城市(city): unknown
省份(region): unknown
国家(country): Canada
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 99.208.0.0 - 99.223.255.255
CIDR: 99.208.0.0/12
NetName: ROGERS-COM-DPS
NetHandle: NET-99-208-0-0-1
Parent: NET99 (NET-99-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Rogers Communications Canada Inc. (RCC-182)
RegDate: 2007-03-12
Updated: 2017-01-06
Ref: https://rdap.arin.net/registry/ip/99.208.0.0
OrgName: Rogers Communications Canada Inc.
OrgId: RCC-182
Address: 333 Bloor Street East
Address: 9th Floor
City: Toronto
StateProv: ON
PostalCode: M4W 1G9
Country: CA
RegDate: 2016-10-20
Updated: 2025-09-19
Ref: https://rdap.arin.net/registry/entity/RCC-182
OrgAbuseHandle: MCKIB27-ARIN
OrgAbuseName: Mckibbon, Peter
OrgAbusePhone: +1-416-268-7454
OrgAbuseEmail: abuse@rogers.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/MCKIB27-ARIN
OrgTechHandle: BAKOG1-ARIN
OrgTechName: Bakogiannis, Labros
OrgTechPhone: +1-647-747-1056
OrgTechEmail: labros.bakogiannis@rci.rogers.com
OrgTechRef: https://rdap.arin.net/registry/entity/BAKOG1-ARIN
OrgTechHandle: LEEJE40-ARIN
OrgTechName: Lee, Jeffrey
OrgTechPhone: +1-416-903-9230
OrgTechEmail: Jeffrey.Lee@rci.rogers.com
OrgTechRef: https://rdap.arin.net/registry/entity/LEEJE40-ARIN
OrgTechHandle: IPMAN-ARIN
OrgTechName: IP MANAGE
OrgTechPhone: +1-647-747-3294
OrgTechEmail: ipmanage@rogers.wave.ca
OrgTechRef: https://rdap.arin.net/registry/entity/IPMAN-ARIN
# end
# start
NetRange: 99.219.142.0 - 99.219.143.255
CIDR: 99.219.142.0/23
NetName: DPS
NetHandle: NET-99-219-142-0-1
Parent: ROGERS-COM-DPS (NET-99-208-0-0-1)
NetType: Reassigned
OriginAS:
Customer: Rogers Cable Inc. YM (C02140360)
RegDate: 2009-01-22
Updated: 2009-01-22
Ref: https://rdap.arin.net/registry/ip/99.219.142.0
CustName: Rogers Cable Inc. YM
Address: 1 Mount Pleasant Road
City: Toronto
StateProv: ON
PostalCode: M4Y-2Y5
Country: CA
RegDate: 2009-01-22
Updated: 2017-01-06
Ref: https://rdap.arin.net/registry/entity/C02140360
OrgAbuseHandle: MCKIB27-ARIN
OrgAbuseName: Mckibbon, Peter
OrgAbusePhone: +1-416-268-7454
OrgAbuseEmail: abuse@rogers.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/MCKIB27-ARIN
OrgTechHandle: BAKOG1-ARIN
OrgTechName: Bakogiannis, Labros
OrgTechPhone: +1-647-747-1056
OrgTechEmail: labros.bakogiannis@rci.rogers.com
OrgTechRef: https://rdap.arin.net/registry/entity/BAKOG1-ARIN
OrgTechHandle: LEEJE40-ARIN
OrgTechName: Lee, Jeffrey
OrgTechPhone: +1-416-903-9230
OrgTechEmail: Jeffrey.Lee@rci.rogers.com
OrgTechRef: https://rdap.arin.net/registry/entity/LEEJE40-ARIN
OrgTechHandle: IPMAN-ARIN
OrgTechName: IP MANAGE
OrgTechPhone: +1-647-747-3294
OrgTechEmail: ipmanage@rogers.wave.ca
OrgTechRef: https://rdap.arin.net/registry/entity/IPMAN-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.219.142.176
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51127
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;99.219.142.176. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025111000 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Nov 10 14:34:01 CST 2025
;; MSG SIZE rcvd: 107
Host 176.142.219.99.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 176.142.219.99.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 62.122.137.150 | attackbots | xmlrpc attack |
2020-02-11 19:35:46 |
| 218.92.0.184 | attackspam | Feb 11 08:30:35 mail sshd[27681]: Failed password for root from 218.92.0.184 port 55968 ssh2 Feb 11 08:30:40 mail sshd[27681]: Failed password for root from 218.92.0.184 port 55968 ssh2 Feb 11 08:30:43 mail sshd[27681]: Failed password for root from 218.92.0.184 port 55968 ssh2 Feb 11 08:30:48 mail sshd[27681]: Failed password for root from 218.92.0.184 port 55968 ssh2 |
