必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Los Angeles

省份(region): California

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       108.180.0.0 - 108.181.255.255
CIDR:           108.180.0.0/15
NetName:        TELUS
NetHandle:      NET-108-180-0-0-1
Parent:         NET108 (NET-108-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   TELUS Communications Inc. (TACE)
RegDate:        2012-07-19
Updated:        2012-07-19
Ref:            https://rdap.arin.net/registry/ip/108.180.0.0



OrgName:        TELUS Communications Inc.
OrgId:          TACE
Address:        510 W Georgia St
City:           Vancouver
StateProv:      BC
PostalCode:     V6B 2A3
Country:        CA
RegDate:        
Updated:        2025-10-16
Ref:            https://rdap.arin.net/registry/entity/TACE


OrgAbuseHandle: AAT-ARIN
OrgAbuseName:   Abuse at TELUS
OrgAbusePhone:  +1-877-945-8220 
OrgAbuseEmail:  abuse@telus.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AAT-ARIN

OrgTechHandle: TBOTP-ARIN
OrgTechName:   TELUS BC ORG TECH POC
OrgTechPhone:  +1-877-310-8324 
OrgTechEmail:  IPadmin@telus.com
OrgTechRef:    https://rdap.arin.net/registry/entity/TBOTP-ARIN

# end


# start

NetRange:       108.181.0.0 - 108.181.255.255
CIDR:           108.181.0.0/16
NetName:        PROFUSE
NetHandle:      NET-108-181-0-0-1
Parent:         TELUS (NET-108-180-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   Psychz Networks (PS-184)
RegDate:        2023-07-11
Updated:        2023-07-11
Ref:            https://rdap.arin.net/registry/ip/108.181.0.0


