城市(city): Kinston
省份(region): North Carolina
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 74.121.224.0 - 74.121.231.255
CIDR: 74.121.224.0/21
NetName: CYBERSHARKS
NetHandle: NET-74-121-224-0-1
Parent: NET74 (NET-74-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: CYBERSHARKS.NET (CYBERS-75)
RegDate: 2010-01-26
Updated: 2012-03-02
Comment: http://www.cybersharks.net
Ref: https://rdap.arin.net/registry/ip/74.121.224.0
OrgName: CYBERSHARKS.NET
OrgId: CYBERS-75
Address: 2691 L T Hardee Road
City: Greenville
StateProv: NC
PostalCode: 27858
Country: US
RegDate: 2001-12-29
Updated: 2024-11-25
Ref: https://rdap.arin.net/registry/entity/CYBERS-75
OrgTechHandle: SUPPO126-ARIN
OrgTechName: Support Team
OrgTechPhone: +1-252-321-7800
OrgTechEmail: support@cybersharks.net
OrgTechRef: https://rdap.arin.net/registry/entity/SUPPO126-ARIN
OrgAbuseHandle: SUPPO127-ARIN
OrgAbuseName: Support Team
OrgAbusePhone: +1-252-353-7417
OrgAbuseEmail: abuse@cybersharks.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/SUPPO127-ARIN
RTechHandle: CB1299-ARIN
RTechName: Bradley, Cary
RTechPhone: +1-800-555-1234
RTechEmail: cbradley@cybersharks.net
RTechRef: https://rdap.arin.net/registry/entity/CB1299-ARIN
RAbuseHandle: SUPPO127-ARIN
RAbuseName: Support Team
RAbusePhone: +1-252-353-7417
RAbuseEmail: abuse@cybersharks.net
RAbuseRef: https://rdap.arin.net/registry/entity/SUPPO127-ARIN
RNOCHandle: SUPPO126-ARIN
RNOCName: Support Team
RNOCPhone: +1-252-321-7800
RNOCEmail: support@cybersharks.net
RNOCRef: https://rdap.arin.net/registry/entity/SUPPO126-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 74.121.229.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28749
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;74.121.229.134. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032300 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 16:57:49 CST 2026
;; MSG SIZE rcvd: 107
Host 134.229.121.74.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 134.229.121.74.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 177.97.200.187 | attackbots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-29 18:53:04,678 INFO [amun_request_handler] PortScan Detected on Port: 445 (177.97.200.187) |
2019-06-30 06:36:57 |
| 162.155.179.211 | attackbots | proto=tcp . spt=39515 . dpt=25 . (listed on Blocklist de Jun 29) (1239) |
2019-06-30 06:07:55 |
| 165.227.140.123 | attackspambots | Invalid user www from 165.227.140.123 port 59432 |
2019-06-30 06:35:15 |
| 41.218.224.209 | attack | Jun 29 21:58:08 srv-4 sshd\[28349\]: Invalid user admin from 41.218.224.209 Jun 29 21:58:08 srv-4 sshd\[28349\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.218.224.209 Jun 29 21:58:10 srv-4 sshd\[28349\]: Failed password for invalid user admin from 41.218.224.209 port 58998 ssh2 ... |
2019-06-30 06:28:14 |
| 171.244.49.72 | attackbots | Automatic report - Web App Attack |
2019-06-30 06:07:15 |
| 150.136.223.199 | attackbotsspam | Automatic report - Web App Attack |
2019-06-30 06:39:50 |
| 199.116.118.200 | attack | Jun 29 18:59:39 **** sshd[24459]: Did not receive identification string from 199.116.118.200 port 33034 |
2019-06-30 06:19:58 |
| 187.94.80.228 | attackspam | $f2bV_matches |
2019-06-30 06:48:11 |
| 213.185.88.230 | attackspam | Sql/code injection probe |
2019-06-30 06:11:08 |
| 85.174.190.218 | attackspam | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-29 18:52:58,663 INFO [amun_request_handler] PortScan Detected on Port: 445 (85.174.190.218) |
2019-06-30 06:40:16 |
| 165.227.212.99 | attack | Jun 30 04:54:19 itv-usvr-02 sshd[14378]: Invalid user mg from 165.227.212.99 port 37900 Jun 30 04:54:19 itv-usvr-02 sshd[14378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.212.99 Jun 30 04:54:19 itv-usvr-02 sshd[14378]: Invalid user mg from 165.227.212.99 port 37900 Jun 30 04:54:21 itv-usvr-02 sshd[14378]: Failed password for invalid user mg from 165.227.212.99 port 37900 ssh2 Jun 30 04:57:23 itv-usvr-02 sshd[14404]: Invalid user manager from 165.227.212.99 port 48974 |
2019-06-30 06:37:26 |
| 173.219.80.40 | attack | Jun 30 00:18:30 heissa sshd\[24373\]: Invalid user webxmore from 173.219.80.40 port 33336 Jun 30 00:18:30 heissa sshd\[24373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173-219-80-40.pkbgcmta03.com.sta.suddenlink.net Jun 30 00:18:33 heissa sshd\[24373\]: Failed password for invalid user webxmore from 173.219.80.40 port 33336 ssh2 Jun 30 00:21:31 heissa sshd\[24716\]: Invalid user sammy from 173.219.80.40 port 35818 Jun 30 00:21:31 heissa sshd\[24716\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.219.80.40 |
2019-06-30 06:28:44 |
| 1.52.203.142 | attackspambots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-29 18:51:10,403 INFO [amun_request_handler] PortScan Detected on Port: 445 (1.52.203.142) |
2019-06-30 06:43:31 |
| 43.242.212.81 | attackbotsspam | $f2bV_matches |
2019-06-30 06:46:41 |
| 167.99.143.90 | attackbots | Jun 29 21:20:54 localhost sshd\[20758\]: Invalid user guest2 from 167.99.143.90 port 47184 Jun 29 21:20:54 localhost sshd\[20758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.143.90 Jun 29 21:20:56 localhost sshd\[20758\]: Failed password for invalid user guest2 from 167.99.143.90 port 47184 ssh2 |
2019-06-30 06:07:31 |