必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): Softcom Internet Communications, Inc

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       70.39.128.0 - 70.39.255.255
CIDR:           70.39.128.0/17
NetName:        NETBLK-PACKETEXCHANGE-V4-10
NetHandle:      NET-70-39-128-0-1
Parent:         NET70 (NET-70-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   PacketExchange, Inc (PACKE-25)
RegDate:        2009-11-24
Updated:        2012-02-24
Ref:            https://rdap.arin.net/registry/ip/70.39.128.0



OrgName:        PacketExchange, Inc
OrgId:          PACKE-25
Address:        GTT Communications, Inc.
Address:        8484 Westpark Drive
Address:        Suite 720
City:           McLean
StateProv:      VA
PostalCode:     22102
Country:        US
RegDate:        2008-02-26
Updated:        2025-04-17
Ref:            https://rdap.arin.net/registry/entity/PACKE-25


OrgAbuseHandle: GAD46-ARIN
OrgAbuseName:   GTT Abuse Department
OrgAbusePhone:  +1-703-442-5500 
OrgAbuseEmail:  abuse@gtt.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/GAD46-ARIN

OrgTechHandle: AS3251-ARIN
OrgTechName:   AS3257 Netguard
OrgTechPhone:  +49 69 48007422 
OrgTechEmail:  netguard@gtt.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AS3251-ARIN

OrgTechHandle: GIT5-ARIN
OrgTechName:   GTT IPAM Team
OrgTechPhone:  +1-703-442-5500 
OrgTechEmail:  netguard@gtt.net
OrgTechRef:    https://rdap.arin.net/registry/entity/GIT5-ARIN

OrgNOCHandle: GNOC16-ARIN
OrgNOCName:   GTT Network Operations Center
OrgNOCPhone:  +1-703-442-5500 
OrgNOCEmail:  noc@gtt.net
OrgNOCRef:    https://rdap.arin.net/registry/entity/GNOC16-ARIN

OrgTechHandle: GNOC16-ARIN
OrgTechName:   GTT Network Operations Center
OrgTechPhone:  +1-703-442-5500 
OrgTechEmail:  noc@gtt.net
OrgTechRef:    https://rdap.arin.net/registry/entity/GNOC16-ARIN

# end


# start

NetRange:       70.39.176.0 - 70.39.183.255
CIDR:           70.39.176.0/21
NetName:        GTT-JUNYUU-NET
NetHandle:      NET-70-39-176-0-1
Parent:         NETBLK-PACKETEXCHANGE-V4-10 (NET-70-39-128-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   NetLab Global (HOSTH-5)
RegDate:        2025-08-06
Updated:        2025-08-06
Ref:            https://rdap.arin.net/registry/ip/70.39.176.0


OrgName:        NetLab Global
OrgId:          HOSTH-5
Address:        110 W 40TH ST STE200
City:           NEW YORK
StateProv:      NY
PostalCode:     10018
Country:        US
RegDate:        2022-02-26
Updated:        2025-07-30
Comment:        Geofeed https://ip-allocation.as979.net/geofeed.csv
Ref:            https://rdap.arin.net/registry/entity/HOSTH-5


OrgAbuseHandle: LIUFR3-ARIN
OrgAbuseName:   Liu, Frid 
OrgAbusePhone:  +1-213-674-6718 
OrgAbuseEmail:  legal@as979.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/LIUFR3-ARIN

OrgTechHandle: LEERI36-ARIN
OrgTechName:   Lee, Richard 
OrgTechPhone:  +1-213-674-6718 
OrgTechEmail:  noc@as979.net
OrgTechRef:    https://rdap.arin.net/registry/entity/LEERI36-ARIN

# end


# start

NetRange:       70.39.176.0 - 70.39.183.255
CIDR:           70.39.176.0/21
NetName:        GTT
NetHandle:      NET-70-39-176-0-2
Parent:         GTT-JUNYUU-NET (NET-70-39-176-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       GTT Communications Inc. (C11308732)
RegDate:        2025-08-06
Updated:        2025-08-06
Ref:            https://rdap.arin.net/registry/ip/70.39.176.0


CustName:       GTT Communications Inc.
Address:        900 N Alameda ST
City:           Los Angeles
StateProv:      CA
PostalCode:     90014
Country:        US
RegDate:        2025-08-06
Updated:        2025-08-06
Ref:            https://rdap.arin.net/registry/entity/C11308732

OrgAbuseHandle: LIUFR3-ARIN
OrgAbuseName:   Liu, Frid 
OrgAbusePhone:  +1-213-674-6718 
OrgAbuseEmail:  legal@as979.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/LIUFR3-ARIN

