城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 66.132.172.0 - 66.132.172.255
CIDR: 66.132.172.0/24
NetName: CENSY
NetHandle: NET-66-132-172-0-1
Parent: NET66 (NET-66-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Censys, Inc. (CENSY)
RegDate: 2024-05-14
Updated: 2024-05-14
Ref: https://rdap.arin.net/registry/ip/66.132.172.0
OrgName: Censys, Inc.
OrgId: CENSY
Address: 116 1/2 S Main Street
City: Ann Arbor
StateProv: MI
PostalCode: 48104
Country: US
RegDate: 2018-08-06
Updated: 2019-08-03
Comment: https://censys.io
Ref: https://rdap.arin.net/registry/entity/CENSY
OrgAbuseHandle: CAT20-ARIN
OrgAbuseName: Censys Abuse Team
OrgAbusePhone: +1-248-629-0125
OrgAbuseEmail: scan-abuse@censys.io
OrgAbuseRef: https://rdap.arin.net/registry/entity/CAT20-ARIN
OrgTechHandle: COT12-ARIN
OrgTechName: Censys Operations Team
OrgTechPhone: +1-248-629-0125
OrgTechEmail: ops@censys.io
OrgTechRef: https://rdap.arin.net/registry/entity/COT12-ARIN
OrgNOCHandle: COT12-ARIN
OrgNOCName: Censys Operations Team
OrgNOCPhone: +1-248-629-0125
OrgNOCEmail: ops@censys.io
OrgNOCRef: https://rdap.arin.net/registry/entity/COT12-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.132.172.204
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20437
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;66.132.172.204. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040600 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 07 01:00:07 CST 2026
;; MSG SIZE rcvd: 107
204.172.132.66.in-addr.arpa domain name pointer 204.172.132.66.censys-scanner.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
204.172.132.66.in-addr.arpa name = 204.172.132.66.censys-scanner.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 54.162.143.25 | attack | Unauthorized connection attempt detected from IP address 54.162.143.25 to port 81 [J] |
2020-01-06 20:19:07 |
| 94.74.69.100 | attackbotsspam | Unauthorized connection attempt detected from IP address 94.74.69.100 to port 23 [J] |
2020-01-06 19:44:23 |
| 46.82.58.7 | attackbotsspam | Unauthorized connection attempt detected from IP address 46.82.58.7 to port 81 [J] |
2020-01-06 20:19:40 |
| 87.248.0.82 | attackbots | Unauthorized connection attempt detected from IP address 87.248.0.82 to port 22 [J] |
2020-01-06 19:45:06 |
| 123.21.186.223 | attackbots | Unauthorized connection attempt detected from IP address 123.21.186.223 to port 4567 [J] |
2020-01-06 20:04:05 |
| 64.246.122.250 | attack | Unauthorized connection attempt detected from IP address 64.246.122.250 to port 23 |
2020-01-06 19:47:22 |
| 95.52.105.130 | attackspambots | Unauthorized connection attempt detected from IP address 95.52.105.130 to port 22 [J] |
2020-01-06 19:43:58 |
| 201.216.154.53 | attackspambots | Unauthorized connection attempt detected from IP address 201.216.154.53 to port 80 [J] |
2020-01-06 19:56:51 |
| 120.194.82.241 | attack | Unauthorized connection attempt detected from IP address 120.194.82.241 to port 1433 [J] |
2020-01-06 20:05:52 |
| 218.35.207.194 | attackbotsspam | Unauthorized connection attempt detected from IP address 218.35.207.194 to port 23 [J] |
2020-01-06 19:54:36 |
| 77.81.238.70 | attack | Unauthorized connection attempt detected from IP address 77.81.238.70 to port 2220 [J] |
2020-01-06 20:15:50 |
| 45.170.220.78 | attack | Unauthorized connection attempt detected from IP address 45.170.220.78 to port 80 [J] |
2020-01-06 20:20:00 |
| 181.228.88.18 | attackbots | Unauthorized connection attempt detected from IP address 181.228.88.18 to port 88 [J] |
2020-01-06 19:59:09 |
| 37.52.10.156 | attackspambots | Jan 6 11:43:04 mail1 sshd\[4753\]: Invalid user eoz from 37.52.10.156 port 39420 Jan 6 11:43:04 mail1 sshd\[4753\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.52.10.156 Jan 6 11:43:06 mail1 sshd\[4753\]: Failed password for invalid user eoz from 37.52.10.156 port 39420 ssh2 Jan 6 12:22:30 mail1 sshd\[22516\]: Invalid user hello from 37.52.10.156 port 36777 Jan 6 12:22:30 mail1 sshd\[22516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.52.10.156 ... |
2020-01-06 19:52:13 |
| 112.165.60.55 | attack | Unauthorized connection attempt detected from IP address 112.165.60.55 to port 5555 [J] |
2020-01-06 20:09:08 |