必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Marseille

省份(region): Provence-Alpes-Côte d'Azur

国家(country): France

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       149.102.0.0 - 149.102.255.255
CIDR:           149.102.0.0/16
NetName:        COGENT-149-102-16
NetHandle:      NET-149-102-0-0-1
Parent:         NET149 (NET-149-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Cogent Communications, LLC (COGC)
RegDate:        1992-01-28
Updated:        2025-09-23
Ref:            https://rdap.arin.net/registry/ip/149.102.0.0



OrgName:        Cogent Communications, LLC
OrgId:          COGC
Address:        2450 N Street NW
City:           Washington
StateProv:      DC
PostalCode:     20037
Country:        US
RegDate:        2000-05-30
Updated:        2025-09-23
Comment:        Geofeed https://geofeed.cogentco.com/geofeed.csv
Ref:            https://rdap.arin.net/registry/entity/COGC

ReferralServer:  rwhois://rwhois.cogentco.com:4321

OrgTechHandle: IPALL-ARIN
OrgTechName:   IP Allocation
OrgTechPhone:  +1-877-875-4311 
OrgTechEmail:  ipalloc@cogentco.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPALL-ARIN

OrgAbuseHandle: COGEN-ARIN
OrgAbuseName:   Cogent Abuse
OrgAbusePhone:  +1-877-875-4311 
OrgAbuseEmail:  abuse@cogentco.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/COGEN-ARIN

OrgNOCHandle: ZC108-ARIN
OrgNOCName:   Cogent Communications
OrgNOCPhone:  +1-877-875-4311 
OrgNOCEmail:  noc@cogentco.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/ZC108-ARIN

# end


# start

NetRange:       149.102.224.0 - 149.102.255.255
CIDR:           149.102.224.0/19
NetName:        DATACAMP-CGNT-NET-4
NetHandle:      NET-149-102-224-0-1
Parent:         COGENT-149-102-16 (NET-149-102-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   CDN77 (DL-807)
RegDate:        2022-10-21
Updated:        2022-10-21
Ref:            https://rdap.arin.net/registry/ip/149.102.224.0


OrgName:        CDN77
OrgId:          DL-807
Address:        207 Regent Street
City:           London
StateProv:      
PostalCode:     W1B 3HH
Country:        GB
RegDate:        2022-03-28
Updated:        2022-12-01
Ref:            https://rdap.arin.net/registry/entity/DL-807


OrgTechHandle: PROCH16-ARIN
OrgTechName:   Prochazka, Jiri 
OrgTechPhone:  +443308081648 
OrgTechEmail:  support@cdn77.com
OrgTechRef:    https://rdap.arin.net/registry/entity/PROCH16-ARIN

OrgNOCHandle: PROCH16-ARIN
OrgNOCName:   Prochazka, Jiri 
OrgNOCPhone:  +443308081648 
OrgNOCEmail:  support@cdn77.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/PROCH16-ARIN

OrgAbuseHandle: CAC96-ARIN
OrgAbuseName:   CDN77 Abuse contact
OrgAbusePhone:  +443308081648 
OrgAbuseEmail:  abuse@datacamp.co.uk
OrgAbuseRef:    https://rdap.arin.net/registry/entity/CAC96-ARIN

OrgRoutingHandle: CDNNO-ARIN
OrgRoutingName:   CDN77 NOC
OrgRoutingPhone:  +443308081648 
OrgRoutingEmail:  network@cdn77.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/CDNNO-ARIN

# end


# start

NetRange:       149.102.245.0 - 149.102.245.255
CIDR:           149.102.245.0/24
NetName:        CDNEXT-MRS-CG
NetHandle:      NET-149-102-245-0-1
Parent:         DATACAMP-CGNT-NET-4 (NET-149-102-224-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       Datacamp Limited (C09136917)
RegDate:        2023-01-12
Updated:        2023-01-12
Ref:            https://rdap.arin.net/registry/ip/149.102.245.0


