城市(city): Singapore
省份(region): unknown
国家(country): Singapore
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 66.90.64.0 - 66.90.127.255
CIDR: 66.90.64.0/18
NetName: FDCSERVERS
NetHandle: NET-66-90-64-0-1
Parent: NET66 (NET-66-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: FDCservers.net (FDCSE)
RegDate: 2003-08-18
Updated: 2018-10-12
Ref: https://rdap.arin.net/registry/ip/66.90.64.0
OrgName: FDCservers.net
OrgId: FDCSE
Address: 175 Main St. #1363
City: Destin
StateProv: FL
PostalCode: 32540
Country: US
RegDate: 2003-05-20
Updated: 2025-08-08
Ref: https://rdap.arin.net/registry/entity/FDCSE
ReferralServer: rwhois://rwhois.fdcservers.net:4321
OrgAbuseHandle: ABUSE438-ARIN
OrgAbuseName: ABUSE department
OrgAbusePhone: +1-312-423-6675
OrgAbuseEmail: abuse@fdcservers.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE438-ARIN
OrgTechHandle: NETWO10401-ARIN
OrgTechName: Network Department
OrgTechPhone: +1-312-423-6675
OrgTechEmail: network@fdcservers.net
OrgTechRef: https://rdap.arin.net/registry/entity/NETWO10401-ARIN
OrgRoutingHandle: NETWO10401-ARIN
OrgRoutingName: Network Department
OrgRoutingPhone: +1-312-423-6675
OrgRoutingEmail: network@fdcservers.net
OrgRoutingRef: https://rdap.arin.net/registry/entity/NETWO10401-ARIN
OrgNOCHandle: NETWO10401-ARIN
OrgNOCName: Network Department
OrgNOCPhone: +1-312-423-6675
OrgNOCEmail: network@fdcservers.net
OrgNOCRef: https://rdap.arin.net/registry/entity/NETWO10401-ARIN
# end
# start
NetRange: 66.90.98.0 - 66.90.98.255
CIDR: 66.90.98.0/24
NetName: FDCSERVERS-SINGAPORE
NetHandle: NET-66-90-98-0-1
Parent: FDCSERVERS (NET-66-90-64-0-1)
NetType: Reallocated
OriginAS:
Organization: FDCservers.net (FDCSE-29)
RegDate: 2021-11-19
Updated: 2021-11-19
Ref: https://rdap.arin.net/registry/ip/66.90.98.0
OrgName: FDCservers.net
OrgId: FDCSE-29
Address: 20 Ayer Rajah Crescent
City: Singapore
StateProv: SINGAPORE
PostalCode: 139964
Country: SG
RegDate: 2019-10-14
Updated: 2025-08-08
Ref: https://rdap.arin.net/registry/entity/FDCSE-29
OrgRoutingHandle: NETWO10401-ARIN
OrgRoutingName: Network Department
OrgRoutingPhone: +1-312-423-6675
OrgRoutingEmail: network@fdcservers.net
OrgRoutingRef: https://rdap.arin.net/registry/entity/NETWO10401-ARIN
OrgAbuseHandle: ABUSE438-ARIN
OrgAbuseName: ABUSE department
OrgAbusePhone: +1-312-423-6675
OrgAbuseEmail: abuse@fdcservers.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE438-ARIN
OrgNOCHandle: NETWO10401-ARIN
OrgNOCName: Network Department
OrgNOCPhone: +1-312-423-6675
OrgNOCEmail: network@fdcservers.net
OrgNOCRef: https://rdap.arin.net/registry/entity/NETWO10401-ARIN
OrgTechHandle: NETWO10401-ARIN
OrgTechName: Network Department
OrgTechPhone: +1-312-423-6675
OrgTechEmail: network@fdcservers.net
OrgTechRef: https://rdap.arin.net/registry/entity/NETWO10401-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to rwhois.fdcservers.net:4321.
