必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#


NetRange:       104.168.128.0 - 104.168.255.255
CIDR:           104.168.128.0/17
NetName:        HOSTWINDS-17-7
NetHandle:      NET-104-168-128-0-1
Parent:         NET104 (NET-104-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Hostwinds LLC. (HL-29)
RegDate:        2014-09-03
Updated:        2021-09-23
Comment:        https://www.hostwinds.com
Comment:        Abuse Contact: abuse@hostwinds.com
Ref:            https://rdap.arin.net/registry/ip/104.168.128.0


OrgName:        Hostwinds LLC.
OrgId:          HL-29
Address:        12101 Tukwila International Blvd, 3rd Floor, Suite 320
City:           Seattle
StateProv:      WA
PostalCode:     98168
Country:        US
RegDate:        2011-11-30
Updated:        2024-11-25
Comment:        https://www.hostwinds.com
Comment:        Abuse Contact: abuse@hostwinds.com
Ref:            https://rdap.arin.net/registry/entity/HL-29

ReferralServer:  rwhois://rwhois.hostwinds.net:4321

OrgTechHandle: HNOC9-ARIN
OrgTechName:   Hostwinds Network Operations Center
OrgTechPhone:  +1-206-886-0665 
OrgTechEmail:  support@hostwinds.com
OrgTechRef:    https://rdap.arin.net/registry/entity/HNOC9-ARIN

OrgNOCHandle: HNOC9-ARIN
OrgNOCName:   Hostwinds Network Operations Center
OrgNOCPhone:  +1-206-886-0665 
OrgNOCEmail:  support@hostwinds.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/HNOC9-ARIN

OrgAbuseHandle: HAC3-ARIN
OrgAbuseName:   Hostwinds Abuse Center
OrgAbusePhone:  +1-206-886-0665 
OrgAbuseEmail:  abuse@hostwinds.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/HAC3-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.hostwinds.net:4321.

%rwhois V-1.5:003fff:00 rwhois.hostwinds.net (by Network Solutions, Inc. V-1.5.9.6)
network:Class-Name:network
network:ID:Hostwinds Block-104.168.132.0/24
network:Auth-Area:104.168.132.0/24
network:Network-Name:Hostwinds Seattle Network
network:IP-Network:104.168.132.0/24
network:IP-Network-Block:104.168.132.0 - 104.168.132.255
network:Customer Organization:Hostwinds Seattle
network:Customer Address;I:12101 Tukwila Intl Blvd.  3rd Floor, Suite 320
network:Customer City;I:Seattle
network:Customer State/Province;I:Washington
network:Customer Postal Code;I:98168
network:Customer Country Code;I:US
network:Organization;I:Hostwinds LLC
network:Tech-Contact;I:Abuse@hostwinds.com
network:Admin-Contact;I:Abuse@hostwinds.com
network:Abuse-Contact;I:Abuse@hostwinds.com

network:Class-Name:network
network:ID:Hostwinds Block-104.168.128.0/17
network:Auth-Area:104.168.128.0/17
network:Network-Name:Hostwinds Seattle Network
network:IP-Network:104.168.128.0/17
network:IP-Network-Block:104.168.128.0 - 104.168.255.255
network:Customer Organization:Hostwinds Seattle
network:Customer Address;I:12101 Tukwila Intl Blvd.  3rd Floor, Suite 320
network:Customer City;I:Seattle
network:Customer State/Province;I:Washington
network:Customer Postal Code;I:98168
network:Customer Country Code;I:US
network:Organization;I:Hostwinds LLC
network:Tech-Contact;I:Abuse@hostwinds.com
network:Admin-Contact;I:Abuse@hostwinds.com
network:Abuse-Contact;I:Abuse@hostwinds.com