2020-02-11 19:35:31 |
| 121.183.203.60 | attackspambots | port |
2020-02-11 19:45:28 |
| 159.89.201.218 | attackbotsspam | Feb 11 11:00:15 ms-srv sshd[50948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.201.218 Feb 11 11:00:17 ms-srv sshd[50948]: Failed password for invalid user lce from 159.89.201.218 port 53004 ssh2 |
2020-02-11 19:32:33 |
| 211.254.214.150 | attack | Invalid user iep from 211.254.214.150 port 46118 |
2020-02-11 19:39:38 |
| 123.184.16.66 | attackspambots | firewall-block, port(s): 6378/tcp |
2020-02-11 19:31:21 |
| 206.72.198.132 | attackspam | Feb 10 10:59:51 mail postfix/smtpd[10138]: warning: unknown[206.72.198.132]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Feb 10 11:00:03 mail postfix/smtpd[10933]: warning: unknown[206.72.198.132]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Feb 10 11:00:17 mail postfix/smtpd[10990]: warning: unknown[206.72.198.132]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Feb 10 11:00:38 mail postfix/smtpd[9925]: warning: unknown[206.72.198.132]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Feb 10 11:00:49 mail postfix/smtpd[11290]: warning: unknown[206.72.198.132]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Feb 10 11:01:03 mail postfix/smtpd[10470]: warning: unknown[206.72.198.132]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2020-02-11 19:24:40 |
| 116.49.63.55 | attack | Honeypot attack, port: 5555, PTR: n1164963055.netvigator.com. |
2020-02-11 19:56:10 |
| 54.178.182.46 | attack | WordPress login Brute force / Web App Attack on client site. |
2020-02-11 19:37:54 |
| 14.241.120.114 | attackspambots | 1581396610 - 02/11/2020 05:50:10 Host: 14.241.120.114/14.241.120.114 Port: 445 TCP Blocked |
2020-02-11 19:30:45 |
| 189.31.66.66 | attackspambots | Honeypot attack, port: 445, PTR: PTR record not found |
2020-02-11 19:48:20 |
| 113.190.8.146 | attackspam | 2020-02-1105:49:241j1NUC-0007Pi-1R\<=verena@rs-solution.chH=\(localhost\)[14.228.122.132]:49198P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=2571id=B5B006555E8AA417CBCE873FCBEA30BA@rs-solution.chT="\;\)behappytoreceiveyouranswerorchatwithyou..."for20230237@student.nths.netcitizendude67@yahoo.com2020-02-1105:48:441j1NTX-0007NN-Ml\<=verena@rs-solution.chH=\(localhost\)[14.186.59.233]:34094P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=2547id=5055E3B0BB6F41F22E2B62DA2E462FD0@rs-solution.chT="\;\)bedelightedtoreceiveyouranswer\ |
2020-02-11 19:45:46 |
| 2a01:4f9:4a:1260::2 | attack | Auto reported by IDS |
2020-02-11 19:38:41 |
| 106.12.69.27 | attack | unauthorized access on port 443 [https] FO |
2020-02-11 19:19:45 |
| 192.241.179.199 | attack | Feb 11 11:32:45 srv-ubuntu-dev3 sshd[45543]: Invalid user xlw from 192.241.179.199 Feb 11 11:32:45 srv-ubuntu-dev3 sshd[45543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.179.199 Feb 11 11:32:45 srv-ubuntu-dev3 sshd[45543]: Invalid user xlw from 192.241.179.199 Feb 11 11:32:47 srv-ubuntu-dev3 sshd[45543]: Failed password for invalid user xlw from 192.241.179.199 port 45378 ssh2 Feb 11 11:35:37 srv-ubuntu-dev3 sshd[45752]: Invalid user lck from 192.241.179.199 Feb 11 11:35:37 srv-ubuntu-dev3 sshd[45752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.179.199 Feb 11 11:35:37 srv-ubuntu-dev3 sshd[45752]: Invalid user lck from 192.241.179.199 Feb 11 11:35:39 srv-ubuntu-dev3 sshd[45752]: Failed password for invalid user lck from 192.241.179.199 port 46408 ssh2 Feb 11 11:38:35 srv-ubuntu-dev3 sshd[46096]: Invalid user yzl from 192.241.179.199 ... |
2020-02-11 19:55:45 |