OrgTechHandle: LEERI36-ARIN
OrgTechName:   Lee, Richard 
OrgTechPhone:  +1-213-674-6718 
OrgTechEmail:  noc@as979.net
OrgTechRef:    https://rdap.arin.net/registry/entity/LEERI36-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.39.183.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1145
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;70.39.183.106.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025102400 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 24 16:34:18 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 106.183.39.70.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 70.39.183.106.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
110.185.104.126 attack
May 26 18:01:55 PorscheCustomer sshd[1445]: Failed password for root from 110.185.104.126 port 42267 ssh2
May 26 18:04:32 PorscheCustomer sshd[1479]: Failed password for root from 110.185.104.126 port 53918 ssh2
...
2020-05-27 00:29:33
188.168.43.12 attackbots
Unauthorized connection attempt detected from IP address 188.168.43.12 to port 23 [T]
2020-05-27 00:13:35
73.194.127.105 attackbots
SSH Bruteforce Attempt (failed auth)
2020-05-27 00:05:50
54.210.61.18 attackspam
[TueMay2617:57:48.7172722020][:error][pid32025:tid47395578595072][client54.210.61.18:42488][client54.210.61.18]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"python-requests/"atREQUEST_HEADERS:User-Agent.[file"/usr/local/apache.ea3/conf/modsec_rules/20_asl_useragents.conf"][line"218"][id"332039"][rev"4"][msg"Atomicorp.comWAFRules:SuspiciousUnusualUserAgent\(python-requests\).Disablethisruleifyouusepython-requests/."][severity"CRITICAL"][hostname"nemoestintori.ch"][uri"/"][unique_id"Xs08fCojCpfo2Y7Q5yjIFAAAABI"][TueMay2617:57:49.6573992020][:error][pid17154:tid47395494348544][client54.210.61.18:40730][client54.210.61.18]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"python-requests/"atREQUEST_HEADERS:User-Agent.[file"/usr/local/apache.ea3/conf/modsec_rules/20_asl_useragents.conf"][line"218"][id"332039"][rev"4"][msg"Atomicorp.comWAFRules:SuspiciousUnusualUserAgent\(python-requests\).Disablethisruleifyouusepython-requests/."][severity"CRITICAL"][hostname\
2020-05-27 00:08:33
159.89.48.63 attackspam
2020-05-26T11:57:32.633277mail.thespaminator.com sshd[23401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.48.63  user=root
2020-05-26T11:57:34.855625mail.thespaminator.com sshd[23401]: Failed password for root from 159.89.48.63 port 53086 ssh2
...
2020-05-27 00:21:25
185.227.64.16 attack
Postfix RBL failed
2020-05-26 23:57:57
51.140.59.233 attackbotsspam
TCP Port: 443      invalid blocked  abuseat-org also zen-spamhaus      Client xx.xx.4.91     (41)
2020-05-26 23:56:57
218.158.86.147 attackbots
smtp probe/invalid login attempt
2020-05-27 00:39:13
190.193.39.63 attackbotsspam
2020-05-26T09:57:34.147367linuxbox-skyline sshd[76024]: Invalid user www from 190.193.39.63 port 50498
...
2020-05-27 00:22:19
107.170.249.6 attack
$f2bV_matches
2020-05-27 00:28:11
202.62.86.30 attack
1590508660 - 05/26/2020 17:57:40 Host: 202.62.86.30/202.62.86.30 Port: 445 TCP Blocked
2020-05-27 00:18:24
178.128.221.162 attack
May 26 17:35:07 vpn01 sshd[3285]: Failed password for root from 178.128.221.162 port 53116 ssh2
...
2020-05-26 23:58:45
42.117.20.181 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-05-27 00:14:09
112.85.42.188 attack
05/26/2020-12:25:03.535376 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan
2020-05-27 00:26:35
194.63.159.134 attack
May 26 15:59:58 ip-172-31-61-156 sshd[2893]: Failed password for root from 194.63.159.134 port 41595 ssh2
May 26 16:03:46 ip-172-31-61-156 sshd[3058]: Invalid user luszczek from 194.63.159.134
May 26 16:03:46 ip-172-31-61-156 sshd[3058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.63.159.134
May 26 16:03:46 ip-172-31-61-156 sshd[3058]: Invalid user luszczek from 194.63.159.134
May 26 16:03:48 ip-172-31-61-156 sshd[3058]: Failed password for invalid user luszczek from 194.63.159.134 port 43684 ssh2
...
2020-05-27 00:09:47

最近上报的IP列表

149.154.161.218 106.247.226.210 18.212.48.96 2605:7280::7:2000:c8a
8.148.149.204 175.107.38.44 14.213.29.65 47.93.212.245
39.106.139.197 123.56.25.153 3.18.215.229 59.82.83.99
59.82.135.33 112.7.7.227 112.7.7.41 91.212.166.40
59.82.83.3 59.82.83.157 203.93.173.11 103.103.88.215