必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Ashburn

省份(region): Virginia

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       13.200.0.0 - 13.239.255.255
CIDR:           13.224.0.0/12, 13.200.0.0/13, 13.208.0.0/12
NetName:        AT-88-Z
NetHandle:      NET-13-200-0-0-1
Parent:         NET13 (NET-13-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Amazon Technologies Inc. (AT-88-Z)
RegDate:        2019-10-01
Updated:        2021-02-10
Ref:            https://rdap.arin.net/registry/ip/13.200.0.0



OrgName:        Amazon Technologies Inc.
OrgId:          AT-88-Z
Address:        410 Terry Ave N.
City:           Seattle
StateProv:      WA
PostalCode:     98109
Country:        US
RegDate:        2011-12-08
Updated:        2024-01-24
Comment:        All abuse reports MUST include:
Comment:        * src IP
Comment:        * dest IP (your IP)
Comment:        * dest port
Comment:        * Accurate date/timestamp and timezone of activity
Comment:        * Intensity/frequency (short log extracts)
Comment:        * Your contact details (phone and email) Without these we will be unable to identify the correct owner of the IP address at that point in time.
Ref:            https://rdap.arin.net/registry/entity/AT-88-Z


OrgRoutingHandle: IPROU3-ARIN
OrgRoutingName:   IP Routing
OrgRoutingPhone:  +1-206-555-0000 
OrgRoutingEmail:  aws-routing-poc@amazon.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/IPROU3-ARIN

OrgRoutingHandle: ARMP-ARIN
OrgRoutingName:   AWS RPKI Management POC
OrgRoutingPhone:  +1-206-555-0000 
OrgRoutingEmail:  aws-rpki-routing-poc@amazon.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/ARMP-ARIN

OrgTechHandle: ANO24-ARIN
OrgTechName:   Amazon EC2 Network Operations
OrgTechPhone:  +1-206-555-0000 
OrgTechEmail:  amzn-noc-contact@amazon.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ANO24-ARIN

OrgAbuseHandle: AEA8-ARIN
OrgAbuseName:   Amazon EC2 Abuse
OrgAbusePhone:  +1-206-555-0000 
OrgAbuseEmail:  trustandsafety@support.aws.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AEA8-ARIN

OrgNOCHandle: AANO1-ARIN
OrgNOCName:   Amazon AWS Network Operations
OrgNOCPhone:  +1-206-555-0000 
OrgNOCEmail:  amzn-noc-contact@amazon.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/AANO1-ARIN

# end


# start

NetRange:       13.216.0.0 - 13.223.255.255
CIDR:           13.216.0.0/13
NetName:        AMAZON-IAD
NetHandle:      NET-13-216-0-0-1
Parent:         AT-88-Z (NET-13-200-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   Amazon Data Services Northern Virginia (ADSN-1)
RegDate:        2024-09-27
Updated:        2024-09-27
Ref:            https://rdap.arin.net/registry/ip/13.216.0.0



OrgName:        Amazon Data Services Northern Virginia
OrgId:          ADSN-1
Address:        13200 Woodland Park Road
City:           Herndon
StateProv:      VA
PostalCode:     20171
Country:        US
RegDate:        2018-04-25
Updated:        2025-08-14
Ref:            https://rdap.arin.net/registry/entity/ADSN-1


OrgTechHandle: ANO24-ARIN
OrgTechName:   Amazon EC2 Network Operations
OrgTechPhone:  +1-206-555-0000 
OrgTechEmail:  amzn-noc-contact@amazon.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ANO24-ARIN

OrgNOCHandle: AANO1-ARIN
OrgNOCName:   Amazon AWS Network Operations
OrgNOCPhone:  +1-206-555-0000 
OrgNOCEmail:  amzn-noc-contact@amazon.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/AANO1-ARIN

OrgAbuseHandle: AEA8-ARIN
OrgAbuseName:   Amazon EC2 Abuse
OrgAbusePhone:  +1-206-555-0000 
OrgAbuseEmail:  trustandsafety@support.aws.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AEA8-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.222.168.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37979
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.222.168.56.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032601 1800 900 604800 86400

