城市(city): Guadalajara
省份(region): Jalisco
国家(country): Mexico
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 207.248.0.0 - 207.249.255.255
CIDR: 207.248.0.0/15
NetName: LACNIC-207-248-0-0
NetHandle: NET-207-248-0-0-1
Parent: NET207 (NET-207-0-0-0-0)
NetType: Transferred to LACNIC
OriginAS:
Organization: Latin American and Caribbean IP address Regional Registry (LACNIC)
RegDate: 2003-05-13
Updated: 2007-12-17
Comment: This IP address range is under LACNIC responsibility for further
Comment: allocations to users in LACNIC region.
Comment: Please see http://www.lacnic.net/ for further details, or check the
Comment: WHOIS server located at http://whois.lacnic.net
Ref: https://rdap.arin.net/registry/ip/207.248.0.0
ResourceLink: http://lacnic.net/cgi-bin/lacnic/whois
ResourceLink: whois.lacnic.net
OrgName: Latin American and Caribbean IP address Regional Registry
OrgId: LACNIC
Address: Rambla Republica de Mexico 6125
City: Montevideo
StateProv:
PostalCode: 11400
Country: UY
RegDate: 2002-07-27
Updated: 2018-03-15
Ref: https://rdap.arin.net/registry/entity/LACNIC
ReferralServer: whois://whois.lacnic.net
ResourceLink: http://lacnic.net/cgi-bin/lacnic/whois
OrgTechHandle: LACNIC-ARIN
OrgTechName: LACNIC Whois Info
OrgTechPhone: +598-2604-2222
OrgTechEmail: whois-contact@lacnic.net
OrgTechRef: https://rdap.arin.net/registry/entity/LACNIC-ARIN
OrgAbuseHandle: LWI100-ARIN
OrgAbuseName: LACNIC Whois Info
OrgAbusePhone: +598-2604-2222
OrgAbuseEmail: abuse@lacnic.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/LWI100-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.lacnic.net.
% IP Client: 124.223.158.242
% Joint Whois - whois.lacnic.net
% This server accepts single ASN, IPv4 or IPv6 queries
% LACNIC resource: whois.lacnic.net
% Copyright LACNIC lacnic.net
% The data below is provided for information purposes
% and to assist persons in obtaining information about or
% related to AS and IP numbers registrations
% By submitting a whois query, you agree to use this data
% only for lawful purposes.
% 2026-04-23 14:35:26 (-03 -03:00)
inetnum: 207.249.224.0/19
status: assigned
aut-num: AS2549
owner: Universidad de Guadalajara
ownerid: MX-UNGU4-LACNIC
responsible: No hay informacion
address: Av. Juárez, 976, Zona Centro
address: 44100 - Guadalajara - ja
country: MX
phone: +52 3331342222 [12204]
owner-c: UNG
tech-c: UNG
abuse-c: UNG
inetrev: 207.249.224.0/19
nserver: LEON.DCA.UDG.MX
nsstat: 20260421 AA
nslastaa: 20260421
nserver: LEON2.NS.UDG.MX
nsstat: 20260421 AA
nslastaa: 20260421
created: 20090122
changed: 20120901
nic-hdl: UNG
person: Universidad de Guadalajara
e-mail: abuse@noc.udg.mx
address: Av. Juarez,, 976, Zona Centro
address: 44100 - Guadalajara - Ja
country: MX
phone: +52 3331342222 [12242]
created: 20040825
changed: 20130731
% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 207.249.232.84
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22328
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;207.249.232.84. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042300 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 24 01:35:26 CST 2026
;; MSG SIZE rcvd: 107
b'84.232.249.207.in-addr.arpa domain name pointer 84-232-249-207.net.udg.mx.
'
b'84.232.249.207.in-addr.arpa name = 84-232-249-207.net.udg.mx.
Authoritative answers can be found from:
'
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 119.130.105.214 | attackspambots | Automatic report - Port Scan Attack |
2019-08-13 02:00:15 |
| 187.35.54.17 | attack | Telnet Server BruteForce Attack |
2019-08-13 02:11:27 |
| 23.129.64.185 | attackspam | detected by Fail2Ban |
2019-08-13 02:11:05 |
| 157.230.177.88 | attackbots | $f2bV_matches |
2019-08-13 01:55:10 |
| 86.242.39.179 | attack | Aug 12 19:30:34 * sshd[8034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.242.39.179 Aug 12 19:30:36 * sshd[8034]: Failed password for invalid user halflife from 86.242.39.179 port 57182 ssh2 |
2019-08-13 02:29:33 |
| 206.189.153.178 | attackspambots | Aug 12 07:13:57 dallas01 sshd[24162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.153.178 Aug 12 07:13:59 dallas01 sshd[24162]: Failed password for invalid user sandie from 206.189.153.178 port 45824 ssh2 Aug 12 07:18:47 dallas01 sshd[24961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.153.178 |
2019-08-13 02:01:09 |
| 88.119.198.17 | attackbots | port scan and connect, tcp 23 (telnet) |
2019-08-13 02:00:49 |
| 207.46.13.88 | attackspam | Automatic report - Banned IP Access |
2019-08-13 02:16:50 |
| 69.130.120.228 | attack | SPAM Delivery Attempt |
2019-08-13 02:33:18 |
| 202.75.251.3 | attack | REQUESTED PAGE: /phpMyAdmin |
2019-08-13 02:27:16 |
| 193.70.87.215 | attackbotsspam | 2019-08-12T18:13:24.284565abusebot-8.cloudsearch.cf sshd\[29590\]: Invalid user bouncerke from 193.70.87.215 port 55978 |
2019-08-13 02:19:59 |
| 195.206.105.217 | attack | Aug 12 20:08:47 meumeu sshd[25251]: error: maximum authentication attempts exceeded for root from 195.206.105.217 port 40402 ssh2 [preauth] Aug 12 20:08:53 meumeu sshd[25275]: error: maximum authentication attempts exceeded for root from 195.206.105.217 port 49766 ssh2 [preauth] ... |
2019-08-13 02:10:19 |
| 221.160.100.14 | attackbotsspam | Triggered by Fail2Ban at Vostok web server |
2019-08-13 01:59:37 |
| 58.153.51.174 | attack | ssh failed login |
2019-08-13 02:25:16 |
| 175.124.43.123 | attack | Aug 12 20:11:10 rpi sshd[15297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.124.43.123 Aug 12 20:11:12 rpi sshd[15297]: Failed password for invalid user kms from 175.124.43.123 port 37840 ssh2 |
2019-08-13 02:14:37 |