必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Kyiv

省份(region): Kyyiv

国家(country): Ukraine

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       149.102.0.0 - 149.102.255.255
CIDR:           149.102.0.0/16
NetName:        COGENT-149-102-16
NetHandle:      NET-149-102-0-0-1
Parent:         NET149 (NET-149-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Cogent Communications, LLC (COGC)
RegDate:        1992-01-28
Updated:        2025-09-23
Ref:            https://rdap.arin.net/registry/ip/149.102.0.0



OrgName:        Cogent Communications, LLC
OrgId:          COGC
Address:        2450 N Street NW
City:           Washington
StateProv:      DC
PostalCode:     20037
Country:        US
RegDate:        2000-05-30
Updated:        2025-09-23
Comment:        Geofeed https://geofeed.cogentco.com/geofeed.csv
Ref:            https://rdap.arin.net/registry/entity/COGC

ReferralServer:  rwhois://rwhois.cogentco.com:4321

OrgAbuseHandle: COGEN-ARIN
OrgAbuseName:   Cogent Abuse
OrgAbusePhone:  +1-877-875-4311 
OrgAbuseEmail:  abuse@cogentco.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/COGEN-ARIN

OrgNOCHandle: ZC108-ARIN
OrgNOCName:   Cogent Communications
OrgNOCPhone:  +1-877-875-4311 
OrgNOCEmail:  noc@cogentco.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/ZC108-ARIN

OrgTechHandle: IPALL-ARIN
OrgTechName:   IP Allocation
OrgTechPhone:  +1-877-875-4311 
OrgTechEmail:  ipalloc@cogentco.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPALL-ARIN

# end


# start

NetRange:       149.102.224.0 - 149.102.255.255
CIDR:           149.102.224.0/19
NetName:        DATACAMP-CGNT-NET-4
NetHandle:      NET-149-102-224-0-1
Parent:         COGENT-149-102-16 (NET-149-102-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   CDN77 (DL-807)
RegDate:        2022-10-21
Updated:        2022-10-21
Ref:            https://rdap.arin.net/registry/ip/149.102.224.0


OrgName:        CDN77
OrgId:          DL-807
Address:        207 Regent Street
City:           London
StateProv:      
PostalCode:     W1B 3HH
Country:        GB
RegDate:        2022-03-28
Updated:        2022-12-01
Ref:            https://rdap.arin.net/registry/entity/DL-807


OrgNOCHandle: PROCH16-ARIN
OrgNOCName:   Prochazka, Jiri 
OrgNOCPhone:  +443308081648 
OrgNOCEmail:  support@cdn77.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/PROCH16-ARIN

OrgAbuseHandle: CAC96-ARIN
OrgAbuseName:   CDN77 Abuse contact
OrgAbusePhone:  +443308081648 
OrgAbuseEmail:  abuse@datacamp.co.uk
OrgAbuseRef:    https://rdap.arin.net/registry/entity/CAC96-ARIN

OrgTechHandle: PROCH16-ARIN
OrgTechName:   Prochazka, Jiri 
OrgTechPhone:  +443308081648 
OrgTechEmail:  support@cdn77.com
OrgTechRef:    https://rdap.arin.net/registry/entity/PROCH16-ARIN

OrgRoutingHandle: CDNNO-ARIN
OrgRoutingName:   CDN77 NOC
OrgRoutingPhone:  +443308081648 
OrgRoutingEmail:  network@cdn77.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/CDNNO-ARIN

# end


# start

NetRange:       149.102.240.0 - 149.102.240.255
CIDR:           149.102.240.0/24
NetName:        CDNEXT-KYI-CG
NetHandle:      NET-149-102-240-0-1
Parent:         DATACAMP-CGNT-NET-4 (NET-149-102-224-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       Datacamp Limited (C09125042)
RegDate:        2023-01-06
Updated:        2023-01-06
Ref:            https://rdap.arin.net/registry/ip/149.102.240.0


