必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       100.64.0.0 - 100.127.255.255
CIDR:           100.64.0.0/10
NetName:        SHARED-ADDRESS-SPACE-RFC6598-IANA-RESERVED
NetHandle:      NET-100-64-0-0-1
Parent:         NET100 (NET-100-0-0-0-0)
NetType:        IANA Special Use
OriginAS:       
Organization:   Internet Assigned Numbers Authority (IANA)
RegDate:        2012-03-13
Updated:        2024-05-24
Comment:        This block is used as Shared Address Space. Traffic from these addresses does not come from IANA. IANA has simply reserved these numbers in its database and does not use or operate them. We are not the source of activity you may see on logs or in e-mail records. Please refer to http://www.iana.org/abuse/ 
Comment:        
Comment:        Shared Address Space can only be used in Service Provider networks or on routing equipment that is able to do address translation across router interfaces when addresses are identical on two different interfaces. 
Comment:        
Comment:        This block was assigned by the IETF in the Best Current Practice document, 
Comment:        RFC 6598 which can be found at: 
Comment:        http://tools.ietf.org/html/rfc6598
Ref:            https://rdap.arin.net/registry/ip/100.64.0.0



OrgName:        Internet Assigned Numbers Authority
OrgId:          IANA
Address:        12025 Waterfront Drive
Address:        Suite 300
City:           Los Angeles
StateProv:      CA
PostalCode:     90292
Country:        US
RegDate:        
Updated:        2024-05-24
Ref:            https://rdap.arin.net/registry/entity/IANA


OrgTechHandle: IANA-IP-ARIN
OrgTechName:   ICANN
OrgTechPhone:  +1-310-301-5820 
OrgTechEmail:  abuse@iana.org
OrgTechRef:    https://rdap.arin.net/registry/entity/IANA-IP-ARIN

OrgAbuseHandle: IANA-IP-ARIN
OrgAbuseName:   ICANN
OrgAbusePhone:  +1-310-301-5820 
OrgAbuseEmail:  abuse@iana.org
OrgAbuseRef:    https://rdap.arin.net/registry/entity/IANA-IP-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 100.108.163.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60841
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;100.108.163.53.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042802 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 29 07:50:09 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 53.163.108.100.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.163.108.100.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
210.56.25.28 attackspam
Unauthorized connection attempt from IP address 210.56.25.28 on Port 445(SMB)
2019-10-31 23:54:05
110.78.112.38 attack
Unauthorized connection attempt from IP address 110.78.112.38 on Port 445(SMB)
2019-11-01 00:09:00
185.175.93.105 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-01 00:04:09
200.107.236.174 attackbots
Oct 31 13:03:20 srv206 sshd[4147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.107.236.174  user=sys
Oct 31 13:03:21 srv206 sshd[4147]: Failed password for sys from 200.107.236.174 port 55897 ssh2
...
2019-11-01 00:02:26
178.62.235.116 attackspam
WordPress login Brute force / Web App Attack on client site.
2019-11-01 00:08:38
188.241.202.23 attackbotsspam
Unauthorised access (Oct 31) SRC=188.241.202.23 LEN=52 TTL=115 ID=18211 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Oct 31) SRC=188.241.202.23 LEN=52 TTL=115 ID=12976 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Oct 31) SRC=188.241.202.23 LEN=52 TTL=115 ID=11890 DF TCP DPT=1433 WINDOW=8192 SYN 
Unauthorised access (Oct 31) SRC=188.241.202.23 LEN=52 TTL=115 ID=27180 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Oct 31) SRC=188.241.202.23 LEN=52 TTL=115 ID=14989 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Oct 31) SRC=188.241.202.23 LEN=52 TTL=115 ID=15509 DF TCP DPT=1433 WINDOW=8192 SYN 
Unauthorised access (Oct 30) SRC=188.241.202.23 LEN=52 TTL=115 ID=3326 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Oct 30) SRC=188.241.202.23 LEN=52 TTL=115 ID=19551 DF TCP DPT=1433 WINDOW=8192 SYN 
Unauthorised access (Oct 30) SRC=188.241.202.23 LEN=52 TTL=115 ID=1871 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-01 00:32:04
103.79.141.92 attack
22/tcp
[2019-10-31]1pkt
2019-11-01 00:23:02
115.201.218.50 attackspam
Unauthorized connection attempt from IP address 115.201.218.50 on Port 445(SMB)
2019-11-01 00:21:32
46.218.138.197 attack
Unauthorized connection attempt from IP address 46.218.138.197 on Port 445(SMB)
2019-11-01 00:05:16
113.185.42.220 attack
Unauthorized connection attempt from IP address 113.185.42.220 on Port 445(SMB)
2019-10-31 23:57:18
51.75.37.174 attackspam
detected by Fail2Ban
2019-11-01 00:10:39
157.55.39.66 attackspam
Automatic report - Banned IP Access
2019-10-31 23:56:42
190.85.234.215 attackbots
Oct 31 14:21:44 anodpoucpklekan sshd[81816]: Invalid user dayat from 190.85.234.215 port 59368
...
2019-10-31 23:52:44
147.135.156.89 attack
k+ssh-bruteforce
2019-11-01 00:30:01
51.75.53.115 attackbots
Oct 31 13:23:42 localhost sshd\[54187\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.53.115  user=root
Oct 31 13:23:44 localhost sshd\[54187\]: Failed password for root from 51.75.53.115 port 52222 ssh2
Oct 31 13:27:41 localhost sshd\[54296\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.53.115  user=root
Oct 31 13:27:43 localhost sshd\[54296\]: Failed password for root from 51.75.53.115 port 35502 ssh2
Oct 31 13:31:46 localhost sshd\[54398\]: Invalid user mika from 51.75.53.115 port 47016
...
2019-11-01 00:26:25

最近上报的IP列表

20.65.145.247 1.24.16.155 2606:4700:10::6814:4947 2606:4700:10::ac43:2882
112.64.205.254 2606:4700:10::6816:667 2606:4700:10::6814:9716 2606:4700:10::6814:8740
139.179.63.125 140.205.160.128 2606:4700:10::6816:1615 2606:4700:10::6816:191
110.77.226.107 2606:4700:10::6816:2616 225.42.196.103 109.246.137.246
0.217.25.133 221.11.223.216 139.178.131.176 66.132.186.184