城市(city): Los Angeles
省份(region): California
国家(country): United States
运营商(isp): Softcom Internet Communications, Inc
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 70.39.128.0 - 70.39.255.255
CIDR: 70.39.128.0/17
NetName: NETBLK-PACKETEXCHANGE-V4-10
NetHandle: NET-70-39-128-0-1
Parent: NET70 (NET-70-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: PacketExchange, Inc (PACKE-25)
RegDate: 2009-11-24
Updated: 2012-02-24
Ref: https://rdap.arin.net/registry/ip/70.39.128.0
OrgName: PacketExchange, Inc
OrgId: PACKE-25
Address: GTT Communications, Inc.
Address: 8484 Westpark Drive
Address: Suite 720
City: McLean
StateProv: VA
PostalCode: 22102
Country: US
RegDate: 2008-02-26
Updated: 2025-04-17
Ref: https://rdap.arin.net/registry/entity/PACKE-25
OrgNOCHandle: GNOC16-ARIN
OrgNOCName: GTT Network Operations Center
OrgNOCPhone: +1-703-442-5500
OrgNOCEmail: noc@gtt.net
OrgNOCRef: https://rdap.arin.net/registry/entity/GNOC16-ARIN
OrgTechHandle: AS3251-ARIN
OrgTechName: AS3257 Netguard
OrgTechPhone: +49 69 48007422
OrgTechEmail: netguard@gtt.net
OrgTechRef: https://rdap.arin.net/registry/entity/AS3251-ARIN
OrgTechHandle: GIT5-ARIN
OrgTechName: GTT IPAM Team
OrgTechPhone: +1-703-442-5500
OrgTechEmail: netguard@gtt.net
OrgTechRef: https://rdap.arin.net/registry/entity/GIT5-ARIN
OrgAbuseHandle: GAD46-ARIN
OrgAbuseName: GTT Abuse Department
OrgAbusePhone: +1-703-442-5500
OrgAbuseEmail: abuse@gtt.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/GAD46-ARIN
OrgTechHandle: GNOC16-ARIN
OrgTechName: GTT Network Operations Center
OrgTechPhone: +1-703-442-5500
OrgTechEmail: noc@gtt.net
OrgTechRef: https://rdap.arin.net/registry/entity/GNOC16-ARIN
# end
# start
NetRange: 70.39.192.0 - 70.39.199.255
CIDR: 70.39.192.0/21
NetName: GTT-JUNYUU-NET
NetHandle: NET-70-39-192-0-1
Parent: NETBLK-PACKETEXCHANGE-V4-10 (NET-70-39-128-0-1)
NetType: Reallocated
OriginAS:
Organization: NetLab Global (HOSTH-5)
RegDate: 2025-08-06
Updated: 2025-08-06
Ref: https://rdap.arin.net/registry/ip/70.39.192.0
OrgName: NetLab Global
OrgId: HOSTH-5
Address: 110 W 40TH ST STE200
City: NEW YORK
StateProv: NY
PostalCode: 10018
Country: US
RegDate: 2022-02-26
Updated: 2025-07-30
Comment: Geofeed https://ip-allocation.as979.net/geofeed.csv
Ref: https://rdap.arin.net/registry/entity/HOSTH-5
OrgAbuseHandle: LIUFR3-ARIN
OrgAbuseName: Liu, Frid
OrgAbusePhone: +1-213-674-6718
OrgAbuseEmail: legal@as979.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/LIUFR3-ARIN
OrgTechHandle: LEERI36-ARIN
OrgTechName: Lee, Richard
OrgTechPhone: +1-213-674-6718
OrgTechEmail: noc@as979.net
OrgTechRef: https://rdap.arin.net/registry/entity/LEERI36-ARIN
# end
# start
NetRange: 70.39.192.0 - 70.39.199.255
CIDR: 70.39.192.0/21
NetName: GTT
NetHandle: NET-70-39-192-0-2
Parent: GTT-JUNYUU-NET (NET-70-39-192-0-1)
NetType: Reassigned
OriginAS:
Customer: GTT Communications Inc. (C11308740)
RegDate: 2025-08-06
Updated: 2025-08-06
Ref: https://rdap.arin.net/registry/ip/70.39.192.0
CustName: GTT Communications Inc.
