城市(city): Santiago
省份(region): Region Metropolitana (RM)
国家(country): Chile
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 8.242.0.0 - 8.243.255.255
CIDR: 8.242.0.0/15
NetName: GCASL
NetHandle: NET-8-242-0-0-3
Parent: NET8 (NET-8-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Cirion Technologies Solutions, LLC (GCASL)
RegDate: 1992-12-01
Updated: 2024-05-09
Comment: Geofeed https://portal.ciriontechnologies.com/portal/assets/fonts/geofeedsCirion.csv
Ref: https://rdap.arin.net/registry/ip/8.242.0.0
OrgName: Cirion Technologies Solutions, LLC
OrgId: GCASL
Address: 801 Brickell Avenue, Suite 2400
City: Miami
StateProv: FL
PostalCode: 33131-2951
Country: US
RegDate: 2022-01-27
Updated: 2025-10-01
Comment: https://www.ciriontechnologies.com/en-us/about-us/#office
Ref: https://rdap.arin.net/registry/entity/GCASL
OrgTechHandle: DUQUE23-ARIN
OrgTechName: Duque, Claudia
OrgTechPhone: +573143121683
OrgTechEmail: claudia.duque@ciriontechnologies.com
OrgTechRef: https://rdap.arin.net/registry/entity/DUQUE23-ARIN
OrgAbuseHandle: ABUSE9424-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +3143121683
OrgAbuseEmail: abuse@ciriontechnologies.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE9424-ARIN
# end
# start
NetRange: 8.242.0.0 - 8.242.255.255
CIDR: 8.242.0.0/16
NetName: LPL-141-CL-1905-8-242
NetHandle: NET-8-242-0-0-1
Parent: GCASL (NET-8-242-0-0-3)
NetType: Reallocated
OriginAS:
Organization: CTL LATAM (CL-1905)
RegDate: 2019-11-21
Updated: 2024-05-09
Comment: Geofeed https://portal.ciriontechnologies.com/portal/assets/fonts/geofeedsCirion.csv
Ref: https://rdap.arin.net/registry/ip/8.242.0.0
OrgName: CTL LATAM
OrgId: CL-1905
Address: AV MANUEL OLGUIN 395
City: LIMA
StateProv: LIMA
PostalCode: 15023
Country: PE
RegDate: 2019-05-09
Updated: 2025-10-01
Ref: https://rdap.arin.net/registry/entity/CL-1905
OrgAbuseHandle: ABUSE9424-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +3143121683
OrgAbuseEmail: abuse@ciriontechnologies.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE9424-ARIN
OrgTechHandle: DUQUE23-ARIN
OrgTechName: Duque, Claudia
OrgTechPhone: +573143121683
OrgTechEmail: claudia.duque@ciriontechnologies.com
OrgTechRef: https://rdap.arin.net/registry/entity/DUQUE23-ARIN
# end
# start
NetRange: 8.242.200.0 - 8.242.207.255
CIDR: 8.242.200.0/21
NetName: NET-8-242-200-0-1
NetHandle: NET-8-242-200-0-1
Parent: LPL-141-CL-1905-8-242 (NET-8-242-0-0-1)
NetType: Reallocated
OriginAS:
Organization: CTL Chile (CC-4323)
RegDate: 2020-01-15
Updated: 2020-01-15
Ref: https://rdap.arin.net/registry/ip/8.242.200.0
OrgName: CTL Chile
OrgId: CC-4323
Address: CALLE SANTA MARTA DE HUECHURABA, 6951
City: Santiago de Chile
StateProv:
PostalCode: 8600360
Country: CL
RegDate: 2020-01-15
Updated: 2025-10-01
Ref: https://rdap.arin.net/registry/entity/CC-4323
OrgTechHandle: DUQUE23-ARIN
OrgTechName: Duque, Claudia
OrgTechPhone: +573143121683
OrgTechEmail: claudia.duque@ciriontechnologies.com
OrgTechRef: https://rdap.arin.net/registry/entity/DUQUE23-ARIN
OrgAbuseHandle: ABUSE9424-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +3143121683
OrgAbuseEmail: abuse@ciriontechnologies.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE9424-ARIN
OrgTechHandle: ARCIN6-ARIN
OrgTechName: Arciniegas, Viviana
OrgTechPhone: +6119148
OrgTechEmail: viviana.arciniegasmartinez@ciriontechnologies.com
OrgTechRef: https://rdap.arin.net/registry/entity/ARCIN6-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 8.242.204.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40734
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;8.242.204.70. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042800 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 28 21:21:49 CST 2026
;; MSG SIZE rcvd: 105
70.204.242.8.in-addr.arpa domain name pointer host-8-242-204-70.centurylink.cl.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