;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 27 05:00:40 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
56.168.222.13.in-addr.arpa domain name pointer ec2-13-222-168-56.compute-1.amazonaws.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
56.168.222.13.in-addr.arpa	name = ec2-13-222-168-56.compute-1.amazonaws.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
18.27.197.252 attack
Jun 16 11:49:51 cosmoit sshd[4658]: Failed password for root from 18.27.197.252 port 39806 ssh2
2020-06-16 17:59:08
106.12.86.112 attackspambots
Jun 16 05:49:55  sshd\[29620\]: User root from 106.12.86.112 not allowed because not listed in AllowUsersJun 16 05:49:56  sshd\[29620\]: Failed password for invalid user root from 106.12.86.112 port 36668 ssh2
...
2020-06-16 17:58:41
87.204.166.58 attackspam
smtp probe/invalid login attempt
2020-06-16 17:43:27
180.183.158.178 attackspambots
67 counts in 6 hours:
 Login attempt failed for...
2020-06-16 17:56:47
185.117.204.241 attackbotsspam
[portscan] Port scan
2020-06-16 18:00:30
177.185.19.54 attack
Jun 16 08:34:16 mail.srvfarm.net postfix/smtpd[1043023]: lost connection after CONNECT from unknown[177.185.19.54]
Jun 16 08:38:54 mail.srvfarm.net postfix/smtps/smtpd[1057619]: warning: unknown[177.185.19.54]: SASL PLAIN authentication failed: 
Jun 16 08:38:54 mail.srvfarm.net postfix/smtps/smtpd[1057619]: lost connection after AUTH from unknown[177.185.19.54]
Jun 16 08:39:43 mail.srvfarm.net postfix/smtps/smtpd[1059903]: warning: unknown[177.185.19.54]: SASL PLAIN authentication failed: 
Jun 16 08:39:44 mail.srvfarm.net postfix/smtps/smtpd[1059903]: lost connection after AUTH from unknown[177.185.19.54]
2020-06-16 17:20:33
93.99.159.20 attackspambots
Jun 16 05:02:25 mail.srvfarm.net postfix/smtps/smtpd[915576]: warning: unknown[93.99.159.20]: SASL PLAIN authentication failed: 
Jun 16 05:02:25 mail.srvfarm.net postfix/smtps/smtpd[915576]: lost connection after AUTH from unknown[93.99.159.20]
Jun 16 05:09:40 mail.srvfarm.net postfix/smtps/smtpd[914307]: warning: unknown[93.99.159.20]: SASL PLAIN authentication failed: 
Jun 16 05:09:40 mail.srvfarm.net postfix/smtps/smtpd[914307]: lost connection after AUTH from unknown[93.99.159.20]
Jun 16 05:10:13 mail.srvfarm.net postfix/smtps/smtpd[917498]: warning: unknown[93.99.159.20]: SASL PLAIN authentication failed:
2020-06-16 17:42:03
177.74.181.26 attack
Jun 16 05:06:52 mail.srvfarm.net postfix/smtps/smtpd[935166]: warning: 177-74-181-26.dynamic.mdnetfibra.com[177.74.181.26]: SASL PLAIN authentication failed: 
Jun 16 05:06:53 mail.srvfarm.net postfix/smtps/smtpd[935166]: lost connection after AUTH from 177-74-181-26.dynamic.mdnetfibra.com[177.74.181.26]
Jun 16 05:06:57 mail.srvfarm.net postfix/smtps/smtpd[914307]: warning: 177-74-181-26.dynamic.mdnetfibra.com[177.74.181.26]: SASL PLAIN authentication failed: 
Jun 16 05:06:58 mail.srvfarm.net postfix/smtps/smtpd[914307]: lost connection after AUTH from 177-74-181-26.dynamic.mdnetfibra.com[177.74.181.26]
Jun 16 05:09:48 mail.srvfarm.net postfix/smtps/smtpd[916122]: warning: 177-74-181-26.dynamic.mdnetfibra.com[177.74.181.26]: SASL PLAIN authentication failed:
2020-06-16 17:38:42
89.248.168.218 attackspam
Jun 16 11:22:42 ns3042688 courier-pop3d: LOGIN FAILED, user=info@alycotools.biz, ip=\[::ffff:89.248.168.218\]
...
2020-06-16 17:27:15
193.189.77.114 attack
