城市(city): West Lafayette
省份(region): Indiana
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 73.0.0.0 - 73.255.255.255
CIDR: 73.0.0.0/8
NetName: CABLE-1
NetHandle: NET-73-0-0-0-1
Parent: NET73 (NET-73-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Comcast Cable Communications, LLC (CCCS)
RegDate: 2005-04-19
Updated: 2021-01-25
Ref: https://rdap.arin.net/registry/ip/73.0.0.0
OrgName: Comcast Cable Communications, LLC
OrgId: CCCS
Address: 1800 Bishops Gate Blvd
City: Mt Laurel
StateProv: NJ
PostalCode: 08054
Country: US
RegDate: 2001-09-18
Updated: 2020-11-18
Ref: https://rdap.arin.net/registry/entity/CCCS
OrgTechHandle: IC161-ARIN
OrgTechName: Comcast Cable Communications Inc
OrgTechPhone: +1-856-792-2300
OrgTechEmail: CNIPEO-Ip-registration@cable.comcast.com
OrgTechRef: https://rdap.arin.net/registry/entity/IC161-ARIN
OrgRoutingHandle: ROUTI25-ARIN
OrgRoutingName: Routing
OrgRoutingPhone: +1-856-792-2300
OrgRoutingEmail: routing@comcast.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/ROUTI25-ARIN
OrgAbuseHandle: NAPO-ARIN
OrgAbuseName: Network Abuse and Policy Observance
OrgAbusePhone: +1-888-565-4329
OrgAbuseEmail: abuse@comcast.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/NAPO-ARIN
# end
# start
NetRange: 73.102.0.0 - 73.103.255.255
CIDR: 73.102.0.0/15
NetName: INDIANA-CPE-16
NetHandle: NET-73-102-0-0-1
Parent: CABLE-1 (NET-73-0-0-0-1)
NetType: Reassigned
OriginAS:
Customer: Comcast Cable Communications, LLC (C11409387)
RegDate: 2025-11-03
Updated: 2025-11-03
Ref: https://rdap.arin.net/registry/ip/73.102.0.0
CustName: Comcast Cable Communications, LLC
Address: 1800 Bishops Gate Blvd
City: Mt Laurel
StateProv: NJ
PostalCode: 08054
Country: US
RegDate: 2025-11-03
Updated: 2025-11-03
Ref: https://rdap.arin.net/registry/entity/C11409387
OrgTechHandle: IC161-ARIN
OrgTechName: Comcast Cable Communications Inc
OrgTechPhone: +1-856-792-2300
OrgTechEmail: CNIPEO-Ip-registration@cable.comcast.com
OrgTechRef: https://rdap.arin.net/registry/entity/IC161-ARIN
OrgRoutingHandle: ROUTI25-ARIN
OrgRoutingName: Routing
OrgRoutingPhone: +1-856-792-2300
OrgRoutingEmail: routing@comcast.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/ROUTI25-ARIN
OrgAbuseHandle: NAPO-ARIN
OrgAbuseName: Network Abuse and Policy Observance
OrgAbusePhone: +1-888-565-4329
OrgAbuseEmail: abuse@comcast.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/NAPO-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 73.103.80.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13263
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;73.103.80.70. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040400 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 04 21:30:55 CST 2026
;; MSG SIZE rcvd: 105
70.80.103.73.in-addr.arpa domain name pointer c-73-103-80-70.hsd1.in.comcast.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
70.80.103.73.in-addr.arpa name = c-73-103-80-70.hsd1.in.comcast.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 134.119.192.227 | attackbotsspam | Jun 16 08:44:24 ny01 sshd[12194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.119.192.227 Jun 16 08:44:26 ny01 sshd[12194]: Failed password for invalid user gpadmin from 134.119.192.227 port 51562 ssh2 Jun 16 08:44:33 ny01 sshd[12205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.119.192.227 |
2020-06-16 21:00:29 |
| 71.229.154.254 | attackspambots | Automated report (2020-06-16T11:46:29+08:00). User agent cited by malware detected at this address. |
2020-06-16 20:18:25 |
| 124.156.241.17 | attack | Port Scan detected! ... |
2020-06-16 20:38:24 |
| 176.98.216.149 | attackspam | 20/6/16@08:24:39: FAIL: Alarm-Network address from=176.98.216.149 20/6/16@08:24:39: FAIL: Alarm-Network address from=176.98.216.149 ... |
2020-06-16 20:30:57 |
| 123.185.8.4 | attack |
|
2020-06-16 20:24:05 |
| 67.207.91.254 | attack | Automatic report - Windows Brute-Force Attack |
2020-06-16 20:47:47 |
| 104.131.189.4 | attackspambots | Automatic report BANNED IP |
2020-06-16 20:36:31 |
| 222.186.15.62 | attack | Unauthorized connection attempt detected from IP address 222.186.15.62 to port 22 |
2020-06-16 20:43:44 |
| 59.127.19.206 | attackspam | " " |
2020-06-16 20:46:37 |
| 84.204.209.221 | attackspambots | $f2bV_matches |
2020-06-16 20:37:05 |
| 84.208.137.213 | attack | Automatic report BANNED IP |
2020-06-16 20:33:15 |
| 46.101.137.182 | attack | Jun 16 14:24:21 hell sshd[12060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.137.182 Jun 16 14:24:23 hell sshd[12060]: Failed password for invalid user prueba from 46.101.137.182 port 52639 ssh2 ... |
2020-06-16 20:26:58 |
| 129.204.233.214 | attack | 2020-06-16T15:00:50.693377mail.standpoint.com.ua sshd[18766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.233.214 user=root 2020-06-16T15:00:53.080783mail.standpoint.com.ua sshd[18766]: Failed password for root from 129.204.233.214 port 38776 ssh2 2020-06-16T15:02:54.750012mail.standpoint.com.ua sshd[19054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.233.214 user=root 2020-06-16T15:02:56.826084mail.standpoint.com.ua sshd[19054]: Failed password for root from 129.204.233.214 port 38006 ssh2 2020-06-16T15:05:00.788065mail.standpoint.com.ua sshd[19340]: Invalid user aq from 129.204.233.214 port 37214 ... |
2020-06-16 20:24:54 |
| 1.220.90.53 | attackspambots | Jun 16 14:19:27 eventyay sshd[16306]: Failed password for root from 1.220.90.53 port 4262 ssh2 Jun 16 14:21:58 eventyay sshd[16394]: Failed password for root from 1.220.90.53 port 4701 ssh2 Jun 16 14:24:21 eventyay sshd[16447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.220.90.53 ... |
2020-06-16 20:50:59 |
| 129.204.83.3 | attackbotsspam | (sshd) Failed SSH login from 129.204.83.3 (CN/China/-): 5 in the last 3600 secs |
2020-06-16 20:31:28 |