城市(city): Portland
省份(region): Oregon
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 98.97.0.0 - 98.97.127.255
CIDR: 98.97.0.0/17
NetName: SPACEX-STARLINK-IPV4-03
NetHandle: NET-98-97-0-0-1
Parent: NET98 (NET-98-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: SpaceX Services, Inc. (SS-2296)
RegDate: 2021-06-28
Updated: 2021-08-30
Ref: https://rdap.arin.net/registry/ip/98.97.0.0
OrgName: SpaceX Services, Inc.
OrgId: SS-2296
Address: 1 Rocket Rd
City: Hawthorne
StateProv: CA
PostalCode: 90250
Country: US
RegDate: 2019-06-24
Updated: 2024-11-25
Ref: https://rdap.arin.net/registry/entity/SS-2296
OrgDNSHandle: STARL42-ARIN
OrgDNSName: Starlink NOC
OrgDNSPhone: +1-310-363-6000
OrgDNSEmail: starlink-noc@spacex.com
OrgDNSRef: https://rdap.arin.net/registry/entity/STARL42-ARIN
OrgNOCHandle: STARL42-ARIN
OrgNOCName: Starlink NOC
OrgNOCPhone: +1-310-363-6000
OrgNOCEmail: starlink-noc@spacex.com
OrgNOCRef: https://rdap.arin.net/registry/entity/STARL42-ARIN
OrgRoutingHandle: STARL42-ARIN
OrgRoutingName: Starlink NOC
OrgRoutingPhone: +1-310-363-6000
OrgRoutingEmail: starlink-noc@spacex.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/STARL42-ARIN
OrgTechHandle: STARL42-ARIN
OrgTechName: Starlink NOC
OrgTechPhone: +1-310-363-6000
OrgTechEmail: starlink-noc@spacex.com
OrgTechRef: https://rdap.arin.net/registry/entity/STARL42-ARIN
OrgAbuseHandle: STARL38-ARIN
OrgAbuseName: Starlink Abuse
OrgAbusePhone: +1-310-363-6000
OrgAbuseEmail: starlink-abuse@spacex.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/STARL38-ARIN
# end
# start
NetRange: 98.97.49.0 - 98.97.49.255
CIDR: 98.97.49.0/24
NetName: STARLINK-2706-US-STTLWAX1-IPV4
NetHandle: NET-98-97-49-0-1
Parent: SPACEX-STARLINK-IPV4-03 (NET-98-97-0-0-1)
NetType: Reassigned
OriginAS:
Organization: SpaceX Services, Inc. (SS-2296)
RegDate: 2023-07-19
Updated: 2023-07-19
Ref: https://rdap.arin.net/registry/ip/98.97.49.0
OrgName: SpaceX Services, Inc.
OrgId: SS-2296
Address: 1 Rocket Rd
City: Hawthorne
StateProv: CA
PostalCode: 90250
Country: US
RegDate: 2019-06-24
Updated: 2024-11-25
Ref: https://rdap.arin.net/registry/entity/SS-2296
OrgDNSHandle: STARL42-ARIN
OrgDNSName: Starlink NOC
OrgDNSPhone: +1-310-363-6000
OrgDNSEmail: starlink-noc@spacex.com
OrgDNSRef: https://rdap.arin.net/registry/entity/STARL42-ARIN
OrgNOCHandle: STARL42-ARIN
OrgNOCName: Starlink NOC
OrgNOCPhone: +1-310-363-6000
OrgNOCEmail: starlink-noc@spacex.com
OrgNOCRef: https://rdap.arin.net/registry/entity/STARL42-ARIN
OrgRoutingHandle: STARL42-ARIN
OrgRoutingName: Starlink NOC
OrgRoutingPhone: +1-310-363-6000
OrgRoutingEmail: starlink-noc@spacex.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/STARL42-ARIN
OrgTechHandle: STARL42-ARIN
OrgTechName: Starlink NOC
OrgTechPhone: +1-310-363-6000
OrgTechEmail: starlink-noc@spacex.com
OrgTechRef: https://rdap.arin.net/registry/entity/STARL42-ARIN
OrgAbuseHandle: STARL38-ARIN
OrgAbuseName: Starlink Abuse
OrgAbusePhone: +1-310-363-6000
OrgAbuseEmail: starlink-abuse@spacex.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/STARL38-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 98.97.49.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50612
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;98.97.49.4. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042400 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 25 00:01:48 CST 2026
;; MSG SIZE rcvd: 103
4.49.97.98.in-addr.arpa domain name pointer customer.snjecax1.isp.starlink.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
4.49.97.98.in-addr.arpa name = customer.snjecax1.isp.starlink.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 106.12.121.40 | attackspam | Oct 25 07:53:21 * sshd[12376]: Failed password for root from 106.12.121.40 port 40552 ssh2 |
2019-10-25 20:08:34 |
| 117.54.141.122 | attack | Automatic report - Banned IP Access |
2019-10-25 19:55:42 |
| 167.99.226.184 | attackspam | fail2ban honeypot |
2019-10-25 19:47:31 |
