必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       131.9.0.0 - 131.9.255.255
CIDR:           131.9.0.0/16
NetName:        SCOTTAFB-NET
NetHandle:      NET-131-9-0-0-1
Parent:         NET131 (NET-131-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   United States Department of Defense (DoD) (USDDD)
RegDate:        1988-09-08
Updated:        2025-08-18
Ref:            https://rdap.arin.net/registry/ip/131.9.0.0



OrgName:        United States Department of Defense (DoD)
OrgId:          USDDD
Address:        3990 E. Broad Street
City:           Columbus
StateProv:      OH
PostalCode:     43218
Country:        US
RegDate:        2007-01-12
Updated:        2025-03-13
Ref:            https://rdap.arin.net/registry/entity/USDDD


OrgAbuseHandle: MIL-HSTMST-ARIN
OrgAbuseName:   Network DoD
OrgAbusePhone:  +1-844-347-2457 
OrgAbuseEmail:  disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgAbuseRef:    https://rdap.arin.net/registry/entity/MIL-HSTMST-ARIN

OrgNOCHandle: MIL-HSTMST-ARIN
OrgNOCName:   Network DoD
OrgNOCPhone:  +1-844-347-2457 
OrgNOCEmail:  disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgNOCRef:    https://rdap.arin.net/registry/entity/MIL-HSTMST-ARIN

OrgTechHandle: REGIS10-ARIN
OrgTechName:   Registration
OrgTechPhone:  +1-844-347-2457 
OrgTechEmail:  disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgTechRef:    https://rdap.arin.net/registry/entity/REGIS10-ARIN

OrgTechHandle: MIL-HSTMST-ARIN
OrgTechName:   Network DoD
OrgTechPhone:  +1-844-347-2457 
OrgTechEmail:  disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgTechRef:    https://rdap.arin.net/registry/entity/MIL-HSTMST-ARIN

# end


# start

NetRange:       131.9.0.0 - 131.9.255.255
CIDR:           131.9.0.0/16
NetName:        SCOTTAFB-NET
NetHandle:      NET-131-9-0-0-2
Parent:         SCOTTAFB-NET (NET-131-9-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   Air Force Systems Networking (7ESG)
RegDate:        2025-08-18
Updated:        2025-08-18
Ref:            https://rdap.arin.net/registry/ip/131.9.0.0


OrgName:        Air Force Systems Networking
OrgId:          7ESG
Address:        501 EAST MOORE DR. BLDG 884 RM 1100 GUNTHER ANNEX
City:           MAXWELL AFB
StateProv:      AL
PostalCode:     36114
Country:        US
RegDate:        2008-06-05
Updated:        2025-03-13
Ref:            https://rdap.arin.net/registry/entity/7ESG


OrgAbuseHandle: REGIS10-ARIN
OrgAbuseName:   Registration
OrgAbusePhone:  +1-844-347-2457 
OrgAbuseEmail:  disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgAbuseRef:    https://rdap.arin.net/registry/entity/REGIS10-ARIN

OrgTechHandle: REGIS10-ARIN
OrgTechName:   Registration
OrgTechPhone:  +1-844-347-2457 
OrgTechEmail:  disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgTechRef:    https://rdap.arin.net/registry/entity/REGIS10-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 131.9.39.151
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48117
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;131.9.39.151.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042702 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 28 14:26:58 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
b'Host 151.39.9.131.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 131.9.39.151.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
208.113.200.55 attackspambots
$f2bV_matches
2020-02-27 03:48:28
118.126.128.5 attackspambots
sshd jail - ssh hack attempt
2020-02-27 03:31:58
52.231.152.223 attackspam
SSH_scan
2020-02-27 03:25:08
34.67.26.54 attackbotsspam
Feb 26 09:01:54 wbs sshd\[22951\]: Invalid user oracle from 34.67.26.54
Feb 26 09:01:54 wbs sshd\[22951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.26.67.34.bc.googleusercontent.com
Feb 26 09:01:56 wbs sshd\[22951\]: Failed password for invalid user oracle from 34.67.26.54 port 56022 ssh2
Feb 26 09:10:12 wbs sshd\[23653\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.26.67.34.bc.googleusercontent.com  user=sync
Feb 26 09:10:14 wbs sshd\[23653\]: Failed password for sync from 34.67.26.54 port 40208 ssh2
2020-02-27 03:21:30
209.250.238.202 attack
$f2bV_matches
2020-02-27 03:40:51
2.180.21.179 attack
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-27 03:36:48
210.176.62.116 attackspambots
$f2bV_matches
2020-02-27 03:25:37
106.13.111.28 attackspam
DATE:2020-02-26 15:02:04, IP:106.13.111.28, PORT:ssh SSH brute force auth (docker-dc)
2020-02-27 03:32:30
207.154.234.102 attack
Automatic report - Banned IP Access
2020-02-27 03:52:23
154.9.161.221 attack
MYH,DEF GET http://meyerpantalones.es/magmi/web/magmi.php
2020-02-27 03:41:46
51.77.220.127 attack
51.77.220.127 - - [26/Feb/2020:22:51:00 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2"
...
2020-02-27 03:28:52
45.40.198.41 attackbots
Feb 26 14:34:45  sshd\[2267\]: Invalid user postgres from 45.40.198.41Feb 26 14:34:47  sshd\[2267\]: Failed password for invalid user postgres from 45.40.198.41 port 43770 ssh2
...
2020-02-27 03:27:36
210.0.192.75 attackspambots
$f2bV_matches
2020-02-27 03:29:47
138.97.244.185 attackspam
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-27 03:43:51
157.230.177.185 attackspambots
DigitalOcean BotNet attack - 10s of requests to non-existent pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined, XSS attacks
node-superagent/4.1.0
2020-02-27 03:53:23

最近上报的IP列表

10.132.222.123 121.230.89.97 2606:4700:10::6814:8062 2606:4700:10::6814:8426
2606:4700:10::6816:3973 104.168.109.197 178.22.135.141 58.240.69.236
136.249.240.220 191.206.80.25 12.12.96.130 166.112.130.151
196.152.213.82 36.140.162.242 49.231.122.72 2606:4700:10::6814:7291
2606:4700:10::6814:7152 2606:4700:10::6816:526 150.109.12.46 185.145.240.105