必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Santiago

省份(region): Region Metropolitana (RM)

国家(country): Chile

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       8.242.0.0 - 8.243.255.255
CIDR:           8.242.0.0/15
NetName:        GCASL
NetHandle:      NET-8-242-0-0-3
Parent:         NET8 (NET-8-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Cirion Technologies Solutions, LLC (GCASL)
RegDate:        1992-12-01
Updated:        2024-05-09
Comment:        Geofeed https://portal.ciriontechnologies.com/portal/assets/fonts/geofeedsCirion.csv
Ref:            https://rdap.arin.net/registry/ip/8.242.0.0


OrgName:        Cirion Technologies Solutions, LLC
OrgId:          GCASL
Address:        801 Brickell Avenue, Suite 2400
City:           Miami
StateProv:      FL
PostalCode:     33131-2951
Country:        US
RegDate:        2022-01-27
Updated:        2025-10-01
Comment:        https://www.ciriontechnologies.com/en-us/about-us/#office
Ref:            https://rdap.arin.net/registry/entity/GCASL


OrgTechHandle: DUQUE23-ARIN
OrgTechName:   Duque, Claudia 
OrgTechPhone:  +573143121683 
OrgTechEmail:  claudia.duque@ciriontechnologies.com
OrgTechRef:    https://rdap.arin.net/registry/entity/DUQUE23-ARIN

OrgAbuseHandle: ABUSE9424-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +3143121683 
OrgAbuseEmail:  abuse@ciriontechnologies.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE9424-ARIN

# end


# start

NetRange:       8.242.0.0 - 8.242.255.255
CIDR:           8.242.0.0/16
NetName:        LPL-141-CL-1905-8-242
NetHandle:      NET-8-242-0-0-1
Parent:         GCASL (NET-8-242-0-0-3)
NetType:        Reallocated
OriginAS:       
Organization:   CTL LATAM (CL-1905)
RegDate:        2019-11-21
Updated:        2024-05-09
Comment:        Geofeed https://portal.ciriontechnologies.com/portal/assets/fonts/geofeedsCirion.csv
Ref:            https://rdap.arin.net/registry/ip/8.242.0.0


OrgName:        CTL LATAM
OrgId:          CL-1905
Address:        AV MANUEL OLGUIN 395
City:           LIMA
StateProv:      LIMA
PostalCode:     15023
Country:        PE
RegDate:        2019-05-09
Updated:        2025-10-01
Ref:            https://rdap.arin.net/registry/entity/CL-1905


OrgAbuseHandle: ABUSE9424-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +3143121683 
OrgAbuseEmail:  abuse@ciriontechnologies.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE9424-ARIN

OrgTechHandle: DUQUE23-ARIN
OrgTechName:   Duque, Claudia 
OrgTechPhone:  +573143121683 
OrgTechEmail:  claudia.duque@ciriontechnologies.com
OrgTechRef:    https://rdap.arin.net/registry/entity/DUQUE23-ARIN

# end


# start

NetRange:       8.242.200.0 - 8.242.207.255
CIDR:           8.242.200.0/21
NetName:        NET-8-242-200-0-1
NetHandle:      NET-8-242-200-0-1
Parent:         LPL-141-CL-1905-8-242 (NET-8-242-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   CTL Chile (CC-4323)
RegDate:        2020-01-15
Updated:        2020-01-15
Ref:            https://rdap.arin.net/registry/ip/8.242.200.0


OrgName:        CTL Chile
OrgId:          CC-4323
Address:        CALLE SANTA MARTA DE HUECHURABA, 6951
City:           Santiago de Chile
StateProv:      
PostalCode:     8600360
Country:        CL
RegDate:        2020-01-15
Updated:        2025-10-01
Ref:            https://rdap.arin.net/registry/entity/CC-4323


OrgTechHandle: DUQUE23-ARIN
OrgTechName:   Duque, Claudia 
OrgTechPhone:  +573143121683 
OrgTechEmail:  claudia.duque@ciriontechnologies.com
OrgTechRef:    https://rdap.arin.net/registry/entity/DUQUE23-ARIN

OrgAbuseHandle: ABUSE9424-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +3143121683 
OrgAbuseEmail:  abuse@ciriontechnologies.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE9424-ARIN