70.204.242.8.in-addr.arpa name = host-8-242-204-70.centurylink.cl.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 222.186.169.192 | attackspambots | Jan 1 10:45:41 dedicated sshd[15661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192 user=root Jan 1 10:45:42 dedicated sshd[15661]: Failed password for root from 222.186.169.192 port 22240 ssh2 |
2020-01-01 17:53:04 |
| 121.237.241.241 | attack | (sshd) Failed SSH login from 121.237.241.241 (-): 5 in the last 3600 secs |
2020-01-01 17:50:32 |
| 165.22.38.221 | attack | Jan 1 08:21:47 localhost sshd\[12810\]: Invalid user asahi from 165.22.38.221 port 58460 Jan 1 08:21:47 localhost sshd\[12810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.38.221 Jan 1 08:21:50 localhost sshd\[12810\]: Failed password for invalid user asahi from 165.22.38.221 port 58460 ssh2 ... |
2020-01-01 18:15:53 |
| 113.4.139.252 | attackbotsspam | Scanning |
2020-01-01 18:10:10 |
| 111.67.205.212 | attack | $f2bV_matches |
2020-01-01 17:49:22 |
| 61.48.192.115 | attack | Jan 1 08:50:46 mc1 kernel: \[2023827.924783\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=61.48.192.115 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=43 ID=21815 PROTO=TCP SPT=5202 DPT=23 WINDOW=12402 RES=0x00 SYN URGP=0 Jan 1 08:51:04 mc1 kernel: \[2023845.765720\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=61.48.192.115 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=43 ID=21815 PROTO=TCP SPT=5202 DPT=23 WINDOW=12402 RES=0x00 SYN URGP=0 Jan 1 09:00:21 mc1 kernel: \[2024402.578813\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=61.48.192.115 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=43 ID=21815 PROTO=TCP SPT=5202 DPT=23 WINDOW=12402 RES=0x00 SYN URGP=0 ... |
2020-01-01 18:05:23 |
| 117.71.9.108 | attackspam | Scanning |
2020-01-01 18:14:50 |
| 112.85.42.180 | attack | Jan 1 10:29:43 ovpn sshd\[3607\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.180 user=root Jan 1 10:29:45 ovpn sshd\[3607\]: Failed password for root from 112.85.42.180 port 61066 ssh2 Jan 1 10:29:48 ovpn sshd\[3607\]: Failed password for root from 112.85.42.180 port 61066 ssh2 Jan 1 10:29:52 ovpn sshd\[3607\]: Failed password for root from 112.85.42.180 port 61066 ssh2 Jan 1 10:29:55 ovpn sshd\[3607\]: Failed password for root from 112.85.42.180 port 61066 ssh2 |
2020-01-01 17:35:47 |
| 109.190.57.4 | attack | Jan 1 09:11:43 server sshd\[8825\]: Invalid user ahess from 109.190.57.4 Jan 1 09:11:43 server sshd\[8825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=4-57-190-109.dsl.ovh.fr Jan 1 09:11:44 server sshd\[8825\]: Failed password for invalid user ahess from 109.190.57.4 port 62799 ssh2 Jan 1 09:24:22 server sshd\[11536\]: Invalid user prosyk from 109.190.57.4 Jan 1 09:24:22 server sshd\[11536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=4-57-190-109.dsl.ovh.fr ... |
2020-01-01 18:00:16 |
| 185.53.168.96 | attackbotsspam | $f2bV_matches |
2020-01-01 18:02:33 |
| 165.22.215.114 | attackbotsspam | Invalid user zv from 165.22.215.114 port 33406 |
2020-01-01 17:39:18 |
| 106.75.86.217 | attack | Automatic report - Banned IP Access |
2020-01-01 18:10:42 |
| 118.120.79.222 | attackbots | Scanning |
2020-01-01 18:07:24 |
| 222.186.175.220 | attackbots | 2020-01-01T09:45:33.411037hub.schaetter.us sshd\[1145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.220 user=root 2020-01-01T09:45:35.204464hub.schaetter.us sshd\[1145\]: Failed password for root from 222.186.175.220 port 3662 ssh2 2020-01-01T09:45:38.602939hub.schaetter.us sshd\[1145\]: Failed password for root from 222.186.175.220 port 3662 ssh2 2020-01-01T09:45:41.414167hub.schaetter.us sshd\[1145\]: Failed password for root from 222.186.175.220 port 3662 ssh2 2020-01-01T09:45:52.937506hub.schaetter.us sshd\[1150\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.220 user=root ... |
2020-01-01 17:47:09 |
| 45.225.236.190 | attackbotsspam | Jan 1 07:24:44 debian-2gb-nbg1-2 kernel: \[119216.550263\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.225.236.190 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=46 ID=1189 PROTO=TCP SPT=43621 DPT=23 WINDOW=45437 RES=0x00 SYN URGP=0 |
2020-01-01 17:49:05 |