城市(city): Puerto Varas
省份(region): Los Lagos (X)
国家(country): Chile
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% IP Client: 124.223.158.242
% Joint Whois - whois.lacnic.net
% This server accepts single ASN, IPv4 or IPv6 queries
% LACNIC resource: whois.lacnic.net
% Copyright LACNIC lacnic.net
% The data below is provided for information purposes
% and to assist persons in obtaining information about or
% related to AS and IP numbers registrations
% By submitting a whois query, you agree to use this data
% only for lawful purposes.
% 2025-11-10 12:18:09 (-03 -03:00)
inetnum: 179.56.0.0/15
status: allocated
aut-num: N/A
owner: Telefonica del Sur S.A.
ownerid: CL-TSSA-LACNIC
responsible: Manuel Suanez Berrios
address: San Carlos, 107, -
address: - - Valdivia -
country: CL
phone: +56 63224139000 [0000]
owner-c: MAS309
tech-c: MAS309
abuse-c: MAS309
inetrev: 179.56.0.0/15
nserver: NS.GTDINTERNET.COM
nsstat: 20251109 AA
nslastaa: 20251109
nserver: NS2.GTDINTERNET.COM
nsstat: 20251109 AA
nslastaa: 20251109
created: 20130708
changed: 20231117
nic-hdl: MAS309
person: Manuel Suanez Berrios
e-mail: netadmin@grupogtd.com
address: Moneda, 920, -
address: NONE - Santiago - SA
country: CL
phone: +56 224139000 [0000]
created: 20140204
changed: 20220228
% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 179.57.105.63
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6278
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;179.57.105.63. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025111000 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Nov 10 23:18:09 CST 2025
;; MSG SIZE rcvd: 106
b'Host 63.105.57.179.in-addr.arpa. not found: 3(NXDOMAIN)
'
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 63.105.57.179.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 175.199.28.25 | attackbotsspam | Unauthorized connection attempt detected from IP address 175.199.28.25 to port 4567 [J] |
2020-01-25 08:20:33 |
| 112.165.97.124 | attackbotsspam | Unauthorized connection attempt detected from IP address 112.165.97.124 to port 81 [J] |
2020-01-25 08:07:02 |
| 58.56.32.238 | attack | Unauthorized connection attempt detected from IP address 58.56.32.238 to port 2220 [J] |
2020-01-25 07:46:19 |
| 37.216.245.158 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-01-25 07:49:42 |
| 1.174.91.26 | attackspam | firewall-block, port(s): 23/tcp |
2020-01-25 07:51:25 |
| 218.64.216.79 | attackspam | Unauthorized connection attempt detected from IP address 218.64.216.79 to port 1433 [J] |
2020-01-25 08:00:07 |
| 222.186.175.215 | attackbots | Jan 25 00:45:20 MK-Soft-Root2 sshd[6256]: Failed password for root from 222.186.175.215 port 9780 ssh2 Jan 25 00:45:25 MK-Soft-Root2 sshd[6256]: Failed password for root from 222.186.175.215 port 9780 ssh2 ... |
2020-01-25 07:47:01 |
| 49.233.185.68 | attackbotsspam | Unauthorized connection attempt detected from IP address 49.233.185.68 to port 2220 [J] |
2020-01-25 07:43:53 |
| 190.218.65.18 | attack | Unauthorized connection attempt detected from IP address 190.218.65.18 to port 5555 [J] |
2020-01-25 08:16:12 |
| 103.204.231.50 | attackbots | Unauthorized connection attempt detected from IP address 103.204.231.50 to port 23 [J] |
2020-01-25 08:08:55 |
| 124.6.14.65 | attackbotsspam | Unauthorized connection attempt detected from IP address 124.6.14.65 to port 23 [J] |
2020-01-25 08:22:18 |
| 95.38.61.193 | attackbotsspam | Email rejected due to spam filtering |
2020-01-25 07:52:19 |
| 186.1.141.173 | attack | Honeypot attack, port: 445, PTR: natpool-186-1-141-173.hnremote.net. |
2020-01-25 07:50:08 |
| 178.151.151.58 | attackspambots | Unauthorized connection attempt detected from IP address 178.151.151.58 to port 5555 [J] |
2020-01-25 08:20:02 |
| 218.164.5.164 | attackspambots | Unauthorized connection attempt detected from IP address 218.164.5.164 to port 23 [J] |
2020-01-25 07:58:28 |