城市(city): Columbus
省份(region): Ohio
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 97.65.0.0 - 97.65.255.255
CIDR: 97.65.0.0/16
NetName: TWTC-NETBLK-10
NetHandle: NET-97-65-0-0-1
Parent: NET97 (NET-97-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Level 3 Parent, LLC (LPL-141)
RegDate: 2008-05-14
Updated: 2022-03-23
Ref: https://rdap.arin.net/registry/ip/97.65.0.0
OrgName: Level 3 Parent, LLC
OrgId: LPL-141
Address: 100 CenturyLink Drive
City: Monroe
StateProv: LA
PostalCode: 71203
Country: US
RegDate: 2018-02-06
Updated: 2024-06-17
Comment: USAGE OF IP SPACE MUST COMPLY WITH OUR ACCEPTABLE USE POLICY:
Comment: https://www.lumen.com/en-us/about/legal/acceptable-use-policy.html
Comment:
Comment: ADDRESSES COVERED BY THIS ORG-ID ARE NON-PORTABLE ANY ISP ANNOUNCING OR TRANSITING PORTIONS WITHIN OUR RANGES SHOULD NOT RELY ON PRESENTED LOA'S OR OLD WHOIS UNLESS THOSE RANGES ARE ALSO ACTIVELY DIRECTLY ANNOUNCED TO A LUMEN ASN. WITH ALL LOA'S THESE CONDITIONS APPLY:
Comment:
Comment: 1. You are permitted to route the Lumen IP prefixes listed via Public BGP to your alternate ISP from the designated ASN. Any other ASN originating the prefix listed is forbidden.
Comment: 2. The Lumen IP prefixes listed can be routed via Public BGP to your alternate ISP as long as you remain an active customer with Lumen and continue to route the prefixes over at least one Lumen Internet circuit without significant traffic engineering.
Comment: 3. Should your Internet services with Lumen be discontinued, Lumen reserves the right to have your alternate ISP terminate the routing of the Lumen IP prefixes without advanced notification, should you fail to do so.
Comment: 4. All IP Addresses assigned or allocated by Lumen to an end-user (customer or ISP) shall be considered non-portable and will be reclaimed by Lumen upon service termination.
Comment: 5. Lumen reserves the right to conduct audits to ensure the LOA conditions are being met.
Comment: 6. Usage of IP space must comply with our AUP https://www.lumen.com/en-us/about/legal/acceptable-use-policy.html
Comment:
Comment: Our looking glass is located at: https://lookingglass.centurylink.com/
Comment:
Comment: For subpoena or court order please fax 844.254.5800 or refer to our Trust & Safety page:
Comment: https://www.lumen.com/en-us/about/legal/trust-center/trust-and-safety.html
Comment:
Comment: For abuse issues, please email abuse@aup.lumen.com
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email)
Comment: Without these we will be unable to identify the correct owner of the IP address at that point in time.
Ref: https://rdap.arin.net/registry/entity/LPL-141
OrgAbuseHandle: LAC56-ARIN
OrgAbuseName: L3 Abuse Contact
OrgAbusePhone: +1-877-453-8353
OrgAbuseEmail: abuse@level3.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/LAC56-ARIN
OrgRoutingHandle: RPKIR-ARIN
OrgRoutingName: RPKI-ROA
OrgRoutingPhone: +1-877-886-6515
OrgRoutingEmail: rpki-roa@lumen.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/RPKIR-ARIN
OrgTechHandle: APL7-ARIN
OrgTechName: ADMIN POC LVLT
OrgTechPhone: +1-877-453-8353
OrgTechEmail: ipadmin@lumen.com
OrgTechRef: https://rdap.arin.net/registry/entity/APL7-ARIN
# end
# start
NetRange: 97.65.67.0 - 97.65.67.255
CIDR: 97.65.67.0/24
NetName: TWTC-BRESC9
NetHandle: NET-97-65-67-0-1
Parent: TWTC-NETBLK-10 (NET-97-65-0-0-1)
NetType: Reassigned
OriginAS:
Organization: Bresco Broadband (BRESC-1)
RegDate: 2014-11-21
Updated: 2019-04-26
Ref: https://rdap.arin.net/registry/ip/97.65.67.0
OrgName: Bresco Broadband
OrgId: BRESC-1
Address: 423 E. Town Street, Suite 100
City: Columbus
StateProv: OH
PostalCode: 43215
Country: US
RegDate: 2008-01-23
Updated: 2025-10-29
Ref: https://rdap.arin.net/registry/entity/BRESC-1
OrgTechHandle: LAUBA6-ARIN
OrgTechName: Laub, Aaron
OrgTechPhone: +1-614-469-9000
OrgTechEmail: aaron.laub@ohiogig.com
OrgTechRef: https://rdap.arin.net/registry/entity/LAUBA6-ARIN
OrgTechHandle: SUPPO544-ARIN
OrgTechName: support
