城市(city): unknown
省份(region): Texas
国家(country): United States
运营商(isp): Softcom Internet Communications, Inc
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 66.54.128.0 - 66.54.255.255
CIDR: 66.54.128.0/17
NetName: RGS-BLK3
NetHandle: NET-66-54-128-0-1
Parent: NET66 (NET-66-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: GTT Americas, LLC (GAL-104)
RegDate: 2000-12-22
Updated: 2025-05-07
Ref: https://rdap.arin.net/registry/ip/66.54.128.0
OrgName: GTT Americas, LLC
OrgId: GAL-104
Address: 4201 Wilson Blvd -Suite 504
City: Arlington
StateProv: VA
PostalCode: 22203
Country: US
RegDate: 2025-02-11
Updated: 2025-07-08
Ref: https://rdap.arin.net/registry/entity/GAL-104
OrgTechHandle: GLD5-ARIN
OrgTechName: GTT Legal Departement
OrgTechPhone: +359886606
OrgTechEmail: alexander.mutafchiyski@gtt.net
OrgTechRef: https://rdap.arin.net/registry/entity/GLD5-ARIN
OrgNOCHandle: GNOC16-ARIN
OrgNOCName: GTT Network Operations Center
OrgNOCPhone: +1-703-442-5500
OrgNOCEmail: noc@gtt.net
OrgNOCRef: https://rdap.arin.net/registry/entity/GNOC16-ARIN
OrgTechHandle: AS3251-ARIN
OrgTechName: AS3257 Netguard
OrgTechPhone: +49 69 48007422
OrgTechEmail: netguard@gtt.net
OrgTechRef: https://rdap.arin.net/registry/entity/AS3251-ARIN
OrgTechHandle: GIT5-ARIN
OrgTechName: GTT IPAM Team
OrgTechPhone: +1-703-442-5500
OrgTechEmail: netguard@gtt.net
OrgTechRef: https://rdap.arin.net/registry/entity/GIT5-ARIN
OrgAbuseHandle: GAD46-ARIN
OrgAbuseName: GTT Abuse Department
OrgAbusePhone: +1-703-442-5501
OrgAbuseEmail: abuse@gtt.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/GAD46-ARIN
# end
# start
NetRange: 66.54.164.0 - 66.54.164.255
CIDR: 66.54.164.0/24
NetName: YIPS-XPEDI-S101703
NetHandle: NET-66-54-164-0-1
Parent: RGS-BLK3 (NET-66-54-128-0-1)
NetType: Reassigned
OriginAS:
Organization: Open Text Corporation (OTC-68)
RegDate: 2025-05-14
Updated: 2025-05-14
Ref: https://rdap.arin.net/registry/ip/66.54.164.0
OrgName: Open Text Corporation
OrgId: OTC-68
Address: 275 Frank Tompa Drive
City: Waterloo
StateProv: ON
PostalCode: N2L 0A1
Country: CA
RegDate: 2018-12-17
Updated: 2025-11-12
Comment: https://www.opentext.com
Ref: https://rdap.arin.net/registry/entity/OTC-68
OrgAbuseHandle: EMAIL68-ARIN
OrgAbuseName: Email Deliverablity
OrgAbusePhone: +1-519-888-7111
OrgAbuseEmail: emaildeliverability@opentext.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/EMAIL68-ARIN
OrgNOCHandle: DA16-ORG-ARIN
OrgNOCName: Open Text Corporation
OrgNOCPhone: +1-519-888-7111
OrgNOCEmail: smithr@opentext.com
OrgNOCRef: https://rdap.arin.net/registry/entity/DA16-ORG-ARIN
OrgAbuseHandle: DA16-ORG-ARIN
OrgAbuseName: Open Text Corporation
OrgAbusePhone: +1-519-888-7111
OrgAbuseEmail: smithr@opentext.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/DA16-ORG-ARIN
OrgTechHandle: DA16-ORG-ARIN
OrgTechName: Open Text Corporation
OrgTechPhone: +1-519-888-7111
OrgTechEmail: smithr@opentext.com
OrgTechRef: https://rdap.arin.net/registry/entity/DA16-ORG-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.54.164.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51972
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;66.54.164.54. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026051400 1800 900 604800 86400
;; Query time: 206 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 15 00:16:43 CST 2026
;; MSG SIZE rcvd: 105
Host 54.164.54.66.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 54.164.54.66.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 121.141.5.199 | attackbots | Jul 30 14:08:11 aat-srv002 sshd[17298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.141.5.199 Jul 30 14:08:13 aat-srv002 sshd[17298]: Failed password for invalid user callahan from 121.141.5.199 port 40892 ssh2 Jul 30 14:13:43 aat-srv002 sshd[17394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.141.5.199 Jul 30 14:13:44 aat-srv002 sshd[17394]: Failed password for invalid user dk from 121.141.5.199 port 60562 ssh2 ... |
2019-07-31 03:13:50 |
| 129.204.127.197 | attackspambots | 8080/tcp [2019-07-30]1pkt |
2019-07-31 03:55:29 |
| 167.71.130.99 | attackspambots | SSH Bruteforce attack |
2019-07-31 03:39:07 |
| 140.143.249.234 | attack | Jul 30 21:02:10 ns41 sshd[9167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.249.234 |
2019-07-31 03:47:40 |
| 200.107.154.47 | attack | Invalid user norbert from 200.107.154.47 port 36009 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.107.154.47 Failed password for invalid user norbert from 200.107.154.47 port 36009 ssh2 Invalid user paloma from 200.107.154.47 port 63516 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.107.154.47 |
2019-07-31 03:20:55 |
| 119.182.190.21 | attackbots | Honeypot attack, port: 23, PTR: PTR record not found |
2019-07-31 03:14:16 |
| 72.75.217.132 | attack | Jul 30 15:39:50 v22018076622670303 sshd\[10132\]: Invalid user bart from 72.75.217.132 port 37384 Jul 30 15:39:50 v22018076622670303 sshd\[10132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.75.217.132 Jul 30 15:39:52 v22018076622670303 sshd\[10132\]: Failed password for invalid user bart from 72.75.217.132 port 37384 ssh2 ... |
2019-07-31 03:43:39 |
| 92.119.160.52 | attack | Portscan or hack attempt detected by psad/fwsnort |
2019-07-31 03:58:04 |
| 132.232.46.114 | attack | PHP DIESCAN Information Disclosure Vulnerability |
2019-07-31 03:54:25 |
| 77.42.120.246 | attackbots | 23/tcp [2019-07-30]1pkt |
2019-07-31 03:58:51 |
| 217.182.136.202 | attackspam | ... |
2019-07-31 03:57:30 |
| 218.166.46.35 | attackbotsspam | 23/tcp [2019-07-30]1pkt |
2019-07-31 03:11:49 |
| 120.86.95.123 | attack | 22/tcp [2019-07-30]1pkt |
2019-07-31 03:46:00 |
| 185.242.249.148 | attackspambots | Sniffing for setup/upgrade script: 185.242.249.148 - - [30/Jul/2019:13:11:34 +0100] "GET /setup.cgi HTTP/1.1" 404 337 "-" "Mozilla/5.0" |
2019-07-31 03:51:04 |
| 123.231.61.180 | attack | Automatic report - Banned IP Access |
2019-07-31 03:19:22 |