城市(city): Los Angeles
省份(region): California
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 208.80.248.0 - 208.80.251.255
CIDR: 208.80.248.0/22
NetName: CDNETWORKSUS-01
NetHandle: NET-208-80-248-0-1
Parent: NET208 (NET-208-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: CDNetworks Inc. (CDNET)
RegDate: 2007-08-03
Updated: 2021-12-14
Comment: Any abuse related problem, please contact sod@cdnetworks.com
Ref: https://rdap.arin.net/registry/ip/208.80.248.0
OrgName: CDNetworks Inc.
OrgId: CDNET
Address: 1550 Valley Vista Dr., Suite 110
City: Diamond Bar
StateProv: CA
PostalCode: 91765
Country: US
RegDate: 2007-01-05
Updated: 2020-01-22
Ref: https://rdap.arin.net/registry/entity/CDNET
OrgTechHandle: NOCAN2-ARIN
OrgTechName: NOC and TroubleShooting
OrgTechPhone: +1-877-937-4236
OrgTechEmail: netops@cdnetworks.com
OrgTechRef: https://rdap.arin.net/registry/entity/NOCAN2-ARIN
OrgNOCHandle: NOCAN2-ARIN
OrgNOCName: NOC and TroubleShooting
OrgNOCPhone: +1-877-937-4236
OrgNOCEmail: netops@cdnetworks.com
OrgNOCRef: https://rdap.arin.net/registry/entity/NOCAN2-ARIN
OrgAbuseHandle: IAA24-ARIN
OrgAbuseName: IP Addressing Abuse
OrgAbusePhone: +1-877-937-4236
OrgAbuseEmail: ABUSE@cdnetworks.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/IAA24-ARIN
RAbuseHandle: IAA24-ARIN
RAbuseName: IP Addressing Abuse
RAbusePhone: +1-877-937-4236
RAbuseEmail: ABUSE@cdnetworks.com
RAbuseRef: https://rdap.arin.net/registry/entity/IAA24-ARIN
RTechHandle: NOCAN2-ARIN
RTechName: NOC and TroubleShooting
RTechPhone: +1-877-937-4236
RTechEmail: netops@cdnetworks.com
RTechRef: https://rdap.arin.net/registry/entity/NOCAN2-ARIN
RNOCHandle: NOCAN2-ARIN
RNOCName: NOC and TroubleShooting
RNOCPhone: +1-877-937-4236
RNOCEmail: netops@cdnetworks.com
RNOCRef: https://rdap.arin.net/registry/entity/NOCAN2-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 208.80.248.225
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21475
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;208.80.248.225. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041201 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 13 14:39:54 CST 2026
;; MSG SIZE rcvd: 107
b'Host 225.248.80.208.in-addr.arpa not found: 2(SERVFAIL)
'
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 225.248.80.208.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 42.118.242.189 | attack | Unauthorized connection attempt detected from IP address 42.118.242.189 to port 2220 [J] |
2020-01-25 17:55:16 |
| 14.162.92.20 | attackbots | Unauthorized connection attempt detected from IP address 14.162.92.20 to port 88 [J] |
2020-01-25 17:57:56 |
| 112.112.114.133 | attackbots | Unauthorized connection attempt detected from IP address 112.112.114.133 to port 5555 [J] |
2020-01-25 17:45:22 |
| 45.10.175.13 | attack | Unauthorized connection attempt detected from IP address 45.10.175.13 to port 80 [J] |
2020-01-25 17:54:41 |
| 140.143.17.156 | attackspambots | Unauthorized connection attempt detected from IP address 140.143.17.156 to port 2220 [J] |
2020-01-25 17:43:41 |
| 122.51.219.2 | attack | Unauthorized connection attempt detected from IP address 122.51.219.2 to port 2220 [J] |
2020-01-25 18:12:13 |
| 160.20.253.19 | attackbots | Unauthorized connection attempt detected from IP address 160.20.253.19 to port 1433 [J] |
2020-01-25 17:42:45 |
| 192.241.133.33 | attackspambots | Unauthorized connection attempt detected from IP address 192.241.133.33 to port 2220 [J] |
2020-01-25 17:37:10 |
| 151.234.47.42 | attackbotsspam | Unauthorized connection attempt detected from IP address 151.234.47.42 to port 8080 [J] |
2020-01-25 18:09:23 |
| 122.191.100.14 | attack | Unauthorized connection attempt detected from IP address 122.191.100.14 to port 1433 [J] |
2020-01-25 18:11:30 |
| 176.106.162.202 | attackbots | Unauthorized connection attempt detected from IP address 176.106.162.202 to port 4567 [J] |
2020-01-25 18:07:17 |
| 167.114.152.25 | attack | Automatic report - SSH Brute-Force Attack |
2020-01-25 17:33:42 |
| 49.51.12.179 | attackspam | Unauthorized connection attempt detected from IP address 49.51.12.179 to port 7788 [J] |
2020-01-25 17:53:55 |
| 196.47.67.180 | attackspambots | Jan 24 21:34:09 home sshd[25193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.47.67.180 user=root Jan 24 21:34:11 home sshd[25193]: Failed password for root from 196.47.67.180 port 44092 ssh2 Jan 24 21:51:32 home sshd[25493]: Invalid user adam from 196.47.67.180 port 52605 Jan 24 21:51:32 home sshd[25493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.47.67.180 Jan 24 21:51:32 home sshd[25493]: Invalid user adam from 196.47.67.180 port 52605 Jan 24 21:51:34 home sshd[25493]: Failed password for invalid user adam from 196.47.67.180 port 52605 ssh2 Jan 24 21:59:48 home sshd[25646]: Invalid user billy from 196.47.67.180 port 39182 Jan 24 21:59:48 home sshd[25646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.47.67.180 Jan 24 21:59:48 home sshd[25646]: Invalid user billy from 196.47.67.180 port 39182 Jan 24 21:59:50 home sshd[25646]: Failed password for invalid user billy f |
2020-01-25 18:02:15 |
| 191.5.252.218 | attackspambots | unauthorized connection attempt |
2020-01-25 18:02:47 |