OrgName:        Psychz Networks
OrgId:          PS-184
Address:        20687-2 Amar Road #312
City:           Walnut
StateProv:      CA
PostalCode:     91789
Country:        US
RegDate:        2013-04-17
Updated:        2025-06-02
Comment:        ------------------------------------------------------
Comment:        Psychz Networks - AS40676
Comment:        ------------------------------------------------------
Comment:        
Comment:        Psychz Networks is a global infrastructure provider offering cloud hosting, bare metal servers, IP transit, and colocation services across multiple data centers.
Comment:        
Comment:        We maintain an open peering policy. Facility and interconnection details can be found at: https://www.peeringdb.com/net/6747
Comment:        
Comment:        Geofeed: https://psychz.net/geo/geofeed.csv
Comment:        
Comment:        ------------------------------------------------------
Comment:        Abuse Reporting:
Comment:        ------------------------------------------------------
Comment:        
Comment:        Our network supports dynamic and virtualized services. To assist with abuse investigations, please include the following details:
Comment:        
Comment:        - Timestamp of incident (with timezone)
Comment:        - Source and destination IPs and ports
Comment:        - Log samples and description of observed behavior
Comment:        - Any supporting evidence (e.g., packet captures, headers)
Comment:        
Comment:        Send reports to: abuse@psychz.net
Comment:        
Comment:        For urgent threats involving life safety or CSAM, contact law enforcement immediately and notify us.
Comment:        
Comment:        ------------------------------------------------------
Comment:        Operational Contacts:
Comment:        ------------------------------------------------------
Comment:        
Comment:        - Abuse Desk:             abuse@psychz.net
Comment:        - Network Operations:     noc@psychz.net
Comment:        - Legal Requests:         legal@psychz.net
Comment:        - Peering Requests:       peering@psychz.net
Comment:        
Comment:        Psychz Networks will only disclose subscriber information in response to valid legal process, court orders, or applicable U.S. law.
Ref:
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.181.22.243
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41017
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;108.181.22.243.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040900 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 09 17:09:01 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
243.22.181.108.in-addr.arpa domain name pointer unassigned.psychz.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
243.22.181.108.in-addr.arpa	name = unassigned.psychz.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
117.131.60.38 attackspam
Jan  2 15:43:11 work-partkepr sshd\[3369\]: Invalid user jivan from 117.131.60.38 port 7496
Jan  2 15:43:11 work-partkepr sshd\[3369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.131.60.38
...
2020-01-02 23:52:37
82.102.20.1 attackspam
SSH login attempts with user root at 2020-01-02.
2020-01-03 00:09:13
79.56.97.2 attackbotsspam
web Attack on Website at 2020-01-02.
2020-01-03 00:13:49
46.38.144.146 attackspambots
Jan  2 16:40:04 vmanager6029 postfix/smtpd\[5405\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan  2 16:41:06 vmanager6029 postfix/smtpd\[5405\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-01-02 23:43:18
86.38.171.8 attack
web Attack on Wordpress site at 2020-01-02.
2020-01-03 00:05:15
95.110.235.1 attackbotsspam
SSH login attempts with user root at 2020-01-02.
2020-01-02 23:54:14
49.234.207.171 attackbots
Jan  2 11:53:53 firewall sshd[16028]: Invalid user oziskender from 49.234.207.171
Jan  2 11:53:55 firewall sshd[16028]: Failed password for invalid user oziskender from 49.234.207.171 port 35436 ssh2
Jan  2 11:57:03 firewall sshd[16060]: Invalid user ren from 49.234.207.171
...
2020-01-02 23:52:54
80.85.86.1 attackspambots
web Attack on Website at 2020-01-02.
2020-01-03 00:12:04
68.183.31.1 attackspam
SSH login attempts with user root at 2020-01-02.
2020-01-03 00:17:32
80.82.78.211 attackbots
Portscan or hack attempt detected by psad/fwsnort
2020-01-02 23:41:35
94.55.160.65 attackbotsspam
Unauthorized connection attempt detected from IP address 94.55.160.65 to port 445
2020-01-02 23:52:08
144.91.82.35 attackbotsspam
Jan  2 16:27:06 tuxlinux kernel: [UFW BLOCK] IN=ens192 OUT= MAC=00:50:56:bc:13:b8:00:07:7d:bd:41:7f:08:00 SRC=144.91.82.35 DST=217.198.117.163 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=15877 PROTO=TCP SPT=46981 DPT=58554 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2020-01-03 00:15:46
69.229.6.4 attack
SSH login attempts with user root at 2020-01-02.
2020-01-03 00:17:00
204.48.31.119 attackbotsspam
[portscan] Port scan
2020-01-02 23:45:46
129.226.129.144 attack
2020-01-02T10:27:50.468227xentho-1 sshd[383766]: Invalid user 12 from 129.226.129.144 port 34268
2020-01-02T10:27:50.474652xentho-1 sshd[383766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.129.144
2020-01-02T10:27:50.468227xentho-1 sshd[383766]: Invalid user 12 from 129.226.129.144 port 34268
2020-01-02T10:27:52.521555xentho-1 sshd[383766]: Failed password for invalid user 12 from 129.226.129.144 port 34268 ssh2
2020-01-02T10:29:50.524241xentho-1 sshd[383809]: Invalid user p@ssw0rd from 129.226.129.144 port 52068
2020-01-02T10:29:50.532135xentho-1 sshd[383809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.129.144
2020-01-02T10:29:50.524241xentho-1 sshd[383809]: Invalid user p@ssw0rd from 129.226.129.144 port 52068
2020-01-02T10:29:52.719406xentho-1 sshd[383809]: Failed password for invalid user p@ssw0rd from 129.226.129.144 port 52068 ssh2
2020-01-02T10:31:52.263713xentho-1 sshd[3838
...
2020-01-02 23:48:07

最近上报的IP列表

156.229.16.165 117.182.107.151 3.227.180.70 106.112.132.130
35.198.216.19 67.207.93.150 144.52.197.172 218.140.54.73
14.188.83.127 142.93.157.146 64.227.2.203 134.199.200.219
61.136.144.34 234.63.172.29 56.58.58.239 102.217.236.7
139.135.40.4 23.225.213.68 231.191.77.188 144.31.48.59