城市(city): unknown
省份(region): Iowa
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 216.81.128.0 - 216.81.255.255
CIDR: 216.81.128.0/17
NetName: LIGHTEDGE-BLK-001
NetHandle: NET-216-81-128-0-1
Parent: NET216 (NET-216-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: LightEdge Solutions (LIGHT-41)
RegDate: 1998-09-25
Updated: 2012-02-24
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://rdap.arin.net/registry/ip/216.81.128.0
OrgName: LightEdge Solutions
OrgId: LIGHT-41
Address: 909 Locust Street
Address: Suite 301
City: Des Moines
StateProv: IA
PostalCode: 50309
Country: US
RegDate: 2006-12-28
Updated: 2018-09-13
Ref: https://rdap.arin.net/registry/entity/LIGHT-41
ReferralServer: rwhois://rwhois.lh.net:4321
OrgTechHandle: IL68-ARIN
OrgTechName: LightEdge Hostmaster
OrgTechPhone: +1-515-471-1000
OrgTechEmail: hostmaster@lightedge.com
OrgTechRef: https://rdap.arin.net/registry/entity/IL68-ARIN
OrgNOCHandle: LIGHT71-ARIN
OrgNOCName: LightEdge NOC
OrgNOCPhone: +1-515-471-1000
OrgNOCEmail: support@lightedge.com
OrgNOCRef: https://rdap.arin.net/registry/entity/LIGHT71-ARIN
OrgAbuseHandle: LIGHT7-ARIN
OrgAbuseName: LightEdge Abuse
OrgAbusePhone: +1-515-471-1000
OrgAbuseEmail: abuse@lightedge.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/LIGHT7-ARIN
# end
# start
NetRange: 216.81.248.0 - 216.81.248.255
CIDR: 216.81.248.0/24
NetName: MASSEDCOMPUTE-06
NetHandle: NET-216-81-248-0-1
Parent: LIGHTEDGE-BLK-001 (NET-216-81-128-0-1)
NetType: Reassigned
OriginAS:
Organization: Massed Compute (MCL-2382)
RegDate: 2026-03-09
Updated: 2026-03-09
Comment: https://massedcompute.com/
Ref: https://rdap.arin.net/registry/ip/216.81.248.0
OrgName: Massed Compute
OrgId: MCL-2382
Address: 101 Convention Center Dr., Suite 900
City: Las Vegas
StateProv: NV
PostalCode: 89109
Country: US
RegDate: 2022-08-12
Updated: 2026-02-12
Ref: https://rdap.arin.net/registry/entity/MCL-2382
OrgNOCHandle: TECHN2019-ARIN
OrgNOCName: technical
OrgNOCPhone: +1-316-210-1178
OrgNOCEmail: techadmin@massedcompute.com
OrgNOCRef: https://rdap.arin.net/registry/entity/TECHN2019-ARIN
OrgAbuseHandle: ABUSE9536-ARIN
OrgAbuseName: abuse
OrgAbusePhone: +1-316-210-1178
OrgAbuseEmail: abuse@massedcompute.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE9536-ARIN
OrgTechHandle: TECHN2019-ARIN
OrgTechName: technical
OrgTechPhone: +1-316-210-1178
OrgTechEmail: techadmin@massedcompute.com
OrgTechRef: https://rdap.arin.net/registry/entity/TECHN2019-ARIN
OrgRoutingHandle: TECHN2019-ARIN
OrgRoutingName: technical
OrgRoutingPhone: +1-316-210-1178
OrgRoutingEmail: techadmin@massedcompute.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/TECHN2019-ARIN
OrgDNSHandle: TECHN2019-ARIN
OrgDNSName: technical
OrgDNSPhone: +1-316-210-1178
OrgDNSEmail: techadmin@massedcompute.com
OrgDNSRef: https://rdap.arin.net/registry/entity/TECHN2019-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to rwhois.lh.net:4321.
%rwhois V-1.5 rwhois.lightedge.com (rwhoisd 0.4.1)
network:id:LIGHTEDGE-BLK-001
network:class-name:network
network:network-name:LIGHTEDGE-BLK-001
network:ip-network:216.81.128.0/17
network:org-name:LightEdge Solutions, Inc.