OrgTechHandle: ARCIN6-ARIN
OrgTechName:   Arciniegas, Viviana 
OrgTechPhone:  +6119148  
OrgTechEmail:  viviana.arciniegasmartinez@ciriontechnologies.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ARCIN6-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 8.242.204.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40734
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;8.242.204.70.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042800 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 28 21:21:49 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
70.204.242.8.in-addr.arpa domain name pointer host-8-242-204-70.centurylink.cl.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
70.204.242.8.in-addr.arpa	name = host-8-242-204-70.centurylink.cl.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.169.192 attackspambots
Jan  1 10:45:41 dedicated sshd[15661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192  user=root
Jan  1 10:45:42 dedicated sshd[15661]: Failed password for root from 222.186.169.192 port 22240 ssh2
2020-01-01 17:53:04
121.237.241.241 attack
(sshd) Failed SSH login from 121.237.241.241 (-): 5 in the last 3600 secs
2020-01-01 17:50:32
165.22.38.221 attack
Jan  1 08:21:47 localhost sshd\[12810\]: Invalid user asahi from 165.22.38.221 port 58460
Jan  1 08:21:47 localhost sshd\[12810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.38.221
Jan  1 08:21:50 localhost sshd\[12810\]: Failed password for invalid user asahi from 165.22.38.221 port 58460 ssh2
...
2020-01-01 18:15:53
113.4.139.252 attackbotsspam
Scanning
2020-01-01 18:10:10
111.67.205.212 attack
$f2bV_matches
2020-01-01 17:49:22
61.48.192.115 attack
Jan  1 08:50:46 mc1 kernel: \[2023827.924783\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=61.48.192.115 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=43 ID=21815 PROTO=TCP SPT=5202 DPT=23 WINDOW=12402 RES=0x00 SYN URGP=0 
Jan  1 08:51:04 mc1 kernel: \[2023845.765720\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=61.48.192.115 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=43 ID=21815 PROTO=TCP SPT=5202 DPT=23 WINDOW=12402 RES=0x00 SYN URGP=0 
Jan  1 09:00:21 mc1 kernel: \[2024402.578813\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=61.48.192.115 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=43 ID=21815 PROTO=TCP SPT=5202 DPT=23 WINDOW=12402 RES=0x00 SYN URGP=0 
...
2020-01-01 18:05:23
117.71.9.108 attackspam
Scanning
2020-01-01 18:14:50
112.85.42.180 attack
Jan  1 10:29:43 ovpn sshd\[3607\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.180  user=root
Jan  1 10:29:45 ovpn sshd\[3607\]: Failed password for root from 112.85.42.180 port 61066 ssh2
Jan  1 10:29:48 ovpn sshd\[3607\]: Failed password for root from 112.85.42.180 port 61066 ssh2
Jan  1 10:29:52 ovpn sshd\[3607\]: Failed password for root from 112.85.42.180 port 61066 ssh2
Jan  1 10:29:55 ovpn sshd\[3607\]: Failed password for root from 112.85.42.180 port 61066 ssh2
2020-01-01 17:35:47
109.190.57.4 attack
Jan  1 09:11:43 server sshd\[8825\]: Invalid user ahess from 109.190.57.4
Jan  1 09:11:43 server sshd\[8825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=4-57-190-109.dsl.ovh.fr 
Jan  1 09:11:44 server sshd\[8825\]: Failed password for invalid user ahess from 109.190.57.4 port 62799 ssh2
Jan  1 09:24:22 server sshd\[11536\]: Invalid user prosyk from 109.190.57.4
Jan  1 09:24:22 server sshd\[11536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=4-57-190-109.dsl.ovh.fr 
...
2020-01-01 18:00:16
185.53.168.96 attackbotsspam
$f2bV_matches
2020-01-01 18:02:33
165.22.215.114 attackbotsspam
Invalid user zv from 165.22.215.114 port 33406
2020-01-01 17:39:18
106.75.86.217 attack
Automatic report - Banned IP Access
2020-01-01 18:10:42
118.120.79.222 attackbots
Scanning
2020-01-01 18:07:24
222.186.175.220 attackbots
2020-01-01T09:45:33.411037hub.schaetter.us sshd\[1145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.220  user=root
2020-01-01T09:45:35.204464hub.schaetter.us sshd\[1145\]: Failed password for root from 222.186.175.220 port 3662 ssh2
2020-01-01T09:45:38.602939hub.schaetter.us sshd\[1145\]: Failed password for root from 222.186.175.220 port 3662 ssh2
2020-01-01T09:45:41.414167hub.schaetter.us sshd\[1145\]: Failed password for root from 222.186.175.220 port 3662 ssh2
2020-01-01T09:45:52.937506hub.schaetter.us sshd\[1150\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.220  user=root
...
2020-01-01 17:47:09
45.225.236.190 attackbotsspam
Jan  1 07:24:44 debian-2gb-nbg1-2 kernel: \[119216.550263\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.225.236.190 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=46 ID=1189 PROTO=TCP SPT=43621 DPT=23 WINDOW=45437 RES=0x00 SYN URGP=0
2020-01-01 17:49:05

最近上报的IP列表

2606:4700:10::6816:3071 62.138.190.184 165.232.130.247 152.233.20.149
159.223.64.101 89.116.210.48 113.215.189.163 2606:4700:10::6816:2385
2606:4700:10::ac43:1381 2606:4700:10::6814:5662 2606:4700:10::6814:7503 120.52.12.66
120.52.12.86 120.52.12.84 120.52.12.73 120.52.12.81
143.64.153.188 180.93.252.253 110.78.156.122 2606:4700:10::6814:9825