必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Washington

省份(region): District of Columbia

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       149.52.0.0 - 149.52.255.255
CIDR:           149.52.0.0/16
NetName:        COGENT-149-52-16
NetHandle:      NET-149-52-0-0-1
Parent:         NET149 (NET-149-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Cogent Communications, LLC (COGC)
RegDate:        1992-01-28
Updated:        2025-09-23
Ref:            https://rdap.arin.net/registry/ip/149.52.0.0



OrgName:        Cogent Communications, LLC
OrgId:          COGC
Address:        2450 N Street NW
City:           Washington
StateProv:      DC
PostalCode:     20037
Country:        US
RegDate:        2000-05-30
Updated:        2025-09-23
Comment:        Geofeed https://geofeed.cogentco.com/geofeed.csv
Ref:            https://rdap.arin.net/registry/entity/COGC

ReferralServer:  rwhois://rwhois.cogentco.com:4321

OrgNOCHandle: ZC108-ARIN
OrgNOCName:   Cogent Communications
OrgNOCPhone:  +1-877-875-4311 
OrgNOCEmail:  noc@cogentco.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/ZC108-ARIN

OrgAbuseHandle: COGEN-ARIN
OrgAbuseName:   Cogent Abuse
OrgAbusePhone:  +1-877-875-4311 
OrgAbuseEmail:  abuse@cogentco.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/COGEN-ARIN

OrgTechHandle: IPALL-ARIN
OrgTechName:   IP Allocation
OrgTechPhone:  +1-877-875-4311 
OrgTechEmail:  ipalloc@cogentco.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPALL-ARIN

# end


# start

NetRange:       149.52.64.0 - 149.52.95.255
CIDR:           149.52.64.0/19
NetName:        WISDOM-CLOUD-CGNT-NET-6
NetHandle:      NET-149-52-64-0-1
Parent:         COGENT-149-52-16 (NET-149-52-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   WISDOM CLOUD INTERNET TECHNOLOGY PTE. LTD (WCITPL)
RegDate:        2024-06-20
Updated:        2024-06-20
Comment:        Geofeed https://adsl.cat/rfc8805.csv
Ref:            https://rdap.arin.net/registry/ip/149.52.64.0


OrgName:        WISDOM CLOUD INTERNET TECHNOLOGY PTE. LTD
OrgId:          WCITPL
Address:        260B Ang Mo Kio Street 21 #18-153
City:           SINGAPORE
StateProv:      
PostalCode:     562260
Country:        SG
RegDate:        2023-09-20
Updated:        2025-11-14
Ref:            https://rdap.arin.net/registry/entity/WCITPL


OrgNOCHandle: LEEJA109-ARIN
OrgNOCName:   Lee, Jack 
OrgNOCPhone:  +65 94800603 
OrgNOCEmail:  noc@wisdomisp.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/LEEJA109-ARIN

OrgRoutingHandle: LEEJA109-ARIN
OrgRoutingName:   Lee, Jack 
OrgRoutingPhone:  +65 94800603 
OrgRoutingEmail:  noc@wisdomisp.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/LEEJA109-ARIN

OrgAbuseHandle: LEEJA109-ARIN
OrgAbuseName:   Lee, Jack 
OrgAbusePhone:  +65 94800603 
OrgAbuseEmail:  noc@wisdomisp.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/LEEJA109-ARIN

OrgTechHandle: LEEJA109-ARIN
OrgTechName:   Lee, Jack 
OrgTechPhone:  +65 94800603 
OrgTechEmail:  noc@wisdomisp.com
OrgTechRef:    https://rdap.arin.net/registry/entity/LEEJA109-ARIN

OrgDNSHandle: LEEJA109-ARIN
OrgDNSName:   Lee, Jack 
OrgDNSPhone:  +65 94800603 
OrgDNSEmail:  noc@wisdomisp.com
OrgDNSRef:    https://rdap.arin.net/registry/entity/LEEJA109-ARIN