%rwhois V-1.5:003fff:00 rwhois.fdcservers.net (by Network Solutions, Inc. V-1.5.9.6)
network:Auth-Area:66.90.64.0/18
network:Class-Name:network
network:OrgName:FDCservers.net
network:OrgID;I:FDCSE
network:Address:141 W Jackson Blvd. #1135
network:City:Chicago
network:StateProv:IL
network:PostalCode:60604
network:Country:US
network:NetRange:66.90.64.0 - 66.90.127.255
network:CIDR:66.90.64.0/18
network:NetName:FDCSERVERS
network:OrgAbuseHandle:ABUSE438-ARIN
network:OrgAbuseName:Abuse Department
network:OrgAbusePhone:+1-312-423-6675
network:OrgAbuseEmail:abuse@fdcservers.net
network:OrgNOCHandle:ABUSE438-ARIN
network:OrgNOCName:Tech Support
network:OrgNOCPhone:+1-312-423-6675
network:OrgNOCEmail:abuse@fdcservers.net
network:OrgTechHandle:ABUSE438-ARIN
network:OrgTechName:Tech Support
network:OrgTechPhone:+1-312-423-6675
network:OrgTechEmail:abuse@fdcservers.net
%ok
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.90.98.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42349
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;66.90.98.106. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026020504 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 06 11:30:28 CST 2026
;; MSG SIZE rcvd: 105
Host 106.98.90.66.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 106.98.90.66.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 2.95.191.106 | attackspambots | 445/tcp [2019-08-15]1pkt |
2019-08-16 12:16:58 |
| 183.166.98.249 | attackbots | Brute force SMTP login attempts. |
2019-08-16 12:19:26 |
| 45.115.99.38 | attack | Aug 16 03:18:20 OPSO sshd\[4237\]: Invalid user gerrit from 45.115.99.38 port 55352 Aug 16 03:18:20 OPSO sshd\[4237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.115.99.38 Aug 16 03:18:22 OPSO sshd\[4237\]: Failed password for invalid user gerrit from 45.115.99.38 port 55352 ssh2 Aug 16 03:23:29 OPSO sshd\[5256\]: Invalid user csgoserver78630 from 45.115.99.38 port 50448 Aug 16 03:23:29 OPSO sshd\[5256\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.115.99.38 |
2019-08-16 12:21:06 |
| 191.7.116.219 | attack | Aug 15 10:28:21 kapalua sshd\[25543\]: Invalid user support from 191.7.116.219 Aug 15 10:28:21 kapalua sshd\[25543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.7.116.219 Aug 15 10:28:23 kapalua sshd\[25543\]: Failed password for invalid user support from 191.7.116.219 port 4647 ssh2 Aug 15 10:28:25 kapalua sshd\[25543\]: Failed password for invalid user support from 191.7.116.219 port 4647 ssh2 Aug 15 10:28:28 kapalua sshd\[25543\]: Failed password for invalid user support from 191.7.116.219 port 4647 ssh2 |
2019-08-16 12:00:10 |
| 187.120.136.166 | attackspambots | SMTP-sasl brute force ... |
2019-08-16 12:03:01 |
| 54.39.145.31 | attack | Aug 15 17:55:44 sachi sshd\[17366\]: Invalid user ts3 from 54.39.145.31 Aug 15 17:55:44 sachi sshd\[17366\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.ip-54-39-145.net Aug 15 17:55:47 sachi sshd\[17366\]: Failed password for invalid user ts3 from 54.39.145.31 port 49756 ssh2 Aug 15 17:59:51 sachi sshd\[17720\]: Invalid user maya from 54.39.145.31 Aug 15 17:59:51 sachi sshd\[17720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.ip-54-39-145.net |
2019-08-16 12:11:46 |
| 186.207.128.104 | attackspambots | Aug 16 04:06:11 MK-Soft-VM4 sshd\[15658\]: Invalid user test from 186.207.128.104 port 39192 Aug 16 04:06:11 MK-Soft-VM4 sshd\[15658\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.207.128.104 Aug 16 04:06:14 MK-Soft-VM4 sshd\[15658\]: Failed password for invalid user test from 186.207.128.104 port 39192 ssh2 ... |
2019-08-16 12:23:44 |
| 112.85.42.180 | attack | frenzy |
2019-08-16 12:15:10 |
| 144.217.241.40 | attackbotsspam | Aug 16 01:48:48 SilenceServices sshd[2313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.241.40 Aug 16 01:48:50 SilenceServices sshd[2313]: Failed password for invalid user dovecot from 144.217.241.40 port 50288 ssh2 Aug 16 01:53:06 SilenceServices sshd[7183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.241.40 |
2019-08-16 11:55:55 |
| 157.230.101.167 | attackspam | Aug 16 05:29:10 relay postfix/smtpd\[28767\]: warning: unknown\[157.230.101.167\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 16 05:47:20 relay postfix/smtpd\[31324\]: warning: unknown\[157.230.101.167\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 16 05:47:20 relay postfix/smtpd\[28767\]: warning: unknown\[157.230.101.167\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 16 05:47:55 relay postfix/smtpd\[28767\]: warning: unknown\[157.230.101.167\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 16 05:48:01 relay postfix/smtpd\[32118\]: warning: unknown\[157.230.101.167\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-08-16 12:29:13 |
| 211.54.70.152 | attackspam | Aug 16 00:05:32 vps200512 sshd\[594\]: Invalid user irwang from 211.54.70.152 Aug 16 00:05:32 vps200512 sshd\[594\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.54.70.152 Aug 16 00:05:33 vps200512 sshd\[594\]: Failed password for invalid user irwang from 211.54.70.152 port 28861 ssh2 Aug 16 00:09:54 vps200512 sshd\[761\]: Invalid user sienna from 211.54.70.152 Aug 16 00:09:54 vps200512 sshd\[761\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.54.70.152 |
2019-08-16 12:17:31 |
| 106.51.128.133 | attack | Invalid user user7 from 106.51.128.133 port 37873 |
2019-08-16 12:00:33 |
| 171.241.236.149 | attackspam | 23/tcp [2019-08-15]1pkt |
2019-08-16 12:03:36 |
| 112.162.191.160 | attackbotsspam | Aug 16 01:43:35 srv206 sshd[21665]: Invalid user pn from 112.162.191.160 ... |
2019-08-16 11:50:28 |
| 117.66.243.77 | attackspam | Aug 16 00:19:48 v22018076622670303 sshd\[28558\]: Invalid user helpdesk from 117.66.243.77 port 43483 Aug 16 00:19:48 v22018076622670303 sshd\[28558\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.66.243.77 Aug 16 00:19:50 v22018076622670303 sshd\[28558\]: Failed password for invalid user helpdesk from 117.66.243.77 port 43483 ssh2 ... |
2019-08-16 12:16:43 |