OrgTechPhone: +1-614-444-1001
OrgTechEmail: support@brescobroadband.com
OrgTechRef: https://rdap.arin.net/registry/entity/SUPPO544-ARIN
OrgDNSHandle: CALLI68-ARIN
OrgDNSName: Callis, Eli
OrgDNSPhone: +1-614-395-5759
OrgDNSEmail: ecallis@brescobroadband.com
OrgDNSRef: https://rdap.arin.net/registry/entity/CALLI68-ARIN
OrgDNSHandle: SUPPO544-ARIN
OrgDNSName: support
OrgDNSPhone: +1-614-444-1001
OrgDNSEmail: support@brescobroadband.com
OrgDNSRef: https://rdap.arin.net/registry/entity/SUPPO544-ARIN
OrgDNSHandle: ZIEGL61-ARIN
OrgDNSName: Ziegler, Dylan
OrgDNSPhone: +1-810-531-1967
OrgDNSEmail: dylan.ziegler@ohiogig.com
OrgDNSRef: https://rdap.arin.net/registry/entity/ZIEGL61-ARIN
OrgAbuseHandle: SUPPO544-ARIN
OrgAbuseName: support
OrgAbusePhone: +1-614-444-1001
OrgAbuseEmail: support@brescobroadband.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/SUPPO544-ARIN
OrgTechHandle: EPC5-ARIN
OrgTechName: Clark, Ethan Patrick
OrgTechPhone: +1-614-444-1001
OrgTechEmail: ethan.clark@brescobroadband.com
OrgTechRef: https://rdap.arin.net/registry/entity/EPC5-ARIN
OrgNOCHandle: SUPPO544-ARIN
OrgNOCName: support
OrgNOCPhone: +1-614-444-1001
OrgNOCEmail: support@brescobroadband.com
OrgNOCRef: https://rdap.arin.net/registry/entity/SUPPO544-ARIN
OrgTechHandle: ZIEGL61-ARIN
OrgTechName: Ziegler, Dylan
OrgTechPhone: +1-810-531-1967
OrgTechEmail: dylan.ziegler@ohiogig.com
OrgTechRef: https://rdap.arin.net/registry/entity/ZIEGL61-ARIN
OrgTechHandle: CALLI68-ARIN
OrgTechName: Callis, Eli
OrgTechPhone: +1-614-395-5759
OrgTechEmail: ecallis@brescobroadband.com
OrgTechRef: https://rdap.arin.net/registry/entity/CALLI68-ARIN
OrgDNSHandle: EPC5-ARIN
OrgDNSName: Clark, Ethan Patrick
OrgDNSPhone: +1-614-444-1001
OrgDNSEmail: ethan.clark@brescobroadband.com
OrgDNSRef: https://rdap.arin.net/registry/entity/EPC5-ARIN
OrgDNSHandle: LAUBA6-ARIN
OrgDNSName: Laub, Aaron
OrgDNSPhone: +1-614-469-9000
OrgDNSEmail: aaron.laub@ohiogig.com
OrgDNSRef: https://rdap.arin.net/registry/entity/LAUBA6-ARIN
OrgDNSHandle: BLB13-ARIN
OrgDNSName: Beatty, Brent L
OrgDNSPhone: +1-614-395-2806
OrgDNSEmail: brent@brescobroadband.com
OrgDNSRef: https://rdap.arin.net/registry/entity/BLB13-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 97.65.67.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14138
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;97.65.67.161. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026033000 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 17:00:35 CST 2026
;; MSG SIZE rcvd: 105
161.67.65.97.in-addr.arpa domain name pointer 97-65-67-161.brescobroadband.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
161.67.65.97.in-addr.arpa name = 97-65-67-161.brescobroadband.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 223.25.97.250 | attackspambots | Oct 3 15:24:01 v22019058497090703 sshd[20144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.25.97.250 Oct 3 15:24:02 v22019058497090703 sshd[20144]: Failed password for invalid user jira from 223.25.97.250 port 44116 ssh2 Oct 3 15:29:02 v22019058497090703 sshd[20524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.25.97.250 ... |
2019-10-04 04:22:44 |
| 92.118.160.5 | attackspambots | Automatic report - Banned IP Access |
2019-10-04 04:28:52 |
| 67.27.153.254 | attack | TCP Port: 80 _ invalid blocked zen-spamhaus also rbldns-ru _ _ Client xx.xx.4.125 _ _ (437) |
2019-10-04 04:49:21 |
| 23.251.142.181 | attackbots | Oct 3 04:09:44 web1 sshd\[700\]: Invalid user nrpe from 23.251.142.181 Oct 3 04:09:44 web1 sshd\[700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.251.142.181 Oct 3 04:09:45 web1 sshd\[700\]: Failed password for invalid user nrpe from 23.251.142.181 port 50787 ssh2 Oct 3 04:13:41 web1 sshd\[1118\]: Invalid user user3 from 23.251.142.181 Oct 3 04:13:41 web1 sshd\[1118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.251.142.181 |
2019-10-04 04:18:53 |