%ok
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.168.132.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15205
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.168.132.143.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025100302 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 04 07:34:25 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
143.132.168.104.in-addr.arpa domain name pointer client-104-168-132-143.hostwindsdns.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
143.132.168.104.in-addr.arpa	name = client-104-168-132-143.hostwindsdns.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
139.59.84.29 attackspambots
Apr 19 22:42:06 h2779839 sshd[11046]: Invalid user by from 139.59.84.29 port 57546
Apr 19 22:42:06 h2779839 sshd[11046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.84.29
Apr 19 22:42:06 h2779839 sshd[11046]: Invalid user by from 139.59.84.29 port 57546
Apr 19 22:42:08 h2779839 sshd[11046]: Failed password for invalid user by from 139.59.84.29 port 57546 ssh2
Apr 19 22:45:35 h2779839 sshd[11072]: Invalid user admin from 139.59.84.29 port 58602
Apr 19 22:45:35 h2779839 sshd[11072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.84.29
Apr 19 22:45:35 h2779839 sshd[11072]: Invalid user admin from 139.59.84.29 port 58602
Apr 19 22:45:37 h2779839 sshd[11072]: Failed password for invalid user admin from 139.59.84.29 port 58602 ssh2
Apr 19 22:49:11 h2779839 sshd[11096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.84.29  user=root
Apr 19 22:49:13
...
2020-04-20 06:46:16
188.166.226.26 attack
2020-04-19T21:48:56.843914abusebot-3.cloudsearch.cf sshd[6764]: Invalid user ftpuser from 188.166.226.26 port 54360
2020-04-19T21:48:56.849994abusebot-3.cloudsearch.cf sshd[6764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.226.26
2020-04-19T21:48:56.843914abusebot-3.cloudsearch.cf sshd[6764]: Invalid user ftpuser from 188.166.226.26 port 54360
2020-04-19T21:48:58.908634abusebot-3.cloudsearch.cf sshd[6764]: Failed password for invalid user ftpuser from 188.166.226.26 port 54360 ssh2
2020-04-19T21:57:39.142544abusebot-3.cloudsearch.cf sshd[7322]: Invalid user ftpuser from 188.166.226.26 port 36766
2020-04-19T21:57:39.150962abusebot-3.cloudsearch.cf sshd[7322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.226.26
2020-04-19T21:57:39.142544abusebot-3.cloudsearch.cf sshd[7322]: Invalid user ftpuser from 188.166.226.26 port 36766
2020-04-19T21:57:41.008747abusebot-3.cloudsearch.cf sshd[7322
...
2020-04-20 06:20:28
190.18.66.231 attackbotsspam
Too Many Connections Or General Abuse
2020-04-20 06:41:05
105.225.228.200 attackbots
20/4/19@16:14:04: FAIL: Alarm-Network address from=105.225.228.200
...
2020-04-20 06:48:14
45.83.220.161 attack
Apr 19 20:46:04 : SSH login attempts with invalid user
2020-04-20 06:14:56
106.12.58.4 attack
prod3
...
2020-04-20 06:30:04
106.13.41.87 attackbots
Apr 19 23:26:52 pkdns2 sshd\[64906\]: Invalid user yz from 106.13.41.87Apr 19 23:26:54 pkdns2 sshd\[64906\]: Failed password for invalid user yz from 106.13.41.87 port 56314 ssh2Apr 19 23:30:38 pkdns2 sshd\[65139\]: Invalid user oracle from 106.13.41.87Apr 19 23:30:40 pkdns2 sshd\[65139\]: Failed password for invalid user oracle from 106.13.41.87 port 52466 ssh2Apr 19 23:34:22 pkdns2 sshd\[65301\]: Invalid user il from 106.13.41.87Apr 19 23:34:24 pkdns2 sshd\[65301\]: Failed password for invalid user il from 106.13.41.87 port 48610 ssh2
...
2020-04-20 06:27:43
117.21.221.58 attackspambots
CMS (WordPress or Joomla) login attempt.
2020-04-20 06:36:29
46.105.28.141 attackbots
Apr 19 22:14:21 ncomp sshd[24619]: Invalid user c from 46.105.28.141
Apr 19 22:14:21 ncomp sshd[24619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.28.141
Apr 19 22:14:21 ncomp sshd[24619]: Invalid user c from 46.105.28.141
Apr 19 22:14:23 ncomp sshd[24619]: Failed password for invalid user c from 46.105.28.141 port 52448 ssh2
2020-04-20 06:29:13
101.50.57.47 attackbotsspam
20/4/19@16:13:59: FAIL: Alarm-Network address from=101.50.57.47
...
2020-04-20 06:51:04
129.211.171.24 attack
Apr 20 00:47:01 sxvn sshd[367993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.171.24
2020-04-20 06:48:47
182.75.77.38 attackbotsspam
Apr 19 22:09:14 DAAP sshd[31269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.75.77.38  user=root
Apr 19 22:09:16 DAAP sshd[31269]: Failed password for root from 182.75.77.38 port 57382 ssh2
Apr 19 22:09:14 DAAP sshd[31270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.75.77.38  user=root
Apr 19 22:09:16 DAAP sshd[31270]: Failed password for root from 182.75.77.38 port 57380 ssh2
Apr 19 22:14:05 DAAP sshd[31352]: Invalid user mb from 182.75.77.38 port 47598
Apr 19 22:14:05 DAAP sshd[31353]: Invalid user mb from 182.75.77.38 port 47600
...
2020-04-20 06:44:55
125.167.56.255 attack
Automatic report - Port Scan Attack
2020-04-20 06:19:35
2001:41d0:8:6f2c::1 attackbots
xmlrpc attack
2020-04-20 06:11:54
203.86.235.224 attack
Apr 19 23:55:15 raspberrypi sshd[16255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.86.235.224
2020-04-20 06:39:34

最近上报的IP列表

5.253.86.21 176.34.173.141 49.232.191.253 156.238.252.198
47.97.113.83 113.121.47.212 47.121.113.148 121.43.117.42
121.40.47.87 112.124.56.200 47.99.109.105 207.154.234.231
121.43.116.22 121.41.169.100 144.172.115.86 20.64.106.71
36.68.53.95 162.216.149.7 99.86.13.218 45.134.13.216