必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Los Angeles

省份(region): California

国家(country): United States

运营商(isp): Softcom Internet Communications, Inc

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       69.63.192.0 - 69.63.223.255
CIDR:           69.63.192.0/19
NetName:        VOLONET-1
NetHandle:      NET-69-63-192-0-1
Parent:         NET69 (NET-69-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   VoloNet Technologies, Inc (VOLO)
RegDate:        2003-07-25
Updated:        2012-03-02
Ref:            https://rdap.arin.net/registry/ip/69.63.192.0


OrgName:        VoloNet Technologies, Inc
OrgId:          VOLO
Address:        14800 Landmark
Address:        Suite 500
City:           Dallas
StateProv:      TX
PostalCode:     75254
Country:        US
RegDate:        2000-11-15
Updated:        2025-11-10
Comment:        http://www.redwire.net
Ref:            https://rdap.arin.net/registry/entity/VOLO


OrgTechHandle: GIT5-ARIN
OrgTechName:   GTT IPAM Team
OrgTechPhone:  +1-703-442-5500 
OrgTechEmail:  netguard@gtt.net
OrgTechRef:    https://rdap.arin.net/registry/entity/GIT5-ARIN

OrgAbuseHandle: GAD46-ARIN
OrgAbuseName:   GTT Abuse Department
OrgAbusePhone:  +1-703-442-5501 
OrgAbuseEmail:  abuse@gtt.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/GAD46-ARIN

OrgNOCHandle: VA66-ARIN
OrgNOCName:   RedWire Broadband, Network Operations Center 
OrgNOCPhone:  +1-858-244-9040 
OrgNOCEmail:  noc@airband.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/VA66-ARIN

OrgTechHandle: AS3251-ARIN
OrgTechName:   AS3257 Netguard
OrgTechPhone:  +49 69 48007422 
OrgTechEmail:  netguard@gtt.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AS3251-ARIN

RAbuseHandle: VA66-ARIN
RAbuseName:   RedWire Broadband, Network Operations Center 
RAbusePhone:  +1-858-244-9040 
RAbuseEmail:  noc@airband.com
RAbuseRef:    https://rdap.arin.net/registry/entity/VA66-ARIN

RTechHandle: VA66-ARIN
RTechName:   RedWire Broadband, Network Operations Center 
RTechPhone:  +1-858-244-9040 
RTechEmail:  noc@airband.com
RTechRef:    https://rdap.arin.net/registry/entity/VA66-ARIN

RNOCHandle: VA66-ARIN
RNOCName:   RedWire Broadband, Network Operations Center 
RNOCPhone:  +1-858-244-9040 
RNOCEmail:  noc@airband.com
RNOCRef:    https://rdap.arin.net/registry/entity/VA66-ARIN

# end


# start

NetRange:       69.63.192.0 - 69.63.207.255
CIDR:           69.63.192.0/20
NetName:        DMIT-GTT
NetHandle:      NET-69-63-192-0-2
Parent:         VOLONET-1 (NET-69-63-192-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   DMIT Cloud Services (DMITI)
RegDate:        2025-11-21
Updated:        2025-11-21
Ref:            https://rdap.arin.net/registry/ip/69.63.192.0



OrgName:        DMIT Cloud Services
OrgId:          DMITI
Address:        418 Broadway Ste N
City:           Albany
StateProv:      NY
PostalCode:     12207
Country:        US
RegDate:        2018-01-08
Updated:        2026-01-27
Ref:            https://rdap.arin.net/registry/entity/DMITI


OrgTechHandle: NOC32817-ARIN
OrgTechName:   Network Operations Center
OrgTechPhone:  +1-518-992-0595 
OrgTechEmail:  noc@dmit.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC32817-ARIN

OrgAbuseHandle: ABUSE7106-ARIN
OrgAbuseName:   Abuse Department
OrgAbusePhone:  +1-518-992-0595 
OrgAbuseEmail:  abuse@dmit.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE7106-ARIN

OrgNOCHandle: NOC32817-ARIN
OrgNOCName:   Network Operations Center
OrgNOCPhone:  +1-518-992-0595 
OrgNOCEmail:  noc@dmit.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/NOC32817-ARIN

# end


# start

NetRange:       69.63.198.0 - 69.63.198.255
CIDR:           69.63.198.0/24
NetName:        DMIT-CUSTOMER-US-CA-90017
NetHandle:      NET-69-63-198-0-1
Parent:         DMIT-GTT (NET-69-63-192-0-2)
NetType:        Reassigned
OriginAS:       
Customer:       Private Customer (C11493290)
RegDate:        2026-01-29
Updated:        2026-01-29
Comment:        Geofeed http://noc.dmit.com/dns/ipgeo
Ref:            https://rdap.arin.net/registry/ip/69.63.198.0


