城市(city): Los Angeles
省份(region): California
国家(country): United States
运营商(isp): Softcom Internet Communications, Inc
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 69.63.192.0 - 69.63.223.255
CIDR: 69.63.192.0/19
NetName: VOLONET-1
NetHandle: NET-69-63-192-0-1
Parent: NET69 (NET-69-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: VoloNet Technologies, Inc (VOLO)
RegDate: 2003-07-25
Updated: 2012-03-02
Ref: https://rdap.arin.net/registry/ip/69.63.192.0
OrgName: VoloNet Technologies, Inc
OrgId: VOLO
Address: 14800 Landmark
Address: Suite 500
City: Dallas
StateProv: TX
PostalCode: 75254
Country: US
RegDate: 2000-11-15
Updated: 2025-11-10
Comment: http://www.redwire.net
Ref: https://rdap.arin.net/registry/entity/VOLO
OrgTechHandle: GIT5-ARIN
OrgTechName: GTT IPAM Team
OrgTechPhone: +1-703-442-5500
OrgTechEmail: netguard@gtt.net
OrgTechRef: https://rdap.arin.net/registry/entity/GIT5-ARIN
OrgAbuseHandle: GAD46-ARIN
OrgAbuseName: GTT Abuse Department
OrgAbusePhone: +1-703-442-5501
OrgAbuseEmail: abuse@gtt.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/GAD46-ARIN
OrgNOCHandle: VA66-ARIN
OrgNOCName: RedWire Broadband, Network Operations Center
OrgNOCPhone: +1-858-244-9040
OrgNOCEmail: noc@airband.com
OrgNOCRef: https://rdap.arin.net/registry/entity/VA66-ARIN
OrgTechHandle: AS3251-ARIN
OrgTechName: AS3257 Netguard
OrgTechPhone: +49 69 48007422
OrgTechEmail: netguard@gtt.net
OrgTechRef: https://rdap.arin.net/registry/entity/AS3251-ARIN
RAbuseHandle: VA66-ARIN
RAbuseName: RedWire Broadband, Network Operations Center
RAbusePhone: +1-858-244-9040
RAbuseEmail: noc@airband.com
RAbuseRef: https://rdap.arin.net/registry/entity/VA66-ARIN
RTechHandle: VA66-ARIN
RTechName: RedWire Broadband, Network Operations Center
RTechPhone: +1-858-244-9040
RTechEmail: noc@airband.com
RTechRef: https://rdap.arin.net/registry/entity/VA66-ARIN
RNOCHandle: VA66-ARIN
RNOCName: RedWire Broadband, Network Operations Center
RNOCPhone: +1-858-244-9040
RNOCEmail: noc@airband.com
RNOCRef: https://rdap.arin.net/registry/entity/VA66-ARIN
# end
# start
NetRange: 69.63.192.0 - 69.63.207.255
CIDR: 69.63.192.0/20
NetName: DMIT-GTT
NetHandle: NET-69-63-192-0-2
Parent: VOLONET-1 (NET-69-63-192-0-1)
NetType: Reallocated
OriginAS:
Organization: DMIT Cloud Services (DMITI)
RegDate: 2025-11-21
Updated: 2025-11-21
Ref: https://rdap.arin.net/registry/ip/69.63.192.0
OrgName: DMIT Cloud Services
OrgId: DMITI
Address: 418 Broadway Ste N
City: Albany
StateProv: NY
PostalCode: 12207
Country: US
RegDate: 2018-01-08
Updated: 2026-01-27
Ref: https://rdap.arin.net/registry/entity/DMITI
OrgTechHandle: NOC32817-ARIN
OrgTechName: Network Operations Center
OrgTechPhone: +1-518-992-0595
OrgTechEmail: noc@dmit.com
OrgTechRef: https://rdap.arin.net/registry/entity/NOC32817-ARIN
OrgAbuseHandle: ABUSE7106-ARIN
OrgAbuseName: Abuse Department
OrgAbusePhone: +1-518-992-0595
OrgAbuseEmail: abuse@dmit.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE7106-ARIN
OrgNOCHandle: NOC32817-ARIN
OrgNOCName: Network Operations Center
OrgNOCPhone: +1-518-992-0595
OrgNOCEmail: noc@dmit.com
OrgNOCRef: https://rdap.arin.net/registry/entity/NOC32817-ARIN
# end
# start
NetRange: 69.63.198.0 - 69.63.198.255
CIDR: 69.63.198.0/24
NetName: DMIT-CUSTOMER-US-CA-90017
NetHandle: NET-69-63-198-0-1
Parent: DMIT-GTT (NET-69-63-192-0-2)
NetType: Reassigned
OriginAS:
Customer: Private Customer (C11493290)
RegDate: 2026-01-29
Updated: 2026-01-29
Comment: Geofeed http://noc.dmit.com/dns/ipgeo
Ref: https://rdap.arin.net/registry/ip/69.63.198.0
CustName: Private Customer
Address: Private Residence
City: Los Angeles
StateProv: CA
PostalCode: 90017
Country: US
RegDate: 2026-01-29
