必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       128.216.0.0 - 128.216.255.255
CIDR:           128.216.0.0/16
NetName:        CC-PRNET
NetHandle:      NET-128-216-0-0-1
Parent:         NET128 (NET-128-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   United States Department of Defense (DoD) (USDDD)
RegDate:        1987-03-23
Updated:        2025-08-18
Ref:            https://rdap.arin.net/registry/ip/128.216.0.0



OrgName:        United States Department of Defense (DoD)
OrgId:          USDDD
Address:        3990 E. Broad Street
City:           Columbus
StateProv:      OH
PostalCode:     43218
Country:        US
RegDate:        2007-01-12
Updated:        2025-03-13
Ref:            https://rdap.arin.net/registry/entity/USDDD


OrgAbuseHandle: MIL-HSTMST-ARIN
OrgAbuseName:   Network DoD
OrgAbusePhone:  +1-844-347-2457 
OrgAbuseEmail:  disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgAbuseRef:    https://rdap.arin.net/registry/entity/MIL-HSTMST-ARIN

OrgTechHandle: MIL-HSTMST-ARIN
OrgTechName:   Network DoD
OrgTechPhone:  +1-844-347-2457 
OrgTechEmail:  disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgTechRef:    https://rdap.arin.net/registry/entity/MIL-HSTMST-ARIN

OrgTechHandle: REGIS10-ARIN
OrgTechName:   Registration
OrgTechPhone:  +1-844-347-2457 
OrgTechEmail:  disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgTechRef:    https://rdap.arin.net/registry/entity/REGIS10-ARIN

OrgNOCHandle: MIL-HSTMST-ARIN
OrgNOCName:   Network DoD
OrgNOCPhone:  +1-844-347-2457 
OrgNOCEmail:  disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgNOCRef:    https://rdap.arin.net/registry/entity/MIL-HSTMST-ARIN

# end


# start

NetRange:       128.216.0.0 - 128.216.255.255
CIDR:           128.216.0.0/16
NetName:        CC-PRNET
NetHandle:      NET-128-216-0-0-2
Parent:         CC-PRNET (NET-128-216-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   Air Force Systems Networking (7ESG)
RegDate:        2025-08-18
Updated:        2025-08-18
Ref:            https://rdap.arin.net/registry/ip/128.216.0.0


OrgName:        Air Force Systems Networking
OrgId:          7ESG
Address:        501 EAST MOORE DR. BLDG 884 RM 1100 GUNTHER ANNEX
City:           MAXWELL AFB
StateProv:      AL
PostalCode:     36114
Country:        US
RegDate:        2008-06-05
Updated:        2025-03-13
Ref:            https://rdap.arin.net/registry/entity/7ESG


OrgAbuseHandle: REGIS10-ARIN
OrgAbuseName:   Registration
OrgAbusePhone:  +1-844-347-2457 
OrgAbuseEmail:  disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgAbuseRef:    https://rdap.arin.net/registry/entity/REGIS10-ARIN