CustName:       Private Customer
Address:        Private Residence
City:           Los Angeles
StateProv:      CA
PostalCode:     90017
Country:        US
RegDate:        2026-01-29
Updated:        2026-01-29
Ref:            https://rdap.arin.net/registry/entity/C11493290

OrgTechHandle: NOC32817-ARIN
OrgTechName:   Network Operations Center
OrgTechPhone:  +1-518-992-0595 
OrgTechEmail:  noc@dmit.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC32817-ARIN

OrgAbuseHandle: ABUSE7106-ARIN
OrgAbuseName:   Abuse Department
OrgAbusePhone:  +1-518-992-0595 
OrgAbuseEmail:  abuse@dmit.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE7106-ARIN

OrgNOCHandle: NOC32817-ARIN
OrgNOCName:   Network Operations Center
OrgNOCPhone:  +1-518-992-0595 
OrgNOCEmail:  noc@dmit.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/NOC32817-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 69.63.198.97
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28113
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;69.63.198.97.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026050200 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 02 22:22:15 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
97.198.63.69.in-addr.arpa domain name pointer Host-By.DMIT.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
97.198.63.69.in-addr.arpa	name = Host-By.DMIT.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
91.134.173.100 attackbots
Invalid user risk from 91.134.173.100 port 46618
2020-07-31 15:17:52
222.186.175.216 attackbotsspam
Jul 31 09:41:08 vps639187 sshd\[3483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216  user=root
Jul 31 09:41:10 vps639187 sshd\[3483\]: Failed password for root from 222.186.175.216 port 52592 ssh2
Jul 31 09:41:14 vps639187 sshd\[3483\]: Failed password for root from 222.186.175.216 port 52592 ssh2
...
2020-07-31 15:42:10
220.158.148.132 attackspambots
Jul 31 06:54:20 minden010 sshd[5254]: Failed password for root from 220.158.148.132 port 49762 ssh2
Jul 31 06:59:09 minden010 sshd[7221]: Failed password for root from 220.158.148.132 port 55446 ssh2
...
2020-07-31 15:23:40
192.35.169.41 attack
 TCP (SYN) 192.35.169.41:9552 -> port 6006, len 44
2020-07-31 15:56:45
124.156.50.129 attackspambots
Unauthorized connection attempt detected from IP address 124.156.50.129 to port 8010
2020-07-31 15:37:07
218.92.0.171 attackbotsspam
Automatic report BANNED IP
2020-07-31 15:38:53
205.209.166.106 attack
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 62
2020-07-31 15:18:26
120.86.127.45 attackspambots
Invalid user zhusengbin from 120.86.127.45 port 52474
2020-07-31 15:47:47
194.26.25.81 attackspam
Jul 31 09:03:35 debian-2gb-nbg1-2 kernel: \[18437502.425739\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.25.81 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=63891 PROTO=TCP SPT=52393 DPT=8302 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-31 15:51:36
155.133.132.66 attack
(ftpd) Failed FTP login from 155.133.132.66 (FR/France/gw3.sd3.gpaas.net): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jul 31 08:22:02 ir1 pure-ftpd: (?@155.133.132.66) [WARNING] Authentication failed for user [atlaspumpsepahan]
2020-07-31 15:57:12
128.14.141.102 attack
Unauthorized connection attempt detected from IP address 128.14.141.102 to port 1935
2020-07-31 15:27:53
46.35.19.18 attack
Invalid user autobacs from 46.35.19.18 port 49108
2020-07-31 15:43:09
62.234.15.136 attackbotsspam
Invalid user cuichunlai from 62.234.15.136 port 43620
2020-07-31 15:29:32
181.40.73.86 attackspam
2020-07-31T09:15:48+0200 Failed SSH Authentication/Brute Force Attack. (Server 9)
2020-07-31 15:49:01
123.13.28.6 attack
Unauthorised access (Jul 31) SRC=123.13.28.6 LEN=40 TTL=46 ID=65170 TCP DPT=8080 WINDOW=5685 SYN
2020-07-31 15:46:26

最近上报的IP列表

166.88.26.78 2606:4700:10::6816:1056 2606:4700:10::6816:2717 20.65.195.57
2606:4700:10::6814:4348 2606:4700:10::6814:6432 2606:4700:10::ac43:647 2606:4700:10::6814:5193
2606:4700:10::6814:9397 47.92.80.142 2606:4700:10::6814:6211 2606:4700:10::6814:9072
2606:4700:10::6814:8284 152.165.171.251 66.132.172.99 88.101.166.128
250.194.239.218 14.207.194.7 47.111.3.213 2606:4700:10::6816:209