Updated: 2026-01-29
Ref: https://rdap.arin.net/registry/entity/C11493290
OrgTechHandle: NOC32817-ARIN
OrgTechName: Network Operations Center
OrgTechPhone: +1-518-992-0595
OrgTechEmail: noc@dmit.com
OrgTechRef: https://rdap.arin.net/registry/entity/NOC32817-ARIN
OrgAbuseHandle: ABUSE7106-ARIN
OrgAbuseName: Abuse Department
OrgAbusePhone: +1-518-992-0595
OrgAbuseEmail: abuse@dmit.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE7106-ARIN
OrgNOCHandle: NOC32817-ARIN
OrgNOCName: Network Operations Center
OrgNOCPhone: +1-518-992-0595
OrgNOCEmail: noc@dmit.com
OrgNOCRef: https://rdap.arin.net/registry/entity/NOC32817-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 69.63.198.97
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28113
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;69.63.198.97. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026050200 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 02 22:22:15 CST 2026
;; MSG SIZE rcvd: 105
97.198.63.69.in-addr.arpa domain name pointer Host-By.DMIT.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
97.198.63.69.in-addr.arpa name = Host-By.DMIT.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 91.134.173.100 | attackbots | Invalid user risk from 91.134.173.100 port 46618 |
2020-07-31 15:17:52 |
| 222.186.175.216 | attackbotsspam | Jul 31 09:41:08 vps639187 sshd\[3483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216 user=root Jul 31 09:41:10 vps639187 sshd\[3483\]: Failed password for root from 222.186.175.216 port 52592 ssh2 Jul 31 09:41:14 vps639187 sshd\[3483\]: Failed password for root from 222.186.175.216 port 52592 ssh2 ... |
2020-07-31 15:42:10 |
| 220.158.148.132 | attackspambots | Jul 31 06:54:20 minden010 sshd[5254]: Failed password for root from 220.158.148.132 port 49762 ssh2 Jul 31 06:59:09 minden010 sshd[7221]: Failed password for root from 220.158.148.132 port 55446 ssh2 ... |
2020-07-31 15:23:40 |
| 192.35.169.41 | attack |
|
2020-07-31 15:56:45 |
| 124.156.50.129 | attackspambots | Unauthorized connection attempt detected from IP address 124.156.50.129 to port 8010 |
2020-07-31 15:37:07 |
| 218.92.0.171 | attackbotsspam | Automatic report BANNED IP |
2020-07-31 15:38:53 |
| 205.209.166.106 | attack | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 62 |
2020-07-31 15:18:26 |
| 120.86.127.45 | attackspambots | Invalid user zhusengbin from 120.86.127.45 port 52474 |
2020-07-31 15:47:47 |
| 194.26.25.81 | attackspam | Jul 31 09:03:35 debian-2gb-nbg1-2 kernel: \[18437502.425739\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.25.81 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=63891 PROTO=TCP SPT=52393 DPT=8302 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-07-31 15:51:36 |
| 155.133.132.66 | attack | (ftpd) Failed FTP login from 155.133.132.66 (FR/France/gw3.sd3.gpaas.net): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jul 31 08:22:02 ir1 pure-ftpd: (?@155.133.132.66) [WARNING] Authentication failed for user [atlaspumpsepahan] |
2020-07-31 15:57:12 |
| 128.14.141.102 | attack | Unauthorized connection attempt detected from IP address 128.14.141.102 to port 1935 |
2020-07-31 15:27:53 |
| 46.35.19.18 | attack | Invalid user autobacs from 46.35.19.18 port 49108 |
2020-07-31 15:43:09 |
| 62.234.15.136 | attackbotsspam | Invalid user cuichunlai from 62.234.15.136 port 43620 |
2020-07-31 15:29:32 |
| 181.40.73.86 | attackspam | 2020-07-31T09:15:48+0200 Failed SSH Authentication/Brute Force Attack. (Server 9) |
2020-07-31 15:49:01 |
| 123.13.28.6 | attack | Unauthorised access (Jul 31) SRC=123.13.28.6 LEN=40 TTL=46 ID=65170 TCP DPT=8080 WINDOW=5685 SYN |
2020-07-31 15:46:26 |