CustName:       Datacamp Limited
Address:        207 Regent Street
City:           London
StateProv:      
PostalCode:     W1B3HH
Country:        GB
RegDate:        2023-01-12
Updated:        2023-01-12
Ref:            https://rdap.arin.net/registry/entity/C09136917

OrgTechHandle: PROCH16-ARIN
OrgTechName:   Prochazka, Jiri 
OrgTechPhone:  +443308081648 
OrgTechEmail:  support@cdn77.com
OrgTechRef:    https://rdap.arin.net/registry/entity/PROCH16-ARIN

OrgNOCHa
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.102.245.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11345
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.102.245.166.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031501 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 16 07:00:39 CST 2026
;; MSG SIZE  rcvd: 108
HOST信息:
166.245.102.149.in-addr.arpa domain name pointer unn-149-102-245-166.datapacket.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
166.245.102.149.in-addr.arpa	name = unn-149-102-245-166.datapacket.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
109.194.174.78 attackbotsspam
Feb 14 23:23:10 mout sshd[32070]: Invalid user tweety from 109.194.174.78 port 57330
Feb 14 23:23:12 mout sshd[32070]: Failed password for invalid user tweety from 109.194.174.78 port 57330 ssh2
Feb 14 23:26:37 mout sshd[32434]: Invalid user user from 109.194.174.78 port 45039
2020-02-15 06:40:41
39.46.6.76 attackspam
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-15 06:28:11
138.97.29.118 attack
port scan and connect, tcp 23 (telnet)
2020-02-15 06:23:16
171.243.58.180 attackspambots
Honeypot attack, port: 81, PTR: dynamic-ip-adsl.viettel.vn.
2020-02-15 06:48:31
185.244.213.235 attackbotsspam
Honeypot attack, port: 445, PTR: no-mans-land.m247.com.
2020-02-15 06:41:16
162.62.26.17 attack
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-15 06:30:07
182.188.39.81 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 06:24:59
80.82.65.74 attack
Feb 14 23:25:40 debian-2gb-nbg1-2 kernel: \[3978365.171236\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.82.65.74 DST=195.201.40.59 LEN=60 TOS=0x00 PREC=0x00 TTL=56 ID=2056 DF PROTO=TCP SPT=60074 DPT=4145 WINDOW=29200 RES=0x00 SYN URGP=0
2020-02-15 06:50:15
81.165.86.44 attack
Feb 14 23:49:54 vps647732 sshd[26655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.165.86.44
Feb 14 23:49:56 vps647732 sshd[26655]: Failed password for invalid user hadoop from 81.165.86.44 port 34230 ssh2
...
2020-02-15 06:54:00
51.83.125.8 attackbots
ssh failed login
2020-02-15 06:54:19
222.186.42.7 attackspam
Feb 14 22:28:19 localhost sshd\[4827\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.7  user=root
Feb 14 22:28:20 localhost sshd\[4827\]: Failed password for root from 222.186.42.7 port 31008 ssh2
Feb 14 22:28:22 localhost sshd\[4827\]: Failed password for root from 222.186.42.7 port 31008 ssh2
Feb 14 22:28:25 localhost sshd\[4827\]: Failed password for root from 222.186.42.7 port 31008 ssh2
Feb 14 22:34:52 localhost sshd\[4907\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.7  user=root
...
2020-02-15 06:42:00
92.63.194.36 attack
RDP Bruteforce
2020-02-15 06:55:32
95.9.220.134 attackbots
Telnet Server BruteForce Attack
2020-02-15 06:21:22
34.80.195.117 attack
2020-02-15 06:24:07
81.31.235.93 attackspam
Automatic report - Port Scan Attack
2020-02-15 06:21:56

最近上报的IP列表

52.90.148.15 20.83.2.253 125.72.113.23 150.129.137.251
87.236.176.104 14.212.75.174 172.20.140.180 111.55.8.161
3.65.40.162 64.23.220.98 3.142.197.63 159.26.112.25
147.185.132.143 117.50.195.115 125.71.95.113 36.4.62.179
39.144.137.113 39.144.137.146 175.1.127.226 172.23.128.23