CustName:       Datacamp Limited
Address:        207 Regent Street
City:           London
StateProv:      
PostalCode:     W1B3HH
Country:        GB
RegDate:        2023-01-06
Updated:        2023-01-06
Ref:            https://rdap.arin.net/registry/entity/C09125042

OrgNOCHandle: PROCH16-ARIN
OrgNOCName:   Prochazka, Jiri 
OrgNOCPhone:  +443308081648 
OrgNOCEmail:  support@cdn77.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/PROCH16-ARIN

OrgAbuseHandle: CAC96-ARIN
OrgAbuseName:   CDN77 Abuse contact
OrgAbusePhone:  +443308081648 
OrgAbuseEmail:  abuse@datacamp.co.uk
OrgAbuseRef:    https://rdap.arin.net/registry/entity/CAC96-ARIN

OrgTechHandle: PROCH16-ARIN
OrgTechName:   Prochazka, Jiri 
OrgTechPhone:  +443308081648 
OrgTechEmail:  support@cdn77.com
OrgTechRef:    https://rdap.arin.net/registry/entity/PROCH16-ARIN

OrgRoutingHandle: CDNNO-ARIN
OrgRoutingName:   CDN77 NOC
OrgRoutingPhone:  +443308081648 
OrgRoutingEmail:  network@cdn77.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/CDNNO-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.cogentco.com:4321.

%rwhois V-1.5:0010b0:00 rwhois.cogentco.com (CGNT rwhoisd 1.2.2)
network:ID:NET4-9566E00013
network:Network-Name:NET4-9566E00013
network:IP-Network:149.102.224.0/19
network:Org-Name:Datacamp Limited
network:Street-Address:KLEYERSTRASSE 90
network:City:FRANKFURT
network:Country:DE
network:Postal-Code:60326
network:Tech-Contact:ZC108-ARIN
network:Updated:2025-11-04 17:33:55
%ok
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.102.240.86
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16180
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.102.240.86.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026022300 1800 900 604800 86400

