必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       100.64.0.0 - 100.127.255.255
CIDR:           100.64.0.0/10
NetName:        SHARED-ADDRESS-SPACE-RFC6598-IANA-RESERVED
NetHandle:      NET-100-64-0-0-1
Parent:         NET100 (NET-100-0-0-0-0)
NetType:        IANA Special Use
OriginAS:       
Organization:   Internet Assigned Numbers Authority (IANA)
RegDate:        2012-03-13
Updated:        2024-05-24
Comment:        This block is used as Shared Address Space. Traffic from these addresses does not come from IANA. IANA has simply reserved these numbers in its database and does not use or operate them. We are not the source of activity you may see on logs or in e-mail records. Please refer to http://www.iana.org/abuse/ 
Comment:        
Comment:        Shared Address Space can only be used in Service Provider networks or on routing equipment that is able to do address translation across router interfaces when addresses are identical on two different interfaces. 
Comment:        
Comment:        This block was assigned by the IETF in the Best Current Practice document, 
Comment:        RFC 6598 which can be found at: 
Comment:        http://tools.ietf.org/html/rfc6598
Ref:            https://rdap.arin.net/registry/ip/100.64.0.0



OrgName:        Internet Assigned Numbers Authority
OrgId:          IANA
Address:        12025 Waterfront Drive
Address:        Suite 300
City:           Los Angeles
StateProv:      CA
PostalCode:     90292
Country:        US
RegDate:        
Updated:        2024-05-24
Ref:            https://rdap.arin.net/registry/entity/IANA


OrgTechHandle: IANA-IP-ARIN
OrgTechName:   ICANN
OrgTechPhone:  +1-310-301-5820 
OrgTechEmail:  abuse@iana.org
OrgTechRef:    https://rdap.arin.net/registry/entity/IANA-IP-ARIN

OrgAbuseHandle: IANA-IP-ARIN
OrgAbuseName:   ICANN
OrgAbusePhone:  +1-310-301-5820 
OrgAbuseEmail:  abuse@iana.org
OrgAbuseRef:    https://rdap.arin.net/registry/entity/IANA-IP-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 100.115.230.38
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32104
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;100.115.230.38.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041701 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 17 19:02:24 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 38.230.115.100.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 38.230.115.100.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
94.198.176.39 attackspambots
FTP brute force
...
2019-06-22 20:04:30
185.220.101.30 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.30  user=root
Failed password for root from 185.220.101.30 port 46677 ssh2
Failed password for root from 185.220.101.30 port 46677 ssh2
Failed password for root from 185.220.101.30 port 46677 ssh2
Failed password for root from 185.220.101.30 port 46677 ssh2
2019-06-22 20:25:50
185.169.199.198 attackspambots
Jun 21 22:26:40 localhost kernel: [12414593.318036] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=185.169.199.198 DST=[mungedIP2] LEN=44 TOS=0x00 PREC=0x00 TTL=56 ID=0 DF PROTO=TCP SPT=80 DPT=53622 WINDOW=29200 RES=0x00 ACK SYN URGP=0 
Jun 21 22:26:40 localhost kernel: [12414593.318067] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=185.169.199.198 DST=[mungedIP2] LEN=44 TOS=0x00 PREC=0x00 TTL=56 ID=0 DF PROTO=TCP SPT=80 DPT=53622 SEQ=2561976478 ACK=1242251559 WINDOW=29200 RES=0x00 ACK SYN URGP=0 OPT (020405B4) 
Jun 22 00:20:56 localhost kernel: [12421449.758031] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=185.169.199.198 DST=[mungedIP2] LEN=44 TOS=0x00 PREC=0x00 TTL=56 ID=0 DF PROTO=TCP SPT=80 DPT=45820 WINDOW=29200 RES=0x00 ACK SYN URGP=0 
Jun 22 00:20:56 localhost kernel: [12421449.758065] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=185.169.199.1
2019-06-22 19:52:06
203.66.168.81 attackbotsspam
SSH-BRUTEFORCE
2019-06-22 20:31:42
203.134.210.36 attack
RDP Brute-Force (Grieskirchen RZ2)
2019-06-22 19:57:38
87.118.77.126 attackspam
joshuajohannes.de 87.118.77.126 \[22/Jun/2019:06:21:26 +0200\] "POST /wp-login.php HTTP/1.1" 200 5606 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
joshuajohannes.de 87.118.77.126 \[22/Jun/2019:06:21:26 +0200\] "POST /wp-login.php HTTP/1.1" 200 5613 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-06-22 19:45:03
121.127.250.80 attackbotsspam
19/6/22@00:20:24: FAIL: Alarm-Intrusion address from=121.127.250.80
...
2019-06-22 20:03:21
80.68.2.74 attack
SMTP Fraud Orders
2019-06-22 19:59:43
120.52.152.18 attack
Unauthorized connection attempt from IP address 120.52.152.18 on Port 3389(RDP)
2019-06-22 20:07:43
185.220.101.65 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.65  user=root
Failed password for root from 185.220.101.65 port 41955 ssh2
Failed password for root from 185.220.101.65 port 41955 ssh2
Failed password for root from 185.220.101.65 port 41955 ssh2
Failed password for root from 185.220.101.65 port 41955 ssh2
2019-06-22 20:22:58
178.128.214.153 attack
Unauthorised access (Jun 22) SRC=178.128.214.153 LEN=40 TTL=243 ID=43243 TCP DPT=3389 WINDOW=1024 SYN 
Unauthorised access (Jun 21) SRC=178.128.214.153 LEN=40 TTL=243 ID=49995 TCP DPT=3389 WINDOW=1024 SYN 
Unauthorised access (Jun 20) SRC=178.128.214.153 LEN=40 TTL=243 ID=16454 TCP DPT=3389 WINDOW=1024 SYN 
Unauthorised access (Jun 18) SRC=178.128.214.153 LEN=40 TTL=243 ID=50421 TCP DPT=3389 WINDOW=1024 SYN 
Unauthorised access (Jun 18) SRC=178.128.214.153 LEN=40 TTL=243 ID=5510 TCP DPT=3389 WINDOW=1024 SYN 
Unauthorised access (Jun 17) SRC=178.128.214.153 LEN=40 TTL=243 ID=35628 TCP DPT=3389 WINDOW=1024 SYN
2019-06-22 20:26:42
185.36.81.173 attackspambots
Jun 22 11:27:08  postfix/smtpd: warning: unknown[185.36.81.173]: SASL LOGIN authentication failed
2019-06-22 19:47:42
177.131.113.140 attack
port scan and connect, tcp 23 (telnet)
2019-06-22 20:07:02
88.149.181.240 attack
19/6/22@00:21:23: FAIL: IoT-SSH address from=88.149.181.240
...
2019-06-22 19:45:20
117.102.68.188 attackbots
Automatic report - Web App Attack
2019-06-22 20:17:24

最近上报的IP列表

94.231.206.105 213.222.235.132 2606:4700:10::ac43:2340 2606:4700:10::6814:6847
2606:4700:10::ac43:2363 2606:4700:10::6814:5015 2606:4700:10::ac43:938 2606:4700:10::6816:2127
61.129.249.159 77.73.51.54 191.150.51.227 184.186.46.52
179.201.211.2 13.107.177.0 117.187.58.147 17.187.58.147
104.204.221.16 2606:4700:10::ac43:1099 2606:4700:10::6816:3593 2606:4700:10::6814:5218