城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 204.12.192.0 - 204.12.255.255
CIDR: 204.12.192.0/18
NetName: WII-NET-204-12
NetHandle: NET-204-12-192-0-1
Parent: NET204 (NET-204-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: WholeSale Internet, Inc. (WHOLE-125)
RegDate: 2009-06-08
Updated: 2018-04-10
Comment: http://www.wholesaleinternet.net
Ref: https://rdap.arin.net/registry/ip/204.12.192.0
OrgName: WholeSale Internet, Inc.
OrgId: WHOLE-125
Address: 201 East 16th Ave
City: North Kansas City
StateProv: MO
PostalCode: 64116
Country: US
RegDate: 2003-09-24
Updated: 2023-10-27
Comment: http://www.wholesaleinternet.net
Ref: https://rdap.arin.net/registry/entity/WHOLE-125
OrgAbuseHandle: NETWO1111-ARIN
OrgAbuseName: Network Security
OrgAbusePhone: +1-816-256-3031
OrgAbuseEmail: abuse@nocix.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/NETWO1111-ARIN
OrgTechHandle: AWE13-ARIN
OrgTechName: Wendel, Aaron
OrgTechPhone: +1-816-256-3031
OrgTechEmail: aaron@nocix.net
OrgTechRef: https://rdap.arin.net/registry/entity/AWE13-ARIN
OrgTechHandle: KRH22-ARIN
OrgTechName: HODLE, Kevin Robert
OrgTechPhone: +1-816-256-3031
OrgTechEmail: kevin@wholesaleinternet.net
OrgTechRef: https://rdap.arin.net/registry/entity/KRH22-ARIN
OrgTechHandle: KAISE102-ARIN
OrgTechName: kaiser, rebecca
OrgTechPhone: +1-816-256-3031
OrgTechEmail: rebecca@nocix.net
OrgTechRef: https://rdap.arin.net/registry/entity/KAISE102-ARIN
OrgTechHandle: REGIO-ARIN
OrgTechName: Region, Bob
OrgTechPhone: +1-816-256-3031
OrgTechEmail: bob@wholesaleinternet.net
OrgTechRef: https://rdap.arin.net/registry/entity/REGIO-ARIN
RNOCHandle: NETWO1112-ARIN
RNOCName: Network Operations
RNOCPhone: +1-816-256-3031
RNOCEmail: admin@wholesaleinternet.net
RNOCRef: https://rdap.arin.net/registry/entity/NETWO1112-ARIN
RAbuseHandle: NETWO1111-ARIN
RAbuseName: Network Security
RAbusePhone: +1-816-256-3031
RAbuseEmail: abuse@nocix.net
RAbuseRef: https://rdap.arin.net/registry/entity/NETWO1111-ARIN
RTechHandle: NETWO1112-ARIN
RTechName: Network Operations
RTechPhone: +1-816-256-3031
RTechEmail: admin@wholesaleinternet.net
RTechRef: https://rdap.arin.net/registry/entity/NETWO1112-ARIN
# end
# start
NetRange: 204.12.247.112 - 204.12.247.119
CIDR: 204.12.247.112/29
NetName: DS-204-12-247-113-119
NetHandle: NET-204-12-247-112-1
Parent: WII-NET-204-12 (NET-204-12-192-0-1)
NetType: Reassigned
OriginAS:
Customer: Vital Network Group, LLC (C11026717)
RegDate: 2024-11-26
Updated: 2024-11-26
Ref: https://rdap.arin.net/registry/ip/204.12.247.112
CustName: Vital Network Group, LLC
Address: 201 E. 16th st
City: North Kansas City
StateProv: MO
PostalCode: 64116
Country: US
RegDate: 2024-11-26
Updated: 2024-11-26
Ref: https://rdap.arin.net/registry/entity/C11026717
OrgAbuseHandle: NETWO1111-ARIN
OrgAbuseName: Network Security
OrgAbusePhone: +1-816-256-3031
OrgAbuseEmail: abuse@nocix.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/NETWO1111-ARIN
OrgTechHandle: AWE13-ARIN
OrgTechName: Wendel, Aaron
OrgTechPhone: +1-816-256-3031
OrgTechEmail: aaron@nocix.net
OrgTechRef: https://rdap.arin.net/registry/entity/AWE13-ARIN
OrgTechHandle: KRH22-ARIN
OrgTechName: HODLE, Kevin Robert
OrgTechPhone: +1-816-256-3031
OrgTechEmail: kevin@wholesaleinternet.net
OrgTechRef: https://rdap.arin.net/registry/entity/KRH22-ARIN
OrgTechHandle: KAISE102-ARIN
OrgTechName: kaiser, rebecca
OrgTechPhone: +1-816-256-3031
OrgTechEmail: rebecca@nocix.net
OrgTechRef: https://rdap.arin.net/registry/entity/KAISE102-ARIN
OrgTechHandle: REGIO-ARIN
OrgTechName: Region, Bob
OrgTechPhone: +1-816-256-3031
OrgTechEmail: bob@wholesaleinternet.net
OrgTechRef: https://rdap.arin.net/registry/entity/REGIO-ARIN
RNOCHandle: NETWO1112-ARIN
RNOCName: Network Operations
RNOCPhone: +1-816-256-3031
RNOCEmail: admin@wholesaleinternet.net
RNOCRef: https://rdap.arin.net/registry/entity/NETWO1112-ARIN
RAbuseHandle: NETWO1111-ARIN
RAbuseName: Network Security
RAbusePhone: +1-816-256-3031
RAbuseEmail: abuse@nocix.net
RAbuseRef: https://rdap.arin.net/registry/entity/NETWO1111-ARIN