Jun 16 05:00:56 mail.srvfarm.net postfix/smtpd[916110]: warning: unknown[193.189.77.114]: SASL PLAIN authentication failed: 
Jun 16 05:00:56 mail.srvfarm.net postfix/smtpd[916110]: lost connection after AUTH from unknown[193.189.77.114]
Jun 16 05:07:46 mail.srvfarm.net postfix/smtps/smtpd[915908]: lost connection after CONNECT from unknown[193.189.77.114]
Jun 16 05:09:35 mail.srvfarm.net postfix/smtpd[935949]: lost connection after CONNECT from unknown[193.189.77.114]
Jun 16 05:09:48 mail.srvfarm.net postfix/smtpd[936016]: lost connection after CONNECT from unknown[193.189.77.114]
2020-06-16 17:33:25
111.67.195.229 attack
Jun 16 02:48:08 firewall sshd[23879]: Invalid user parker from 111.67.195.229
Jun 16 02:48:10 firewall sshd[23879]: Failed password for invalid user parker from 111.67.195.229 port 42064 ssh2
Jun 16 02:51:41 firewall sshd[23969]: Invalid user rstudio from 111.67.195.229
...
2020-06-16 17:39:33
45.65.130.6 attack
Jun 16 05:04:51 mail.srvfarm.net postfix/smtps/smtpd[917493]: warning: unknown[45.65.130.6]: SASL PLAIN authentication failed: 
Jun 16 05:04:51 mail.srvfarm.net postfix/smtps/smtpd[917493]: lost connection after AUTH from unknown[45.65.130.6]
Jun 16 05:05:08 mail.srvfarm.net postfix/smtps/smtpd[915903]: warning: unknown[45.65.130.6]: SASL PLAIN authentication failed: 
Jun 16 05:05:08 mail.srvfarm.net postfix/smtps/smtpd[915903]: lost connection after AUTH from unknown[45.65.130.6]
Jun 16 05:12:26 mail.srvfarm.net postfix/smtpd[935984]: warning: unknown[45.65.130.6]: SASL PLAIN authentication failed:
2020-06-16 17:29:55
41.139.11.115 attackbots
Jun 16 05:05:27 mail.srvfarm.net postfix/smtps/smtpd[914306]: lost connection after CONNECT from unknown[41.139.11.115]
Jun 16 05:08:23 mail.srvfarm.net postfix/smtps/smtpd[935138]: lost connection after CONNECT from unknown[41.139.11.115]
Jun 16 05:11:32 mail.srvfarm.net postfix/smtpd[935207]: warning: unknown[41.139.11.115]: SASL PLAIN authentication failed: 
Jun 16 05:11:32 mail.srvfarm.net postfix/smtpd[935207]: lost connection after AUTH from unknown[41.139.11.115]
Jun 16 05:12:00 mail.srvfarm.net postfix/smtps/smtpd[938181]: lost connection after CONNECT from unknown[41.139.11.115]
2020-06-16 17:30:30
106.12.133.103 attackbots
SSH invalid-user multiple login try
2020-06-16 17:55:09
37.239.24.72 attackbots
Jun 16 05:12:00 mail.srvfarm.net postfix/smtps/smtpd[935105]: warning: unknown[37.239.24.72]: SASL PLAIN authentication failed: 
Jun 16 05:12:00 mail.srvfarm.net postfix/smtps/smtpd[935105]: lost connection after AUTH from unknown[37.239.24.72]
Jun 16 05:12:38 mail.srvfarm.net postfix/smtps/smtpd[938188]: warning: unknown[37.239.24.72]: SASL PLAIN authentication failed: 
Jun 16 05:12:38 mail.srvfarm.net postfix/smtps/smtpd[938188]: lost connection after AUTH from unknown[37.239.24.72]
Jun 16 05:14:34 mail.srvfarm.net postfix/smtps/smtpd[935140]: warning: unknown[37.239.24.72]: SASL PLAIN authentication failed:
2020-06-16 17:31:47

最近上报的IP列表

44.201.165.173 2606:4700:10::6814:8243 2606:4700:10::ac43:2950 2606:4700:10::6814:7567
2606:4700:10::ac43:2723 2606:4700:10::6816:2797 2606:4700:10::6816:2759 139.209.13.21
115.12.246.187 20.151.201.236 146.190.158.92 152.32.254.155
110.78.158.201 2606:4700:10::6814:8872 2606:4700:10::6816:2390 2606:4700:10::6814:4782
2606:4700:10::6814:5691 2606:4700:10::6814:6388 2606:4700:10::6814:8704 2606:4700:10::6814:9670