# end


# start

NetRange:       149.52.64.0 - 149.52.79.255
CIDR:           149.52.64.0/20
NetName:        NET-149-52-64-0
NetHandle:      NET-149-52-64-0-2
Parent:         WISDOM-CLOUD-CGNT-NET-6 (NET-149-52-64-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   SkyQuantum Internet Service (SISL-43)
RegDate:        2024-06-24
Updated:        2024-06-24
Comment:        Geofeed https://adsl.cat/rfc8805.csv
Ref:            https://rdap.arin.net/registry/ip/149.52.64.0


OrgName:        SkyQuantum Internet Service
OrgId:          SISL-43
Address:        30 N Gould St Ste N
City:           Sheridan
StateProv:      WY
PostalCode:     82801
Country:        US
RegDate:        2023-09-25
Updated:        2023-10-06
Ref:            https://rdap.arin.net/registry/entity/SISL-43


OrgAbuseHandle: NOC33703-ARIN
OrgAbuseName:   NOC
OrgAbusePhone:  +1-971-333-0066 
OrgAbuseEmail:  noc@adsl.cat
OrgAbuseRef:    https://rdap.arin.net/registry/entity/NOC33703-ARIN

OrgTechHandle: NOC33703-ARIN
OrgTechName:   NOC
OrgTechPhone:  +1-971-333-0066 
OrgTechEmail:  noc@adsl.cat
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC33703-ARIN

OrgRoutingHandle: NOC33703-ARIN
OrgRoutingName:   NOC
OrgRoutingPhone:  +1-971-333-0066 
OrgRoutingEmail:  noc@adsl.cat
OrgRoutingRef:    https://rdap.arin.net/registry/entity/NOC33703-ARIN

OrgNOCHandle: NOC33703-ARIN
OrgNOCName:   NOC
OrgNOCPhone:  +1-971-333-0066 
OrgNOCEmail:  noc@adsl.cat
OrgNOCRef:    https://rdap.arin.net/registry/entity/NOC33703-ARIN

OrgDNSHandle: NOC33703-ARIN
OrgDNSName:   NOC
OrgDNSPhone:  +1-971-333-0066 
OrgDNSEmail:  noc@adsl.cat
OrgDNSRef:    https://rdap.arin.net/registry/entity/NOC33703-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.cogentco.com:4321.