Address: 900 N Alameda ST
City: Los Angeles
StateProv: CA
PostalCode: 90014
Country: US
RegDate: 2025-08-06
Updated: 2025-08-06
Ref: https://rdap.arin.net/registry/entity/C11308740
OrgAbuseHandle: LIUFR3-ARIN
OrgAbuseName: Liu, Frid
OrgAbusePhone: +1-213-674-6718
OrgAbuseEmail: legal@as979.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/LIUFR3-ARIN
OrgTechHandle: LEERI36-ARIN
OrgTechName: Lee, Richard
OrgTechPhone: +1-213-674-6718
OrgTechEmail: noc@as979.net
OrgTechRef: https://rdap.arin.net/registry/entity/LEERI36-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.39.195.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54426
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;70.39.195.129. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031802 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 19 10:05:06 CST 2026
;; MSG SIZE rcvd: 106
Host 129.195.39.70.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 129.195.39.70.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 46.43.73.71 | attack | Attempted connection to port 445. |
2020-08-19 05:26:19 |
| 221.192.139.251 | attack | Attempted connection to port 1433. |
2020-08-19 05:31:33 |
| 185.181.55.169 | attackspambots | Attempted connection to port 8080. |
2020-08-19 05:39:53 |
| 54.36.190.245 | attackbotsspam | Aug 17 12:12:01 ingram sshd[4742]: Invalid user dom from 54.36.190.245 Aug 17 12:12:01 ingram sshd[4742]: Failed password for invalid user dom from 54.36.190.245 port 60874 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=54.36.190.245 |
2020-08-19 05:28:14 |
| 200.84.21.138 | attack | Attempted connection to port 445. |
2020-08-19 05:35:53 |
| 139.226.35.190 | attackbots | Aug 18 23:17:07 srv-ubuntu-dev3 sshd[39878]: Invalid user james from 139.226.35.190 Aug 18 23:17:07 srv-ubuntu-dev3 sshd[39878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.226.35.190 Aug 18 23:17:07 srv-ubuntu-dev3 sshd[39878]: Invalid user james from 139.226.35.190 Aug 18 23:17:09 srv-ubuntu-dev3 sshd[39878]: Failed password for invalid user james from 139.226.35.190 port 45186 ssh2 Aug 18 23:21:03 srv-ubuntu-dev3 sshd[40401]: Invalid user xls from 139.226.35.190 Aug 18 23:21:03 srv-ubuntu-dev3 sshd[40401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.226.35.190 Aug 18 23:21:03 srv-ubuntu-dev3 sshd[40401]: Invalid user xls from 139.226.35.190 Aug 18 23:21:04 srv-ubuntu-dev3 sshd[40401]: Failed password for invalid user xls from 139.226.35.190 port 14275 ssh2 Aug 18 23:24:55 srv-ubuntu-dev3 sshd[40902]: Invalid user aaa from 139.226.35.190 ... |
2020-08-19 05:30:48 |
| 186.95.45.165 | attackspam | Attempted connection to port 445. |
2020-08-19 05:38:01 |
| 222.186.10.217 | attackbotsspam | Attempted connection to port 1433. |
2020-08-19 05:29:55 |
| 150.109.45.228 | attackbotsspam | Aug 19 00:08:22 root sshd[17644]: Invalid user idea from 150.109.45.228 ... |
2020-08-19 05:30:23 |
| 103.146.23.110 | attack | Attempted connection to port 445. |
2020-08-19 05:52:05 |
| 219.76.182.62 | attack | Attempted connection to port 445. |
2020-08-19 05:32:04 |
| 66.45.251.154 | attackspam | 2020-08-18T20:46:19.604355abusebot-2.cloudsearch.cf sshd[29824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.45.251.154 user=root 2020-08-18T20:46:21.597230abusebot-2.cloudsearch.cf sshd[29824]: Failed password for root from 66.45.251.154 port 51400 ssh2 2020-08-18T20:46:22.637305abusebot-2.cloudsearch.cf sshd[29826]: Invalid user admin from 66.45.251.154 port 54456 2020-08-18T20:46:22.644120abusebot-2.cloudsearch.cf sshd[29826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.45.251.154 2020-08-18T20:46:22.637305abusebot-2.cloudsearch.cf sshd[29826]: Invalid user admin from 66.45.251.154 port 54456 2020-08-18T20:46:24.716581abusebot-2.cloudsearch.cf sshd[29826]: Failed password for invalid user admin from 66.45.251.154 port 54456 ssh2 2020-08-18T20:46:25.695218abusebot-2.cloudsearch.cf sshd[29828]: Invalid user admin from 66.45.251.154 port 57360 ... |
2020-08-19 05:35:22 |
| 201.148.144.221 | attackspambots | Attempted connection to port 445. |
2020-08-19 05:33:58 |
| 176.122.169.95 | attackspambots | 2020-08-18T23:41:40.173047vps773228.ovh.net sshd[19665]: Failed password for invalid user ts3bot from 176.122.169.95 port 42318 ssh2 2020-08-18T23:46:11.776111vps773228.ovh.net sshd[19705]: Invalid user intranet from 176.122.169.95 port 48268 2020-08-18T23:46:11.787485vps773228.ovh.net sshd[19705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.122.169.95.16clouds.com 2020-08-18T23:46:11.776111vps773228.ovh.net sshd[19705]: Invalid user intranet from 176.122.169.95 port 48268 2020-08-18T23:46:13.909455vps773228.ovh.net sshd[19705]: Failed password for invalid user intranet from 176.122.169.95 port 48268 ssh2 ... |
2020-08-19 05:57:58 |
| 190.80.194.37 | attack | Attempted connection to port 445. |
2020-08-19 05:36:33 |