城市(city): Toledo
省份(region): Ohio
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 66.242.32.0 - 66.242.57.255
CIDR: 66.242.32.0/20, 66.242.48.0/21, 66.242.56.0/23
NetName: ISCG-NET-1
NetHandle: NET-66-242-32-0-1
Parent: NET66 (NET-66-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: ISC Group (ISCG)
RegDate: 2002-03-04
Updated: 2026-02-19
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://rdap.arin.net/registry/ip/66.242.32.0
OrgName: ISC Group
OrgId: ISCG
Address: 104 N. Summit St.
Address: 4th Floor
City: Toledo
StateProv: OH
PostalCode: 43604
Country: US
RegDate: 2000-02-16
Updated: 2012-07-09
Ref: https://rdap.arin.net/registry/entity/ISCG
OrgAbuseHandle: DL506-ARIN
OrgAbuseName: Lewis, David
OrgAbusePhone: +1-419-244-4160
OrgAbuseEmail: netadmin@iscg.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/DL506-ARIN
OrgTechHandle: DL506-ARIN
OrgTechName: Lewis, David
OrgTechPhone: +1-419-244-4160
OrgTechEmail: netadmin@iscg.net
OrgTechRef: https://rdap.arin.net/registry/entity/DL506-ARIN
RTechHandle: DL506-ARIN
RTechName: Lewis, David
RTechPhone: +1-419-244-4160
RTechEmail: netadmin@iscg.net
RTechRef: https://rdap.arin.net/registry/entity/DL506-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.242.42.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57640
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;66.242.42.199. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040602 1800 900 604800 86400
;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 07 05:32:06 CST 2026
;; MSG SIZE rcvd: 106
Host 199.42.242.66.in-addr.arpa not found: 2(SERVFAIL)
server can't find 66.242.42.199.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 189.22.75.74 | attackspam | Unauthorized connection attempt from IP address 189.22.75.74 on Port 445(SMB) |
2020-01-08 09:15:24 |
| 31.13.191.77 | attackspambots | 0,23-01/04 [bc01/m12] PostRequest-Spammer scoring: berlin |
2020-01-08 13:16:28 |
| 219.93.6.6 | attack | $f2bV_matches |
2020-01-08 13:01:37 |
| 85.235.67.64 | attackspam | WordPress brute force |
2020-01-08 09:20:58 |
| 181.28.229.97 | attackbotsspam | Unauthorized connection attempt detected from IP address 181.28.229.97 to port 2220 [J] |
2020-01-08 13:13:48 |
| 198.143.133.154 | attackspam | Unauthorized connection attempt detected from IP address 198.143.133.154 to port 25 [J] |
2020-01-08 09:15:01 |
| 51.158.68.133 | attackbots | WordPress brute force |
2020-01-08 09:26:27 |
| 87.101.72.81 | attackspambots | Unauthorized connection attempt detected from IP address 87.101.72.81 to port 2220 [J] |
2020-01-08 09:17:25 |
| 51.38.71.174 | attackbotsspam | Unauthorized connection attempt detected from IP address 51.38.71.174 to port 2220 [J] |
2020-01-08 09:07:42 |
| 81.133.112.195 | attackspam | Unauthorized connection attempt detected from IP address 81.133.112.195 to port 2220 [J] |
2020-01-08 09:09:50 |
| 104.248.227.130 | attackbotsspam | 01/08/2020-00:09:18.535621 104.248.227.130 Protocol: 6 ET SCAN Potential SSH Scan |
2020-01-08 13:10:30 |
| 124.195.244.126 | attack | Unauthorized connection attempt detected from IP address 124.195.244.126 to port 2220 [J] |
2020-01-08 09:10:34 |
| 185.220.101.79 | attackspambots | Input Traffic from this IP, but critial abuseconfidencescore |
2020-01-08 13:11:49 |
| 200.80.149.68 | attack | 1578459420 - 01/08/2020 05:57:00 Host: 200.80.149.68/200.80.149.68 Port: 445 TCP Blocked |
2020-01-08 13:05:58 |
| 120.131.3.91 | attackbots | Jan 8 05:52:31 legacy sshd[27036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.131.3.91 Jan 8 05:52:33 legacy sshd[27036]: Failed password for invalid user ubuntu from 120.131.3.91 port 27058 ssh2 Jan 8 05:57:05 legacy sshd[27323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.131.3.91 ... |
2020-01-08 13:03:20 |