01-15T13:06:43.369902shield sshd\[26839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93-39-116-254.ip75.fastwebnet.it 2020-01-15T13:06:45.177074shield sshd\[26839\]: Failed password for invalid user wj from 93.39.116.254 port 34239 ssh2 2020-01-15T13:09:21.518552shield sshd\[27592\]: Invalid user fake from 93.39.116.254 port 47361 2020-01-15T13:09:21.524606shield sshd\[27592\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93-39-116-254.ip75.fastwebnet.it |
2020-01-15 21:21:16 |
| 180.252.11.107 | attack | 1579093680 - 01/15/2020 14:08:00 Host: 180.252.11.107/180.252.11.107 Port: 445 TCP Blocked |
2020-01-15 21:36:24 |
| 114.204.53.182 | attackspambots | Jan 15 14:07:22 sd-53420 sshd\[21660\]: Invalid user cafe24 from 114.204.53.182 Jan 15 14:07:22 sd-53420 sshd\[21660\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.204.53.182 Jan 15 14:07:25 sd-53420 sshd\[21660\]: Failed password for invalid user cafe24 from 114.204.53.182 port 40491 ssh2 Jan 15 14:09:07 sd-53420 sshd\[21875\]: User mysql from 114.204.53.182 not allowed because none of user's groups are listed in AllowGroups Jan 15 14:09:07 sd-53420 sshd\[21875\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.204.53.182 user=mysql ... |
2020-01-15 21:32:26 |
| 159.203.201.39 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-01-15 21:20:24 |
| 159.203.201.63 | attackbots | Unauthorized SSH login attempts |
2020-01-15 21:39:57 |
| 18.224.33.129 | attack | (sshd) Failed SSH login from 18.224.33.129 (US/United States/ec2-18-224-33-129.us-east-2.compute.amazonaws.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jan 15 07:51:28 localhost sshd[1657]: Invalid user chiu from 18.224.33.129 port 60496 Jan 15 07:51:29 localhost sshd[1657]: Failed password for invalid user chiu from 18.224.33.129 port 60496 ssh2 Jan 15 08:06:14 localhost sshd[2897]: Invalid user griselda from 18.224.33.129 port 38792 Jan 15 08:06:16 localhost sshd[2897]: Failed password for invalid user griselda from 18.224.33.129 port 38792 ssh2 Jan 15 08:09:20 localhost sshd[3085]: Invalid user arnaud from 18.224.33.129 port 42832 |
2020-01-15 21:21:50 |
| 198.199.124.109 | attackbotsspam | Jan 15 14:08:55 ns37 sshd[28072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.124.109 Jan 15 14:08:55 ns37 sshd[28072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.124.109 |
2020-01-15 21:47:14 |
| 193.188.22.188 | attackbotsspam | leo_www |
2020-01-15 21:17:27 |
| 96.92.74.57 | attackspam | Jan 15 08:04:59 web1 postfix/smtpd[4701]: warning: 96-92-74-57-static.hfc.comcastbusiness.net[96.92.74.57]: SASL PLAIN authentication failed: authentication failure ... |
2020-01-15 21:32:58 |
| 8.28.0.17 | attackspambots | ICMP MH Probe, Scan /Distributed - |
2020-01-15 21:45:20 |
| 13.127.20.66 | attack | ICMP MH Probe, Scan /Distributed - |
2020-01-15 21:41:26 |
| 119.92.231.220 | attack | Jan 15 08:06:18 web1 postfix/smtpd[7549]: warning: unknown[119.92.231.220]: SASL PLAIN authentication failed: authentication failure ... |
2020-01-15 21:20:52 |
| 222.186.169.194 | attackbotsspam | Jan 15 14:09:12 markkoudstaal sshd[10179]: Failed password for root from 222.186.169.194 port 41566 ssh2 Jan 15 14:09:15 markkoudstaal sshd[10179]: Failed password for root from 222.186.169.194 port 41566 ssh2 Jan 15 14:09:19 markkoudstaal sshd[10179]: Failed password for root from 222.186.169.194 port 41566 ssh2 Jan 15 14:09:22 markkoudstaal sshd[10179]: Failed password for root from 222.186.169.194 port 41566 ssh2 |
2020-01-15 21:19:03 |
| 77.34.128.78 | attack | 20/1/15@08:09:28: FAIL: Alarm-Network address from=77.34.128.78 20/1/15@08:09:29: FAIL: Alarm-Network address from=77.34.128.78 ... |
2020-01-15 21:12:58 |
| 159.203.201.6 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-01-15 21:12:22 |