| 112.220.85.26 | attackspam | Oct 25 05:36:56 ovpn sshd\[4944\]: Invalid user oracle from 112.220.85.26 Oct 25 05:36:56 ovpn sshd\[4944\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.220.85.26 Oct 25 05:36:58 ovpn sshd\[4944\]: Failed password for invalid user oracle from 112.220.85.26 port 60754 ssh2 Oct 25 05:44:59 ovpn sshd\[6453\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.220.85.26 user=root Oct 25 05:45:00 ovpn sshd\[6453\]: Failed password for root from 112.220.85.26 port 40330 ssh2 |
2019-10-25 20:05:47 |
| 111.10.43.210 | attackbotsspam | port scan and connect, tcp 80 (http) |
2019-10-25 19:54:31 |
| 104.245.145.6 | attackbotsspam | (From climpson.milo@gmail.com) Looking for fresh buyers? Get thousands of keyword targeted visitors directly to your site. Boost your profits quick. Start seeing results in as little as 48 hours. For additional information write a reply to: george4633wil@gmail.com |
2019-10-25 19:42:13 |
| 45.121.105.106 | attack | Oct 25 03:41:48 DDOS Attack: SRC=45.121.105.106 DST=[Masked] LEN=48 TOS=0x00 PREC=0x00 TTL=245 DF PROTO=TCP SPT=80 DPT=21489 WINDOW=8192 RES=0x00 ACK SYN URGP=0 |
2019-10-25 20:10:43 |
| 92.222.81.62 | attack | Oct 24 12:28:13 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 92.222.81.62 port 43120 ssh2 (target: 158.69.100.132:22, password: r.r) Oct 24 12:28:13 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 92.222.81.62 port 57566 ssh2 (target: 158.69.100.136:22, password: r.r) Oct 24 12:28:13 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 92.222.81.62 port 42998 ssh2 (target: 158.69.100.135:22, password: r.r) Oct 24 12:28:13 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 92.222.81.62 port 37890 ssh2 (target: 158.69.100.137:22, password: r.r) Oct 24 12:28:13 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 92.222.81.62 port 59488 ssh2 (target: 158.69.100.133:22, password: r.r) Oct 24 12:28:13 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 92.222.81.62 port 34876 ssh2 (target: 158.69.100.134:22, password: r.r) Oct 24 12:28:13 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 92.222.81.62 port 458........ ------------------------------ |
2019-10-25 20:07:38 |
| 197.253.124.132 | attackspambots | Oct 25 05:20:35 venus sshd\[879\]: Invalid user yj from 197.253.124.132 port 45928 Oct 25 05:20:35 venus sshd\[879\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.253.124.132 Oct 25 05:20:37 venus sshd\[879\]: Failed password for invalid user yj from 197.253.124.132 port 45928 ssh2 ... |
2019-10-25 20:08:10 |
| 116.207.130.138 | attackbotsspam | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/116.207.130.138/ CN - 1H : (1856) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : CN NAME ASN : ASN136191 IP : 116.207.130.138 CIDR : 116.207.128.0/18 PREFIX COUNT : 2 UNIQUE IP COUNT : 16640 ATTACKS DETECTED ASN136191 : 1H - 1 3H - 1 6H - 1 12H - 3 24H - 3 DateTime : 2019-10-25 05:45:19 INFO : HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN - data recovery |
2019-10-25 19:56:35 |
| 219.91.66.41 | attack | Automatic report - Banned IP Access |
2019-10-25 20:09:20 |
| 154.18.8.211 | attackspam | Chat Spam |
2019-10-25 19:53:30 |
| 91.121.110.50 | attack | Oct 25 16:03:00 itv-usvr-01 sshd[2637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.110.50 user=root Oct 25 16:03:02 itv-usvr-01 sshd[2637]: Failed password for root from 91.121.110.50 port 55536 ssh2 Oct 25 16:06:26 itv-usvr-01 sshd[2792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.110.50 user=root Oct 25 16:06:27 itv-usvr-01 sshd[2792]: Failed password for root from 91.121.110.50 port 46443 ssh2 Oct 25 16:10:40 itv-usvr-01 sshd[3070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.110.50 user=root Oct 25 16:10:42 itv-usvr-01 sshd[3070]: Failed password for root from 91.121.110.50 port 37353 ssh2 |
2019-10-25 20:02:44 |
| 51.75.202.120 | attack | Oct 25 07:36:10 xeon sshd[42770]: Failed password for invalid user wk from 51.75.202.120 port 39052 ssh2 |
2019-10-25 19:51:06 |
| 134.209.218.189 | attackbotsspam | ssh intrusion attempt |
2019-10-25 19:44:40 |