城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 66.132.195.0 - 66.132.195.255
CIDR: 66.132.195.0/24
NetName: CENSY
NetHandle: NET-66-132-195-0-1
Parent: NET66 (NET-66-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Censys, Inc. (CENSY)
RegDate: 2024-05-14
Updated: 2024-05-14
Ref: https://rdap.arin.net/registry/ip/66.132.195.0
OrgName: Censys, Inc.
OrgId: CENSY
Address: 116 1/2 S Main Street
City: Ann Arbor
StateProv: MI
PostalCode: 48104
Country: US
RegDate: 2018-08-06
Updated: 2019-08-03
Comment: https://censys.io
Ref: https://rdap.arin.net/registry/entity/CENSY
OrgAbuseHandle: CAT20-ARIN
OrgAbuseName: Censys Abuse Team
OrgAbusePhone: +1-248-629-0125
OrgAbuseEmail: scan-abuse@censys.io
OrgAbuseRef: https://rdap.arin.net/registry/entity/CAT20-ARIN
OrgTechHandle: COT12-ARIN
OrgTechName: Censys Operations Team
OrgTechPhone: +1-248-629-0125
OrgTechEmail: ops@censys.io
OrgTechRef: https://rdap.arin.net/registry/entity/COT12-ARIN
OrgNOCHandle: COT12-ARIN
OrgNOCName: Censys Operations Team
OrgNOCPhone: +1-248-629-0125
OrgNOCEmail: ops@censys.io
OrgNOCRef: https://rdap.arin.net/registry/entity/COT12-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.132.195.76
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56844
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;66.132.195.76. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026033100 1800 900 604800 86400
;; Query time: 356 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 31 22:00:20 CST 2026
;; MSG SIZE rcvd: 106
76.195.132.66.in-addr.arpa domain name pointer 76.195.132.66.censys-scanner.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
76.195.132.66.in-addr.arpa name = 76.195.132.66.censys-scanner.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 156.219.31.245 | attackspambots | Unauthorized connection attempt detected from IP address 156.219.31.245 to port 2323 |
2020-03-17 21:56:52 |
| 179.181.205.138 | attack | Unauthorized connection attempt detected from IP address 179.181.205.138 to port 23 |
2020-03-17 21:48:24 |
| 213.91.120.2 | attackbotsspam | Unauthorized connection attempt detected from IP address 213.91.120.2 to port 23 |
2020-03-17 21:38:50 |
| 197.62.17.56 | attack | Unauthorized connection attempt detected from IP address 197.62.17.56 to port 445 |
2020-03-17 21:43:04 |
| 88.248.173.7 | attackbotsspam | Unauthorized connection attempt detected from IP address 88.248.173.7 to port 81 |
2020-03-17 21:19:43 |
| 156.212.237.128 | attackspambots | Unauthorized connection attempt detected from IP address 156.212.237.128 to port 23 |
2020-03-17 21:57:32 |
| 175.125.174.158 | attackbots | 20/3/17@09:35:23: FAIL: Alarm-Telnet address from=175.125.174.158 ... |
2020-03-17 21:51:54 |
| 173.25.77.122 | attackbotsspam | Unauthorized connection attempt detected from IP address 173.25.77.122 to port 4567 |
2020-03-17 21:52:48 |
| 93.194.121.251 | attackspambots | Unauthorized connection attempt detected from IP address 93.194.121.251 to port 26 |
2020-03-17 22:04:02 |
| 46.99.158.235 | attack | Unauthorized connection attempt detected from IP address 46.99.158.235 to port 445 |
2020-03-17 21:27:48 |
| 103.52.217.231 | attackspam | Unauthorized connection attempt detected from IP address 103.52.217.231 to port 7199 |
2020-03-17 22:02:48 |
| 222.186.30.57 | attackbots | Mar 17 14:22:16 dcd-gentoo sshd[28306]: User root from 222.186.30.57 not allowed because none of user's groups are listed in AllowGroups Mar 17 14:22:19 dcd-gentoo sshd[28306]: error: PAM: Authentication failure for illegal user root from 222.186.30.57 Mar 17 14:22:16 dcd-gentoo sshd[28306]: User root from 222.186.30.57 not allowed because none of user's groups are listed in AllowGroups Mar 17 14:22:19 dcd-gentoo sshd[28306]: error: PAM: Authentication failure for illegal user root from 222.186.30.57 Mar 17 14:22:16 dcd-gentoo sshd[28306]: User root from 222.186.30.57 not allowed because none of user's groups are listed in AllowGroups Mar 17 14:22:19 dcd-gentoo sshd[28306]: error: PAM: Authentication failure for illegal user root from 222.186.30.57 Mar 17 14:22:19 dcd-gentoo sshd[28306]: Failed keyboard-interactive/pam for invalid user root from 222.186.30.57 port 63016 ssh2 ... |
2020-03-17 21:36:55 |
| 106.52.59.96 | attackbots | Unauthorized connection attempt detected from IP address 106.52.59.96 to port 12850 |
2020-03-17 22:01:12 |
| 96.94.77.233 | attack | Unauthorized connection attempt detected from IP address 96.94.77.233 to port 23 |
2020-03-17 21:18:18 |
| 156.221.5.238 | attackbotsspam | Unauthorized connection attempt detected from IP address 156.221.5.238 to port 23 |
2020-03-17 21:56:21 |