必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       148.98.0.0 - 148.98.255.255
CIDR:           148.98.0.0/16
NetName:        GM-148-98-B
NetHandle:      NET-148-98-0-0-1
Parent:         NET148 (NET-148-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   General Motors LLC (GMED)
RegDate:        1991-04-12
Updated:        2021-12-14
Ref:            https://rdap.arin.net/registry/ip/148.98.0.0


OrgName:        General Motors LLC
OrgId:          GMED
Address:        200 Renaissance Center
City:           Detroit
StateProv:      MI
PostalCode:     48265
Country:        US
RegDate:        1990-11-16
Updated:        2024-11-25
Ref:            https://rdap.arin.net/registry/entity/GMED


OrgAbuseHandle: GCD2-ARIN
OrgAbuseName:   GM Cyber Defense
OrgAbusePhone:  +1-224-377-9633 
OrgAbuseEmail:  abuse@gm.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/GCD2-ARIN

OrgNOCHandle: GCNA-ARIN
OrgNOCName:   GM CNE - Network Architecture
OrgNOCPhone:  +1-248-392-5482 
OrgNOCEmail:  grp-usit.ddi@gm.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/GCNA-ARIN

OrgTechHandle: KARUP2-ARIN
OrgTechName:   Karuppannan, Venkatachalam 
OrgTechPhone:  +1-313-667-2256 
OrgTechEmail:  venkatachalam.karuppannan@gm.com
OrgTechRef:    https://rdap.arin.net/registry/entity/KARUP2-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.98.143.205
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29890
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.98.143.205.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026022300 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 24 01:57:03 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
b'Host 205.143.98.148.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 148.98.143.205.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
212.64.66.218 attackbotsspam
2020-09-27T08:29:04.069843randservbullet-proofcloud-66.localdomain sshd[18532]: Invalid user vnc from 212.64.66.218 port 46000
2020-09-27T08:29:04.074858randservbullet-proofcloud-66.localdomain sshd[18532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.66.218
2020-09-27T08:29:04.069843randservbullet-proofcloud-66.localdomain sshd[18532]: Invalid user vnc from 212.64.66.218 port 46000
2020-09-27T08:29:05.980294randservbullet-proofcloud-66.localdomain sshd[18532]: Failed password for invalid user vnc from 212.64.66.218 port 46000 ssh2
...
2020-09-27 21:49:22
52.170.248.124 attack
2020-09-27T12:16:28.522760shield sshd\[14045\]: Invalid user storage from 52.170.248.124 port 45024
2020-09-27T12:16:28.534797shield sshd\[14045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.170.248.124
2020-09-27T12:16:30.524097shield sshd\[14045\]: Failed password for invalid user storage from 52.170.248.124 port 45024 ssh2
2020-09-27T12:21:09.479271shield sshd\[14625\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.170.248.124  user=root
2020-09-27T12:21:12.045641shield sshd\[14625\]: Failed password for root from 52.170.248.124 port 56314 ssh2
2020-09-27 22:19:02
185.232.65.71 attackbots
Found on   CINS badguys     / proto=17  .  srcport=52593  .  dstport=389  .     (2678)
2020-09-27 22:03:41
192.241.217.80 attack
Unauthorized SSH login attempts
2020-09-27 21:59:44
188.166.233.31 attackspambots
Sep 27 16:51:28 dignus sshd[16835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.233.31  user=root
Sep 27 16:51:30 dignus sshd[16835]: Failed password for root from 188.166.233.31 port 53754 ssh2
Sep 27 16:55:30 dignus sshd[17283]: Invalid user tcl from 188.166.233.31 port 60060
Sep 27 16:55:30 dignus sshd[17283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.233.31
Sep 27 16:55:32 dignus sshd[17283]: Failed password for invalid user tcl from 188.166.233.31 port 60060 ssh2
...
2020-09-27 22:08:54
199.34.83.51 attackbotsspam
Port Scan: TCP/443
2020-09-27 22:01:45
222.186.175.216 attackspam
Sep 27 13:57:09 scw-6657dc sshd[8390]: Failed password for root from 222.186.175.216 port 60888 ssh2
Sep 27 13:57:09 scw-6657dc sshd[8390]: Failed password for root from 222.186.175.216 port 60888 ssh2
Sep 27 13:57:12 scw-6657dc sshd[8390]: Failed password for root from 222.186.175.216 port 60888 ssh2
...
2020-09-27 22:05:34
52.151.240.97 attack
Invalid user admin from 52.151.240.97 port 6816
2020-09-27 22:17:49
201.131.180.215 attack
Brute force attempt
2020-09-27 21:47:19
120.59.122.254 attack
port scan and connect, tcp 23 (telnet)
2020-09-27 22:14:40
51.140.165.127 attackspam
Invalid user 238 from 51.140.165.127 port 25919
2020-09-27 22:15:40
112.225.137.248 attackspambots
11211/udp
[2020-09-26]1pkt
2020-09-27 21:45:14
181.30.28.201 attackspambots
Sep 27 00:11:32 marvibiene sshd[16546]: Invalid user friend from 181.30.28.201 port 41538
Sep 27 00:11:32 marvibiene sshd[16546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.28.201
Sep 27 00:11:32 marvibiene sshd[16546]: Invalid user friend from 181.30.28.201 port 41538
Sep 27 00:11:34 marvibiene sshd[16546]: Failed password for invalid user friend from 181.30.28.201 port 41538 ssh2
2020-09-27 22:18:18
13.127.50.37 attackbots
Lines containing failures of 13.127.50.37 (max 1000)
Sep 27 08:03:00 srv sshd[59890]: Invalid user www from 13.127.50.37 port 37436
Sep 27 08:03:00 srv sshd[59890]: Received disconnect from 13.127.50.37 port 37436:11: Bye Bye [preauth]
Sep 27 08:03:00 srv sshd[59890]: Disconnected from invalid user www 13.127.50.37 port 37436 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=13.127.50.37
2020-09-27 21:54:32
203.129.218.76 attackbots
Fail2Ban Ban Triggered
2020-09-27 21:47:04

最近上报的IP列表

93.158.90.12 3.93.60.88 139.135.59.231 20.169.53.154
124.71.80.249 20.100.193.95 121.43.118.205 192.36.137.155
10.43.208.203 124.239.14.175 95.214.52.209 47.246.174.120
27.46.125.40 124.221.248.247 159.89.51.193 118.78.163.6
20.169.107.229 212.11.61.20 194.26.192.19 43.156.116.171