RTechHandle: NETWO1112-ARIN
RTechName: Network Operations
RTechPhone: +1-816-256-3031
RTechEmail: admin@wholesaleinternet.net
RTechRef: https://rdap.arin.net/registry/entity/NETWO1112-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 204.12.247.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26057
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;204.12.247.112. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032901 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 10:27:00 CST 2026
;; MSG SIZE rcvd: 107
Host 112.247.12.204.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 112.247.12.204.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 185.202.1.98 | attackspam | IP 185.202.1.98 attacked honeypot on port: 1434 at 9/17/2020 9:55:08 AM |
2020-09-18 19:15:17 |
| 181.129.145.235 | attack | Unauthorized connection attempt from IP address 181.129.145.235 on Port 445(SMB) |
2020-09-18 19:50:45 |
| 223.190.33.238 | attack | 20/9/18@05:42:09: FAIL: Alarm-Network address from=223.190.33.238 ... |
2020-09-18 19:52:17 |
| 195.123.239.36 | attack | 2020-09-18T09:04:15.189439abusebot-3.cloudsearch.cf sshd[8979]: Invalid user at from 195.123.239.36 port 58466 2020-09-18T09:04:15.197000abusebot-3.cloudsearch.cf sshd[8979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.123.239.36 2020-09-18T09:04:15.189439abusebot-3.cloudsearch.cf sshd[8979]: Invalid user at from 195.123.239.36 port 58466 2020-09-18T09:04:16.967023abusebot-3.cloudsearch.cf sshd[8979]: Failed password for invalid user at from 195.123.239.36 port 58466 ssh2 2020-09-18T09:08:29.223799abusebot-3.cloudsearch.cf sshd[8993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.123.239.36 user=root 2020-09-18T09:08:30.531943abusebot-3.cloudsearch.cf sshd[8993]: Failed password for root from 195.123.239.36 port 42538 ssh2 2020-09-18T09:12:42.047057abusebot-3.cloudsearch.cf sshd[9056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.123.239.36 user ... |
2020-09-18 19:27:56 |
| 43.229.153.13 | attackspam | IP blocked |
2020-09-18 19:17:19 |
| 190.104.235.8 | attackspambots | Sep 18 13:08:01 abendstille sshd\[29820\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.104.235.8 user=root Sep 18 13:08:03 abendstille sshd\[29820\]: Failed password for root from 190.104.235.8 port 45414 ssh2 Sep 18 13:12:15 abendstille sshd\[1551\]: Invalid user masterjay from 190.104.235.8 Sep 18 13:12:15 abendstille sshd\[1551\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.104.235.8 Sep 18 13:12:17 abendstille sshd\[1551\]: Failed password for invalid user masterjay from 190.104.235.8 port 46227 ssh2 ... |
2020-09-18 19:21:38 |
| 119.45.129.210 | attackbotsspam | Sep 18 11:05:41 scw-tender-jepsen sshd[5623]: Failed password for root from 119.45.129.210 port 56262 ssh2 |
2020-09-18 19:26:49 |
| 79.137.34.248 | attackbots | Sep 18 12:34:49 sip sshd[15534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.34.248 Sep 18 12:34:51 sip sshd[15534]: Failed password for invalid user service from 79.137.34.248 port 39782 ssh2 Sep 18 12:48:58 sip sshd[19301]: Failed password for root from 79.137.34.248 port 46629 ssh2 |
2020-09-18 19:18:47 |
| 119.28.53.199 | attackbotsspam | Sep 18 09:35:38 scw-focused-cartwright sshd[20120]: Failed password for root from 119.28.53.199 port 48252 ssh2 |
2020-09-18 19:38:54 |
| 78.96.147.168 | attack | Automatic report - Port Scan Attack |
2020-09-18 19:13:21 |
| 168.0.148.174 | attackbotsspam | Unauthorized connection attempt from IP address 168.0.148.174 on Port 445(SMB) |
2020-09-18 19:49:38 |
| 168.205.124.246 | attackspambots | Sep 16 21:08:30 : SSH login attempts with invalid user |
2020-09-18 19:37:00 |
| 31.210.253.81 | attackbotsspam | Unauthorized connection attempt from IP address 31.210.253.81 on Port 445(SMB) |
2020-09-18 19:47:25 |
| 106.54.194.77 | attackbotsspam | Sep 18 13:10:31 ip106 sshd[2043]: Failed password for root from 106.54.194.77 port 55904 ssh2 ... |
2020-09-18 19:43:22 |
| 222.221.91.153 | attack | port scan and connect, tcp 23 (telnet) |
2020-09-18 19:30:33 |