;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 24 00:01:31 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
86.240.102.149.in-addr.arpa domain name pointer unn-149-102-240-86.datapacket.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
86.240.102.149.in-addr.arpa	name = unn-149-102-240-86.datapacket.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
62.4.28.247 attackbotsspam
Oct  2 02:52:50 gw1 sshd[29473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.4.28.247
Oct  2 02:52:51 gw1 sshd[29473]: Failed password for invalid user sasha from 62.4.28.247 port 59416 ssh2
...
2019-10-02 06:07:58
106.13.82.49 attackspam
Oct  1 23:48:16 localhost sshd\[20670\]: Invalid user minecraft from 106.13.82.49 port 60446
Oct  1 23:48:16 localhost sshd\[20670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.82.49
Oct  1 23:48:17 localhost sshd\[20670\]: Failed password for invalid user minecraft from 106.13.82.49 port 60446 ssh2
2019-10-02 06:03:16
3.0.177.70 attack
2019-10-01T21:05:07.688558abusebot-5.cloudsearch.cf sshd\[12596\]: Invalid user gisele from 3.0.177.70 port 42526
2019-10-02 05:43:02
104.211.205.186 attack
Oct  2 00:04:42 bouncer sshd\[1014\]: Invalid user stack from 104.211.205.186 port 41892
Oct  2 00:04:42 bouncer sshd\[1014\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.205.186 
Oct  2 00:04:44 bouncer sshd\[1014\]: Failed password for invalid user stack from 104.211.205.186 port 41892 ssh2
...
2019-10-02 06:12:46
178.62.41.7 attackspam
Oct  1 17:05:02 mail sshd\[21003\]: Invalid user ubuntu from 178.62.41.7
Oct  1 17:05:02 mail sshd\[21003\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.41.7
...
2019-10-02 05:45:47
193.70.8.163 attackspam
2019-10-01T21:36:58.338503abusebot-5.cloudsearch.cf sshd\[12709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3055979.ip-193-70-8.eu  user=root
2019-10-02 05:48:14
112.216.39.29 attack
2019-10-01T17:39:45.4252921495-001 sshd\[57738\]: Invalid user cic from 112.216.39.29 port 47030
2019-10-01T17:39:45.4336891495-001 sshd\[57738\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.216.39.29
2019-10-01T17:39:47.2623991495-001 sshd\[57738\]: Failed password for invalid user cic from 112.216.39.29 port 47030 ssh2
2019-10-01T17:43:55.9484381495-001 sshd\[58039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.216.39.29  user=root
2019-10-01T17:43:58.4296251495-001 sshd\[58039\]: Failed password for root from 112.216.39.29 port 59046 ssh2
2019-10-01T17:48:08.1443411495-001 sshd\[58355\]: Invalid user sales from 112.216.39.29 port 42826
...
2019-10-02 06:06:21
130.105.68.165 attack
Oct  1 23:04:23 DAAP sshd[3032]: Invalid user password! from 130.105.68.165 port 34648
...
2019-10-02 06:11:29
139.199.88.93 attack
$f2bV_matches
2019-10-02 06:04:52
62.234.152.218 attack
Oct  1 11:51:11 php1 sshd\[4195\]: Invalid user wuhao from 62.234.152.218
Oct  1 11:51:11 php1 sshd\[4195\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.152.218
Oct  1 11:51:13 php1 sshd\[4195\]: Failed password for invalid user wuhao from 62.234.152.218 port 36075 ssh2
Oct  1 11:55:20 php1 sshd\[4542\]: Invalid user coen from 62.234.152.218
Oct  1 11:55:20 php1 sshd\[4542\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.152.218
2019-10-02 05:57:04
218.76.158.162 attack
Oct  1 12:00:28 friendsofhawaii sshd\[5256\]: Invalid user tom from 218.76.158.162
Oct  1 12:00:28 friendsofhawaii sshd\[5256\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.76.158.162
Oct  1 12:00:30 friendsofhawaii sshd\[5256\]: Failed password for invalid user tom from 218.76.158.162 port 58457 ssh2
Oct  1 12:04:55 friendsofhawaii sshd\[5616\]: Invalid user hlb from 218.76.158.162
Oct  1 12:04:55 friendsofhawaii sshd\[5616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.76.158.162
2019-10-02 06:13:49
85.93.88.90 attackspam
Oct  1 21:31:30 web8 sshd\[490\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.93.88.90  user=root
Oct  1 21:31:32 web8 sshd\[490\]: Failed password for root from 85.93.88.90 port 42550 ssh2
Oct  1 21:35:20 web8 sshd\[2644\]: Invalid user cable from 85.93.88.90
Oct  1 21:35:20 web8 sshd\[2644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.93.88.90
Oct  1 21:35:22 web8 sshd\[2644\]: Failed password for invalid user cable from 85.93.88.90 port 55468 ssh2
2019-10-02 05:49:25
222.186.30.165 attackspambots
Triggered by Fail2Ban at Vostok web server
2019-10-02 05:45:20
221.201.210.152 attackspambots
Unauthorised access (Oct  2) SRC=221.201.210.152 LEN=40 TTL=49 ID=48358 TCP DPT=8080 WINDOW=54716 SYN
2019-10-02 06:00:04
194.228.3.191 attack
Oct  2 03:20:27 areeb-Workstation sshd[18737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.228.3.191
Oct  2 03:20:29 areeb-Workstation sshd[18737]: Failed password for invalid user betrieb from 194.228.3.191 port 43284 ssh2
...
2019-10-02 05:53:45

最近上报的IP列表

103.4.251.34 20.169.105.85 154.28.229.215 104.252.191.112
240e:391:cd2:a920:c89b:3a4b:b43b:a6ce 107.172.195.183 104.164.173.211 103.196.9.169
216.73.216.13 74.7.244.34 74.7.227.58 113.215.188.136
148.98.143.205 123.14.121.63 163.177.3.238 91.196.33.183
223.123.43.3 114.130.69.241 1.80.184.182 18.97.26.1