城市(city): Los Angeles
省份(region): California
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 192.243.112.0 - 192.243.127.255
CIDR: 192.243.112.0/20
NetName: IT7NET
NetHandle: NET-192-243-112-0-1
Parent: NET192 (NET-192-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: IT7 Networks Inc (IN-27)
RegDate: 2013-07-26
Updated: 2024-10-15
Comment: Geofeed https://deploy.sioru.net/geofeed/feed.csv
Comment: Abuse desk: abuse@sioru.com or https://www.it7.net/contact/
Ref: https://rdap.arin.net/registry/ip/192.243.112.0
OrgName: IT7 Networks Inc
OrgId: IN-27
Address: 4974 Kingsway Ave
Address: Suite 668
City: Burnaby
StateProv: BC
PostalCode: V5H 4M9
Country: CA
RegDate: 2013-01-11
Updated: 2024-11-25
Ref: https://rdap.arin.net/registry/entity/IN-27
OrgTechHandle: TECHN1201-ARIN
OrgTechName: Technical Contact
OrgTechPhone: +1-408-260-5757
OrgTechEmail: arin-tech@sioru.com
OrgTechRef: https://rdap.arin.net/registry/entity/TECHN1201-ARIN
OrgAbuseHandle: ABUSE3623-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-408-260-5757
OrgAbuseEmail: abuse@sioru.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3623-ARIN
OrgNOCHandle: NOC12969-ARIN
OrgNOCName: NOC
OrgNOCPhone: +1-408-260-5757
OrgNOCEmail: arin-noc@sioru.com
OrgNOCRef: https://rdap.arin.net/registry/entity/NOC12969-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 192.243.113.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37898
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;192.243.113.149. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026051601 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 17 06:45:42 CST 2026
;; MSG SIZE rcvd: 108
149.113.243.192.in-addr.arpa domain name pointer 192.243.113.149.16clouds.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
149.113.243.192.in-addr.arpa name = 192.243.113.149.16clouds.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 196.44.236.213 | attackbots | Apr 27 22:14:12 vps333114 sshd[27078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.44.236.213 Apr 27 22:14:14 vps333114 sshd[27078]: Failed password for invalid user test_user1 from 196.44.236.213 port 52854 ssh2 ... |
2020-04-28 07:34:20 |
| 187.163.127.41 | attackbotsspam | Automatic report - Port Scan Attack |
2020-04-28 07:42:42 |
| 166.62.28.147 | attackbotsspam | [Thu Apr 23 00:50:51 2020] - DDoS Attack From IP: 166.62.28.147 Port: 25 |
2020-04-28 07:39:55 |
| 40.89.172.9 | attack | Apr 27 23:16:47 mout sshd[23683]: Invalid user ark from 40.89.172.9 port 48196 |
2020-04-28 08:05:30 |
| 52.81.7.236 | attackbotsspam | Port probing on unauthorized port 38520 |
2020-04-28 08:10:15 |
| 183.15.181.124 | attackbots | Apr 27 22:09:21 host sshd[2823]: Invalid user unifi from 183.15.181.124 port 43446 ... |
2020-04-28 08:03:27 |
| 192.144.156.68 | attackspambots | SSH brute force |
2020-04-28 08:08:13 |
| 93.174.95.106 | attackspam | [Wed Apr 22 18:56:08 2020] - DDoS Attack From IP: 93.174.95.106 Port: 24858 |
2020-04-28 07:50:16 |
| 91.134.167.64 | attack | [Thu Apr 23 08:21:16 2020] - DDoS Attack From IP: 91.134.167.64 Port: 51619 |
2020-04-28 07:33:23 |
| 209.85.215.193 | attack | Spam from herera.admon7@gmail.com |
2020-04-28 07:39:01 |
| 213.217.0.131 | attack | Apr 28 00:50:18 [host] kernel: [4656803.198371] [U Apr 28 00:54:22 [host] kernel: [4657047.020478] [U Apr 28 01:10:29 [host] kernel: [4658013.815680] [U Apr 28 01:14:57 [host] kernel: [4658281.426009] [U Apr 28 01:32:32 [host] kernel: [4659336.560980] [U Apr 28 01:37:43 [host] kernel: [4659647.892823] [U |
2020-04-28 07:56:24 |
| 92.81.222.217 | attackspam | DATE:2020-04-28 01:32:12, IP:92.81.222.217, PORT:ssh SSH brute force auth (docker-dc) |
2020-04-28 07:35:26 |
| 2.134.50.24 | attack | [portscan] Port scan |
2020-04-28 07:57:38 |
| 187.60.214.234 | attackbotsspam | Apr 28 01:39:56 nextcloud sshd\[7937\]: Invalid user wh from 187.60.214.234 Apr 28 01:39:56 nextcloud sshd\[7937\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.60.214.234 Apr 28 01:39:58 nextcloud sshd\[7937\]: Failed password for invalid user wh from 187.60.214.234 port 45128 ssh2 |
2020-04-28 07:52:47 |
| 61.97.218.31 | attackspambots | 20/4/27@16:09:33: FAIL: Alarm-Telnet address from=61.97.218.31 ... |
2020-04-28 07:53:04 |