必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): San Jose

省份(region): California

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       149.104.0.0 - 149.104.255.255
CIDR:           149.104.0.0/16
NetName:        COGENT-149-104-16
NetHandle:      NET-149-104-0-0-1
Parent:         NET149 (NET-149-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Cogent Communications, LLC (COGC)
RegDate:        1992-02-03
Updated:        2025-09-23
Ref:            https://rdap.arin.net/registry/ip/149.104.0.0



OrgName:        Cogent Communications, LLC
OrgId:          COGC
Address:        2450 N Street NW
City:           Washington
StateProv:      DC
PostalCode:     20037
Country:        US
RegDate:        2000-05-30
Updated:        2025-09-23
Comment:        Geofeed https://geofeed.cogentco.com/geofeed.csv
Ref:            https://rdap.arin.net/registry/entity/COGC

ReferralServer:  rwhois://rwhois.cogentco.com:4321

OrgTechHandle: IPALL-ARIN
OrgTechName:   IP Allocation
OrgTechPhone:  +1-877-875-4311 
OrgTechEmail:  ipalloc@cogentco.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPALL-ARIN

OrgAbuseHandle: COGEN-ARIN
OrgAbuseName:   Cogent Abuse
OrgAbusePhone:  +1-877-875-4311 
OrgAbuseEmail:  abuse@cogentco.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/COGEN-ARIN

OrgNOCHandle: ZC108-ARIN
OrgNOCName:   Cogent Communications
OrgNOCPhone:  +1-877-875-4311 
OrgNOCEmail:  noc@cogentco.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/ZC108-ARIN

# end


# start

NetRange:       149.104.64.0 - 149.104.127.255
CIDR:           149.104.64.0/18
NetName:        BEDGE-CGNT-NET-1
NetHandle:      NET-149-104-64-0-1
Parent:         COGENT-149-104-16 (NET-149-104-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   BEDGE CO LIMITED (BL-1081)
RegDate:        2023-05-26
Updated:        2023-05-26
Ref:            https://rdap.arin.net/registry/ip/149.104.64.0


OrgName:        BEDGE CO LIMITED
OrgId:          BL-1081
Address:        1117 CUSTIS PL
Address:        PHILADELPHIA, PA 19122-4141
City:           PHILADELPHIA
StateProv:      PA
PostalCode:     19122-4141
Country:        US
RegDate:        2023-03-22
Updated:        2024-03-25
Comment:        Geofeed https://www.bedge.com/geofeed.csv
Ref:            https://rdap.arin.net/registry/entity/BL-1081


OrgTechHandle: FELIC24-ARIN
OrgTechName:   Felicia, Felicia 
OrgTechPhone:  +1-267-670-0790 
OrgTechEmail:  NOC@bedge.com
OrgTechRef:    https://rdap.arin.net/registry/entity/FELIC24-ARIN

OrgAbuseHandle: FELIC24-ARIN
OrgAbuseName:   Felicia, Felicia 
OrgAbusePhone:  +1-267-670-0790 
OrgAbuseEmail:  NOC@bedge.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/FELIC24-ARIN

# end


# start

NetRange:       149.104.111.0 - 149.104.111.255
CIDR:           149.104.111.0/24
NetName:        KAOPUCLOUD-TW
NetHandle:      NET-149-104-111-0-1
Parent:         BEDGE-CGNT-NET-1 (NET-149-104-64-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       KaopuCloud-TW (C09926226)
RegDate:        2023-08-04
Updated:        2025-09-05
Ref:            https://rdap.arin.net/registry/ip/149.104.111.0


CustName:       KaopuCloud-TW
Address:        Taiwan,Taipei
City:           Taipei
StateProv:      
PostalCode:     
Country:        TW
RegDate:        2023-08-04
Updated:        2025-09-05
Ref:            https://rdap.arin.net/registry/entity/C09926226

OrgTechHandle: FELIC24-ARIN
OrgTechName:   Felicia, Felicia 
OrgTechPhone:  +1-267-670-0790 
OrgTechEmail:  NOC@bedge.com
OrgTechRef:    https://rdap.arin.net/registry/entity/FELIC24-ARIN

OrgAbuseHandle: FELIC24-ARIN
OrgAbuseName:   Felicia, Felicia 
OrgAbusePhone:  +1-267-670-0790 
OrgAbuseEmail:  NOC@bedge.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/FELIC24-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at:
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.104.111.60
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58135
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.104.111.60.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026033103 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 01 14:49:19 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 60.111.104.149.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 60.111.104.149.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
2.56.207.101 attack
Attempted Email Sync. Password Hacking/Probing.
2020-09-09 22:44:28
157.44.175.149 attackbotsspam
1599583990 - 09/08/2020 18:53:10 Host: 157.44.175.149/157.44.175.149 Port: 445 TCP Blocked
...
2020-09-09 22:14:03
175.24.72.167 attackbotsspam
" "
2020-09-09 22:45:27
193.169.253.173 attackspambots
2020-09-09T01:43:01.194538lavrinenko.info sshd[28565]: Failed password for root from 193.169.253.173 port 55828 ssh2
2020-09-09T01:44:18.659762lavrinenko.info sshd[28611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.169.253.173  user=root
2020-09-09T01:44:20.328611lavrinenko.info sshd[28611]: Failed password for root from 193.169.253.173 port 32816 ssh2
2020-09-09T01:45:37.673990lavrinenko.info sshd[28661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.169.253.173  user=root
2020-09-09T01:45:39.854743lavrinenko.info sshd[28661]: Failed password for root from 193.169.253.173 port 38172 ssh2
...
2020-09-09 22:14:47
211.189.132.54 attackbotsspam
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root
2020-09-09 22:55:18
27.72.98.116 attackspambots
CMS (WordPress or Joomla) login attempt.
2020-09-09 22:19:47
157.230.163.6 attackbotsspam
$f2bV_matches
2020-09-09 22:22:28
170.239.108.74 attack
2020-09-09T16:40:32.003186+02:00  sshd[6709]: Failed password for root from 170.239.108.74 port 47165 ssh2
2020-09-09 22:51:47
39.96.82.174 attackbotsspam
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth):
2020-09-09 22:38:42
114.67.82.217 attack
Sep  9 15:36:17 vps sshd[24603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.82.217 
Sep  9 15:36:19 vps sshd[24603]: Failed password for invalid user build from 114.67.82.217 port 42510 ssh2
Sep  9 15:54:34 vps sshd[25810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.82.217 
...
2020-09-09 22:52:34
3.222.125.72 attack
https://rebrand.ly/designing-best-c52c5
2020-09-09 22:20:17
103.105.67.146 attackbotsspam
$f2bV_matches
2020-09-09 22:48:49
3.131.82.158 attack
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root
2020-09-09 22:49:06
46.32.252.84 attack
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root
2020-09-09 22:31:03
207.155.193.201 attack
port scan and connect, tcp 443 (https)
2020-09-09 22:31:21

最近上报的IP列表

120.217.54.168 101.26.28.122 101.22.171.234 20.163.14.19
45.170.249.112 124.227.5.95 117.155.150.169 118.214.153.52
16.16.7.68 10.210.108.18 213.159.70.3 167.99.152.240
1.177.63.29 121.234.219.154 2606:4700:10::6814:9175 2606:4700:10::6816:295
2606:4700:10::6816:4407 2606:4700:10::6816:1483 109.167.82.145 80.94.95.40