%rwhois V-1.5:0010b0:00 rwhois.cogentco.com (CGNT rwhoisd 1.2.2)
network:ID:NET4-9534400013
network:Network-Name:NET4-9534400013
network:IP-Network:149.52.64.0/19
network:Org-Name:WISDOM CLOUD INTERNET TECHNOLOGY PTE. LTD
network:Street-Address:20 MASTMAKER COURT
network:City:LONDON
network:Country:GB
network:Postal-Code:E14 9UB
network:Tech-Contact:ZC108-ARIN
network:Updated:2025-11-07 10:24:48
%ok
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.52.75.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59832
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.52.75.129.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031002 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 11 11:57:22 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 129.75.52.149.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 129.75.52.149.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
93.110.154.113 attack
(pop3d) Failed POP3 login from 93.110.154.113 (IR/Iran/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Mar 26 02:11:33 ir1 dovecot[566034]: pop3-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=93.110.154.113, lip=5.63.12.44, session=
2020-03-26 08:29:42
106.12.22.208 attackbotsspam
Invalid user cd from 106.12.22.208 port 51716
2020-03-26 08:06:49
163.44.159.123 attackbots
Mar 25 23:57:37 host01 sshd[23112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.159.123 
Mar 25 23:57:39 host01 sshd[23112]: Failed password for invalid user mariel from 163.44.159.123 port 42928 ssh2
Mar 26 00:01:14 host01 sshd[23733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.159.123 
...
2020-03-26 08:34:59
116.212.236.142 attackspam
Invalid user lg from 116.212.236.142 port 7606
2020-03-26 08:19:19
197.248.0.222 attack
SSH Invalid Login
2020-03-26 08:00:18
60.251.136.161 attackbots
SSH Brute-Force Attack
2020-03-26 08:17:34
1.194.50.91 attack
Mar 25 22:34:08 DAAP sshd[12317]: Invalid user sftpuser04 from 1.194.50.91 port 44446
Mar 25 22:34:08 DAAP sshd[12317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.194.50.91
Mar 25 22:34:08 DAAP sshd[12317]: Invalid user sftpuser04 from 1.194.50.91 port 44446
Mar 25 22:34:09 DAAP sshd[12317]: Failed password for invalid user sftpuser04 from 1.194.50.91 port 44446 ssh2
Mar 25 22:41:34 DAAP sshd[12559]: Invalid user sato from 1.194.50.91 port 41340
...
2020-03-26 08:34:06
116.196.101.168 attackbots
Mar 26 00:18:33 ns382633 sshd\[26126\]: Invalid user samia from 116.196.101.168 port 45182
Mar 26 00:18:33 ns382633 sshd\[26126\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.101.168
Mar 26 00:18:35 ns382633 sshd\[26126\]: Failed password for invalid user samia from 116.196.101.168 port 45182 ssh2
Mar 26 00:27:17 ns382633 sshd\[27888\]: Invalid user benito from 116.196.101.168 port 60952
Mar 26 00:27:17 ns382633 sshd\[27888\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.101.168
2020-03-26 08:27:37
159.65.219.210 attackspambots
Mar 25 22:38:23 silence02 sshd[11131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.219.210
Mar 25 22:38:25 silence02 sshd[11131]: Failed password for invalid user test from 159.65.219.210 port 41652 ssh2
Mar 25 22:41:43 silence02 sshd[11320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.219.210
2020-03-26 08:27:09
222.186.15.18 attack
Mar 26 00:10:45 localhost sshd[22684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.18  user=root
Mar 26 00:10:47 localhost sshd[22684]: Failed password for root from 222.186.15.18 port 42812 ssh2
Mar 26 00:10:50 localhost sshd[22684]: Failed password for root from 222.186.15.18 port 42812 ssh2
Mar 26 00:10:45 localhost sshd[22684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.18  user=root
Mar 26 00:10:47 localhost sshd[22684]: Failed password for root from 222.186.15.18 port 42812 ssh2
Mar 26 00:10:50 localhost sshd[22684]: Failed password for root from 222.186.15.18 port 42812 ssh2
Mar 26 00:10:45 localhost sshd[22684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.18  user=root
Mar 26 00:10:47 localhost sshd[22684]: Failed password for root from 222.186.15.18 port 42812 ssh2
Mar 26 00:10:50 localhost sshd[22684]: Failed pas
...
2020-03-26 08:26:03
162.222.212.46 attackbots
Mar 26 01:07:23 vpn01 sshd[29828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.222.212.46
Mar 26 01:07:26 vpn01 sshd[29828]: Failed password for invalid user test from 162.222.212.46 port 34432 ssh2
...
2020-03-26 08:24:26
212.95.137.141 attack
Mar 25 22:28:37 server770 sshd[16759]: Invalid user lukas from 212.95.137.141 port 42858
Mar 25 22:28:37 server770 sshd[16759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.95.137.141
Mar 25 22:28:39 server770 sshd[16759]: Failed password for invalid user lukas from 212.95.137.141 port 42858 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=212.95.137.141
2020-03-26 08:36:56
5.199.135.107 attackbots
Automatic report - XMLRPC Attack
2020-03-26 08:01:26
119.29.107.55 attackspambots
Brute force SMTP login attempted.
...
2020-03-26 08:08:35
222.101.206.56 attackbots
2020-03-26T00:32:23.639491ns386461 sshd\[19280\]: Invalid user bill from 222.101.206.56 port 34228
2020-03-26T00:32:23.644022ns386461 sshd\[19280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.101.206.56
2020-03-26T00:32:26.438110ns386461 sshd\[19280\]: Failed password for invalid user bill from 222.101.206.56 port 34228 ssh2
2020-03-26T00:37:35.287877ns386461 sshd\[23986\]: Invalid user ut from 222.101.206.56 port 34094
2020-03-26T00:37:35.292718ns386461 sshd\[23986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.101.206.56
...
2020-03-26 08:10:51

最近上报的IP列表

188.63.26.252 106.114.32.215 198.235.24.222 104.248.248.6
157.245.96.91 139.59.36.115 114.236.93.69 177.190.67.44
172.210.9.172 2.58.115.100 43.128.81.242 192.109.139.196
44.245.225.158 142.93.213.36 193.112.190.192 183.36.34.69
121.231.113.168 203.25.78.220 43.230.8.77 45.88.91.106