| 223.25.101.76 | attackspam | 2019-10-03T17:48:19.728279shield sshd\[5925\]: Invalid user ts3 from 223.25.101.76 port 44784 2019-10-03T17:48:19.733434shield sshd\[5925\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.25.101.76 2019-10-03T17:48:21.683348shield sshd\[5925\]: Failed password for invalid user ts3 from 223.25.101.76 port 44784 ssh2 2019-10-03T17:53:13.909216shield sshd\[6574\]: Invalid user vnc from 223.25.101.76 port 56550 2019-10-03T17:53:13.916070shield sshd\[6574\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.25.101.76 |
2019-10-04 04:25:49 |
| 117.34.25.177 | attackbots | firewall-block, port(s): 445/tcp |
2019-10-04 04:50:46 |
| 112.133.204.221 | attack | Scanning random ports - tries to find possible vulnerable services |
2019-10-04 04:47:32 |
| 120.76.46.33 | attack | WordPress login Brute force / Web App Attack on client site. |
2019-10-04 04:38:57 |
| 67.205.146.204 | attack | Automatic report - Banned IP Access |
2019-10-04 04:20:34 |
| 217.113.28.5 | attack | Oct 3 04:46:38 wbs sshd\[25631\]: Invalid user td from 217.113.28.5 Oct 3 04:46:38 wbs sshd\[25631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.113.28.5 Oct 3 04:46:40 wbs sshd\[25631\]: Failed password for invalid user td from 217.113.28.5 port 51250 ssh2 Oct 3 04:51:29 wbs sshd\[26057\]: Invalid user locamex from 217.113.28.5 Oct 3 04:51:29 wbs sshd\[26057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.113.28.5 |
2019-10-04 04:17:18 |
| 222.186.190.65 | attack | Oct 3 20:21:04 venus sshd\[25047\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.65 user=root Oct 3 20:21:06 venus sshd\[25047\]: Failed password for root from 222.186.190.65 port 58788 ssh2 Oct 3 20:21:08 venus sshd\[25047\]: Failed password for root from 222.186.190.65 port 58788 ssh2 ... |
2019-10-04 04:23:06 |
| 103.247.88.63 | attackbots | Oct 3 15:59:59 h2177944 kernel: \[2987364.865178\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=103.247.88.63 DST=85.214.117.9 LEN=40 TOS=0x08 PREC=0x20 TTL=57 ID=10834 DF PROTO=TCP SPT=51127 DPT=22 WINDOW=29200 RES=0x00 SYN URGP=0 Oct 3 16:07:17 h2177944 kernel: \[2987803.067461\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=103.247.88.63 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=60 ID=23665 DF PROTO=TCP SPT=53815 DPT=80 WINDOW=29200 RES=0x00 SYN URGP=0 Oct 3 16:07:54 h2177944 kernel: \[2987839.598783\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=103.247.88.63 DST=85.214.117.9 LEN=40 TOS=0x08 PREC=0x20 TTL=59 ID=88 DF PROTO=TCP SPT=53175 DPT=80 WINDOW=29200 RES=0x00 SYN URGP=0 Oct 3 16:15:21 h2177944 kernel: \[2988287.458053\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=103.247.88.63 DST=85.214.117.9 LEN=40 TOS=0x08 PREC=0x20 TTL=53 ID=13014 DF PROTO=TCP SPT=52324 DPT=80 WINDOW=29200 RES=0x00 SYN URGP=0 Oct 3 16:15:31 h2177944 kernel: \[2988297.110595\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=103.247.88.63 DST=85.214.117. |
2019-10-04 04:44:03 |
| 219.84.203.57 | attack | Oct 3 16:09:03 TORMINT sshd\[18304\]: Invalid user test from 219.84.203.57 Oct 3 16:09:03 TORMINT sshd\[18304\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.84.203.57 Oct 3 16:09:05 TORMINT sshd\[18304\]: Failed password for invalid user test from 219.84.203.57 port 43532 ssh2 ... |
2019-10-04 04:55:04 |
| 131.196.7.234 | attackbots | Lines containing failures of 131.196.7.234 Sep 30 22:40:41 shared10 sshd[21091]: Invalid user vcsa from 131.196.7.234 port 60033 Sep 30 22:40:41 shared10 sshd[21091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.196.7.234 Sep 30 22:40:44 shared10 sshd[21091]: Failed password for invalid user vcsa from 131.196.7.234 port 60033 ssh2 Sep 30 22:40:44 shared10 sshd[21091]: Received disconnect from 131.196.7.234 port 60033:11: Bye Bye [preauth] Sep 30 22:40:44 shared10 sshd[21091]: Disconnected from invalid user vcsa 131.196.7.234 port 60033 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=131.196.7.234 |
2019-10-04 04:31:18 |
| 180.126.226.168 | attackbotsspam | Automated reporting of SSH Vulnerability scanning |
2019-10-04 04:18:30 |