城市(city): Port Carbon
省份(region): Pennsylvania
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 67.63.64.0 - 67.63.127.255
CIDR: 67.63.64.0/18
NetName: ZITO-MIDWEST
NetHandle: NET-67-63-64-0-1
Parent: NET67 (NET-67-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Zito Media (TLL-10)
RegDate: 2005-10-24
Updated: 2012-03-02
Ref: https://rdap.arin.net/registry/ip/67.63.64.0
OrgName: Zito Media
OrgId: TLL-10
Address: 102 South Main
City: Coudersport
StateProv: PA
PostalCode: 16915
Country: US
RegDate: 2011-12-01
Updated: 2025-06-05
Ref: https://rdap.arin.net/registry/entity/TLL-10
OrgTechHandle: GISTC-ARIN
OrgTechName: Gist, Chad
OrgTechPhone: +1-877-742-8272
OrgTechEmail: cgist@zitomedia.com
OrgTechRef: https://rdap.arin.net/registry/entity/GISTC-ARIN
OrgAbuseHandle: ZITOA-ARIN
OrgAbuseName: Zito-Abuse
OrgAbusePhone: +1-877-742-8272
OrgAbuseEmail: abuse@zitomedia.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ZITOA-ARIN
OrgTechHandle: DAVEA1-ARIN
OrgTechName: Bernardi, Dave A
OrgTechPhone: +1-814-260-9570
OrgTechEmail: dave.bernardi@zitomedia.com
OrgTechRef: https://rdap.arin.net/registry/entity/DAVEA1-ARIN
OrgTechHandle: SJB9-ARIN
OrgTechName: Blumer, Skyler J
OrgTechPhone: +1-877-742-8272
OrgTechEmail: skyler.blumer@zitomedia.com
OrgTechRef: https://rdap.arin.net/registry/entity/SJB9-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 67.63.66.210
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17106
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;67.63.66.210. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026043002 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 01 12:37:52 CST 2026
;; MSG SIZE rcvd: 105
Host 210.66.63.67.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 210.66.63.67.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 64.227.76.189 | attack | Feb 25 17:35:10 iago sshd[5994]: Invalid user fake from 64.227.76.189 Feb 25 17:35:10 iago sshd[5994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.76.189 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=64.227.76.189 |
2020-02-26 05:19:24 |
| 41.78.26.18 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-02-26 05:11:45 |
| 189.242.8.173 | attack | 81/tcp [2020-02-25]1pkt |
2020-02-26 05:15:14 |
| 201.111.115.56 | attackspambots | Unauthorized connection attempt detected from IP address 201.111.115.56 to port 80 |
2020-02-26 05:08:51 |
| 88.135.49.14 | attackspam | Honeypot attack, port: 445, PTR: PTR record not found |
2020-02-26 05:08:02 |
| 90.190.204.254 | attackspam | 55805/udp [2020-02-25]1pkt |
2020-02-26 05:01:02 |
| 41.250.41.136 | attack | Feb 25 17:35:22 pmg postfix/postscreen\[13337\]: HANGUP after 2 from \[41.250.41.136\]:56459 in tests after SMTP handshake |
2020-02-26 05:19:53 |
| 59.28.26.200 | attack | Honeypot attack, port: 81, PTR: PTR record not found |
2020-02-26 05:02:08 |
| 223.17.34.131 | attack | Honeypot attack, port: 5555, PTR: 131-34-17-223-on-nets.com. |
2020-02-26 05:23:45 |
| 200.59.83.227 | attackspam | 20/2/25@14:26:58: FAIL: Alarm-Network address from=200.59.83.227 20/2/25@14:26:58: FAIL: Alarm-Network address from=200.59.83.227 ... |
2020-02-26 05:15:44 |
| 109.206.203.14 | attack | RDP Bruteforce |
2020-02-26 05:16:50 |
| 106.52.242.107 | attackbotsspam | Feb 25 21:58:49 * sshd[22681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.242.107 Feb 25 21:58:50 * sshd[22681]: Failed password for invalid user store from 106.52.242.107 port 54870 ssh2 |
2020-02-26 05:18:38 |
| 123.181.58.102 | attackbotsspam | suspicious action Tue, 25 Feb 2020 13:35:23 -0300 |
2020-02-26 05:16:17 |
| 103.99.200.37 | attackbotsspam | Feb 25 22:08:09 markkoudstaal sshd[28083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.99.200.37 Feb 25 22:08:10 markkoudstaal sshd[28083]: Failed password for invalid user r00t from 103.99.200.37 port 57971 ssh2 Feb 25 22:08:18 markkoudstaal sshd[28099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.99.200.37 |
2020-02-26 05:22:39 |
| 176.123.219.244 | attackspam | 445/tcp [2020-02-25]1pkt |
2020-02-26 05:26:35 |