OrgTechHandle: REGIS10-ARIN
OrgTechName:   Registration
OrgTechPhone:  +1-844-347-2457 
OrgTechEmail:  disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgTechRef:    https://rdap.arin.net/registry/entity/REGIS10-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 128.216.180.23
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45570
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;128.216.180.23.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026033000 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 19:43:14 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 23.180.216.128.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 128.216.180.23.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
64.227.5.37 attackbotsspam
SSH login attempts.
2020-06-09 13:19:55
49.88.112.110 attackbots
Jun  9 06:47:38 server sshd[45354]: Failed password for root from 49.88.112.110 port 21995 ssh2
Jun  9 06:47:41 server sshd[45354]: Failed password for root from 49.88.112.110 port 21995 ssh2
Jun  9 06:47:45 server sshd[45354]: Failed password for root from 49.88.112.110 port 21995 ssh2
2020-06-09 13:39:27
125.91.32.157 attackbots
2020-06-09T05:59:53+0200 Failed SSH Authentication/Brute Force Attack.(Server 2)
2020-06-09 13:26:49
85.93.20.34 attackspambots
2 attempts against mh-modsecurity-ban on milky
2020-06-09 13:21:46
134.209.197.218 attackbots
Jun  9 04:44:09 game-panel sshd[27759]: Failed password for root from 134.209.197.218 port 45808 ssh2
Jun  9 04:47:20 game-panel sshd[27901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.197.218
Jun  9 04:47:22 game-panel sshd[27901]: Failed password for invalid user toto from 134.209.197.218 port 49076 ssh2
2020-06-09 12:49:45
116.255.213.176 attack
Invalid user zhangchunzhi from 116.255.213.176 port 46582
2020-06-09 13:24:27
128.199.123.0 attack
Jun  8 23:15:20 server1 sshd\[8199\]: Failed password for root from 128.199.123.0 port 45680 ssh2
Jun  8 23:19:02 server1 sshd\[9234\]: Invalid user marjy from 128.199.123.0
Jun  8 23:19:02 server1 sshd\[9234\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.123.0 
Jun  8 23:19:04 server1 sshd\[9234\]: Failed password for invalid user marjy from 128.199.123.0 port 47846 ssh2
Jun  8 23:22:54 server1 sshd\[10214\]: Invalid user kafka from 128.199.123.0
...
2020-06-09 13:26:33
87.246.7.70 attackbots
Jun  9 07:23:11 v22019058497090703 postfix/smtpd[23269]: warning: unknown[87.246.7.70]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  9 07:24:06 v22019058497090703 postfix/smtpd[22273]: warning: unknown[87.246.7.70]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  9 07:24:58 v22019058497090703 postfix/smtpd[23269]: warning: unknown[87.246.7.70]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-09 13:28:49
193.112.154.159 attackspam
Failed password for root from 193.112.154.159 port 54894 ssh2
2020-06-09 13:23:33
175.139.1.34 attackbots
Jun  9 06:33:31 vps687878 sshd\[15057\]: Failed password for root from 175.139.1.34 port 48842 ssh2
Jun  9 06:37:18 vps687878 sshd\[15450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.139.1.34  user=root
Jun  9 06:37:20 vps687878 sshd\[15450\]: Failed password for root from 175.139.1.34 port 51128 ssh2
Jun  9 06:41:06 vps687878 sshd\[16007\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.139.1.34  user=root
Jun  9 06:41:08 vps687878 sshd\[16007\]: Failed password for root from 175.139.1.34 port 53410 ssh2
...
2020-06-09 12:52:02
51.178.78.152 attackbots
Jun  9 07:55:34 debian kernel: [581091.420104] [UFW BLOCK] IN=eth0 OUT= MAC=52:54:00:be:e4:65:08:e8:4f:6e:48:0c:08:00 SRC=51.178.78.152 DST=89.252.131.35 LEN=40 TOS=0x00 PREC=0x00 TTL=237 ID=54321 PROTO=TCP SPT=48877 DPT=8881 WINDOW=65535 RES=0x00 SYN URGP=0
2020-06-09 13:00:03
185.210.219.156 attackspambots
Many_bad_calls
2020-06-09 13:05:54
188.209.105.188 attack
BURG,WP GET /wp-login.php
2020-06-09 13:08:47
123.19.138.37 attackspam
20/6/8@23:56:40: FAIL: Alarm-Network address from=123.19.138.37
...
2020-06-09 13:09:14
50.2.209.6 attackbotsspam
Jun  9 05:56:58 icecube postfix/smtpd[79723]: NOQUEUE: reject: RCPT from mail-a.webstudioninetytwo.com[50.2.209.6]: 554 5.7.1 Service unavailable; Client host [50.2.209.6] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=
2020-06-09 12:53:55

最近上报的IP列表

10.192.112.139 2606:4700:10::6814:4357 223.104.249.48 123.147.237.241
2606:4700:10::ac43:808 2606:4700:10::6814:4577 2606:4700:10::6814:8183 110.77.226.219
2606:4700:10::6816:1635 2606:4700:10::6814:7445 106.83.9.44 223.104.250.32
183.230.147.245 183.230.147.243 106.89.20.110 223.104.249.116
14.108.34.74 123.147.236.59 183.64.115.202 39.144.225.79