network:street-address:666 Walnut Street
network:city:Des Moines
network:state:IA
network:postal-code:50309
network:country-code:US
network:tech-contact:support@lightedge.com
network:created:20010101
network:updated:20030101
network:updated-by:support@lightedge.com
%ok
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.81.248.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58776
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;216.81.248.41. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040703 1800 900 604800 86400
;; Query time: 4 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 08 09:30:42 CST 2026
;; MSG SIZE rcvd: 106
41.248.81.216.in-addr.arpa domain name pointer ip41.kcy.lh-nap.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
41.248.81.216.in-addr.arpa name = ip41.kcy.lh-nap.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 117.158.220.93 | attackspam | Automatic report - Port Scan |
2019-11-20 00:41:33 |
| 118.24.55.171 | attackspambots | $f2bV_matches |
2019-11-20 00:22:38 |
| 59.94.250.89 | attackspam | Unauthorized connection attempt from IP address 59.94.250.89 on Port 445(SMB) |
2019-11-20 00:53:50 |
| 119.40.103.37 | attackbotsspam | Unauthorized connection attempt from IP address 119.40.103.37 on Port 445(SMB) |
2019-11-20 00:15:40 |
| 103.207.0.150 | attackspam | Unauthorized connection attempt from IP address 103.207.0.150 on Port 445(SMB) |
2019-11-20 00:57:25 |
| 210.51.167.245 | attack | Nov 19 16:53:35 MK-Soft-VM3 sshd[28218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.51.167.245 Nov 19 16:53:37 MK-Soft-VM3 sshd[28218]: Failed password for invalid user michon from 210.51.167.245 port 47032 ssh2 ... |
2019-11-20 00:16:40 |
| 14.254.134.239 | attackbots | Unauthorized connection attempt from IP address 14.254.134.239 on Port 445(SMB) |
2019-11-20 00:43:11 |
| 165.227.157.168 | attack | Nov 19 19:05:00 server sshd\[30349\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.157.168 user=mysql Nov 19 19:05:02 server sshd\[30349\]: Failed password for mysql from 165.227.157.168 port 55090 ssh2 Nov 19 19:22:27 server sshd\[2317\]: Invalid user badrinath from 165.227.157.168 Nov 19 19:22:27 server sshd\[2317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.157.168 Nov 19 19:22:29 server sshd\[2317\]: Failed password for invalid user badrinath from 165.227.157.168 port 50466 ssh2 ... |
2019-11-20 00:54:39 |
| 107.13.186.21 | attack | Nov 19 05:09:23 eddieflores sshd\[18904\]: Invalid user teamspeak3 from 107.13.186.21 Nov 19 05:09:23 eddieflores sshd\[18904\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.13.186.21 Nov 19 05:09:25 eddieflores sshd\[18904\]: Failed password for invalid user teamspeak3 from 107.13.186.21 port 35142 ssh2 Nov 19 05:13:20 eddieflores sshd\[19190\]: Invalid user sherlock from 107.13.186.21 Nov 19 05:13:20 eddieflores sshd\[19190\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.13.186.21 |
2019-11-20 00:48:16 |
| 223.205.239.103 | attack | firewall-block, port(s): 445/tcp |
2019-11-20 00:29:31 |
| 106.13.168.150 | attackspambots | Brute-force attempt banned |
2019-11-20 00:53:25 |
| 14.161.16.32 | attackbotsspam | IMAP brute force ... |
2019-11-20 00:44:48 |
| 148.70.1.210 | attackspambots | Nov 19 16:37:30 sd-53420 sshd\[12066\]: Invalid user zaphod from 148.70.1.210 Nov 19 16:37:30 sd-53420 sshd\[12066\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.1.210 Nov 19 16:37:32 sd-53420 sshd\[12066\]: Failed password for invalid user zaphod from 148.70.1.210 port 56346 ssh2 Nov 19 16:42:42 sd-53420 sshd\[13646\]: Invalid user diangelo from 148.70.1.210 Nov 19 16:42:42 sd-53420 sshd\[13646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.1.210 ... |
2019-11-20 00:34:16 |
| 185.175.93.105 | attackspambots | 185.175.93.105 was recorded 145 times by 35 hosts attempting to connect to the following ports: 6889,4489,4389,9189,2889,3689,6589,4589,2489,2089,10089,8289,6989,6789,3089,9489,3789,1089,9089,2989,6489,3889,5989,9689,2689,6189,8089,8589,9589,9989,5489,4689,5689,5889,8389,8489,6689,7189,8189,8989,4289,5589,1389,3289,6389,2589,4189,2389,3589,4789,3489,1189,5389,1789,6289,2189,9889,5789,4889,7489,9389,7589,1289,1689,1589,2789,4089,5189,1989,5289,7689. Incident counter (4h, 24h, all-time): 145, 306, 8088 |
2019-11-20 00:56:28 |
| 37.49.230.19 | attackspambots | *Port Scan* detected from 37.49.230.19 (NL/Netherlands/-). 4 hits in the last 60 seconds |
2019-11-20 00:18:38 |