城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 216.51.128.0 - 216.51.255.255
CIDR: 216.51.128.0/17
NetName: AUREON-BLK10
NetHandle: NET-216-51-128-0-1
Parent: NET216 (NET-216-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Aureon Network Services (INS-50)
RegDate: 2001-02-14
Updated: 2016-06-02
Ref: https://rdap.arin.net/registry/ip/216.51.128.0
OrgName: Aureon Network Services
OrgId: INS-50
Address: 7760 Office Plaza Drive South
City: West Des Moines
StateProv: IA
PostalCode: 50266
Country: US
RegDate: 1995-06-05
Updated: 2016-06-14
Ref: https://rdap.arin.net/registry/entity/INS-50
OrgTechHandle: INS-NOC-ARIN
OrgTechName: netINS Network Operations Center
OrgTechPhone: +1-800-205-1110
OrgTechEmail: will.hughes@aureon.com
OrgTechRef: https://rdap.arin.net/registry/entity/INS-NOC-ARIN
OrgNOCHandle: INS-NOC-ARIN
OrgNOCName: netINS Network Operations Center
OrgNOCPhone: +1-800-205-1110
OrgNOCEmail: will.hughes@aureon.com
OrgNOCRef: https://rdap.arin.net/registry/entity/INS-NOC-ARIN
OrgAbuseHandle: NNOC17-ARIN
OrgAbuseName: netINS Network Operations Center
OrgAbusePhone: +1-515-830-0345
OrgAbuseEmail: abuse@netins.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/NNOC17-ARIN
# end
# start
NetRange: 216.51.144.0 - 216.51.144.255
CIDR: 216.51.144.0/24
NetName: NET-216-51-144-0-24
NetHandle: NET-216-51-144-0-1
Parent: AUREON-BLK10 (NET-216-51-128-0-1)
NetType: Reassigned
OriginAS:
Organization: Comm1 (CNL-66)
RegDate: 2016-02-17
Updated: 2016-02-17
Ref: https://rdap.arin.net/registry/ip/216.51.144.0
OrgName: Comm1
OrgId: CNL-66
Address: 105 S Main
City: Kanawha
StateProv: IA
PostalCode: 50447
Country: US
RegDate: 2015-12-03
Updated: 2024-11-25
Comment: http://www.comm1net.net/
Ref: https://rdap.arin.net/registry/entity/CNL-66
OrgAbuseHandle: KEIPE-ARIN
OrgAbuseName: Keiper, Jayson
OrgAbusePhone: +1-641-762-3772
OrgAbuseEmail: jkeiper@comm1net.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/KEIPE-ARIN
OrgTechHandle: KEIPE-ARIN
OrgTechName: Keiper, Jayson
OrgTechPhone: +1-641-762-3772
OrgTechEmail: jkeiper@comm1net.net
OrgTechRef: https://rdap.arin.net/registry/entity/KEIPE-ARIN
OrgTechHandle: VNC2-ARIN
OrgTechName: VantagePoint Networking Consultants
OrgTechPhone: +1-605-995-1777
OrgTechEmail: arin@vantagepnt.com
OrgTechRef: https://rdap.arin.net/registry/entity/VNC2-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.51.144.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29589
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;216.51.144.105. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026033000 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 16:14:24 CST 2026
;; MSG SIZE rcvd: 107
105.144.51.216.in-addr.arpa domain name pointer com1-60-216-51-144-105.dsl.netins.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
105.144.51.216.in-addr.arpa name = com1-60-216-51-144-105.dsl.netins.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 37.176.23.239 | attackspambots | 61672/udp [2020-03-16]1pkt |
2020-03-17 11:14:40 |
| 207.148.109.214 | attackspam | Wordpress Admin Login attack |
2020-03-17 11:32:39 |
| 180.125.154.17 | attack | 81/tcp 81/tcp [2020-03-16]2pkt |
2020-03-17 11:25:14 |
| 27.2.9.19 | attackbots | 23/tcp [2020-03-16]1pkt |
2020-03-17 11:04:46 |
| 185.151.242.186 | attackbots | Mar 16 23:48:06 src: 185.151.242.186 signature match: "MISC MS Terminal Server communication attempt" (sid: 100077) tcp port: 3389 |
2020-03-17 10:54:29 |
| 117.7.96.238 | attackbotsspam | 445/tcp [2020-03-16]1pkt |
2020-03-17 11:09:18 |
| 212.64.127.106 | attackbotsspam | Mar 17 00:27:36 haigwepa sshd[26420]: Failed password for root from 212.64.127.106 port 60287 ssh2 ... |
2020-03-17 11:09:55 |
| 49.88.112.55 | attackspambots | sshd jail - ssh hack attempt |
2020-03-17 11:27:14 |
| 121.227.42.229 | attackspam | 26/tcp [2020-03-16]1pkt |
2020-03-17 11:00:23 |
| 206.189.146.232 | attack | xmlrpc attack |
2020-03-17 11:34:57 |
| 210.7.2.48 | attackbotsspam | 8080/tcp [2020-03-16]1pkt |
2020-03-17 11:20:10 |
| 106.111.105.181 | attackbots | 26/tcp [2020-03-16]1pkt |
2020-03-17 11:18:56 |
| 116.110.25.170 | attackspambots | 23/tcp [2020-03-16]1pkt |
2020-03-17 10:55:41 |
| 59.13.246.39 | attack | Automatic report - Port Scan Attack |
2020-03-17 11:10:41 |
| 43.240.11.77 | attackbots | 23/tcp [2020-03-16]1pkt |
2020-03-17 11:20:46 |