必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       157.254.0.0 - 157.254.255.255
CIDR:           157.254.0.0/16
NetName:        VANTIVA
NetHandle:      NET-157-254-0-0-1
Parent:         NET157 (NET-157-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Vantiva USA Shared Services Inc. (TU-310-Z)
RegDate:        1992-02-08
Updated:        2024-01-03
Ref:            https://rdap.arin.net/registry/ip/157.254.0.0


OrgName:        Vantiva USA Shared Services Inc.
OrgId:          TU-310-Z
Address:        4855 Peachtree Industrial Blvd., Suite 200
City:           Norcross
StateProv:      GA
PostalCode:     30092
Country:        US
RegDate:        2021-07-06
Updated:        2024-01-03
Ref:            https://rdap.arin.net/registry/entity/TU-310-Z


OrgTechHandle: RIRAD2-ARIN
OrgTechName:   RIR Admin
OrgTechPhone:  +1-818-397-8360 
OrgTechEmail:  rradmin@vantiva.com
OrgTechRef:    https://rdap.arin.net/registry/entity/RIRAD2-ARIN

OrgAbuseHandle: ABUSE8923-ARIN
OrgAbuseName:   Abuse Admin
OrgAbusePhone:  +1-818-397-8360 
OrgAbuseEmail:  Abuse@vantiva.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE8923-ARIN

OrgRoutingHandle: IST36-ARIN
OrgRoutingName:   IPXO Support Team
OrgRoutingPhone:  +1 (650) 564-3425  
OrgRoutingEmail:  support@ipxo.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/IST36-ARIN

# end


# start

NetRange:       157.254.0.0 - 157.254.127.255
CIDR:           157.254.0.0/17
NetName:        IPXO-157-254-0-0-17
NetHandle:      NET-157-254-0-0-2
Parent:         VANTIVA (NET-157-254-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   IPXO LLC (IL-845)
RegDate:        2022-01-12
Updated:        2024-04-23
Ref:            https://rdap.arin.net/registry/ip/157.254.0.0



OrgName:        IPXO LLC
OrgId:          IL-845
Address:        3132 State Street
City:           Dallas
StateProv:      TX
PostalCode:     75204-3500
Country:        US
RegDate:        2021-03-25
Updated:        2025-09-10
Comment:        Geofeed https://geofeed.ipxo.com/geofeed.txt
Ref:            https://rdap.arin.net/registry/entity/IL-845


OrgAbuseHandle: IAMT1-ARIN
OrgAbuseName:   IPXO Abuse Management Team
OrgAbusePhone:  +1 (650) 934-1667 
OrgAbuseEmail:  abuse@ipxo.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/IAMT1-ARIN

OrgDNSHandle: IST36-ARIN
OrgDNSName:   IPXO Support Team
OrgDNSPhone:  +1 (650) 564-3425  
OrgDNSEmail:  support@ipxo.com
OrgDNSRef:    https://rdap.arin.net/registry/entity/IST36-ARIN

OrgTechHandle: IST36-ARIN
OrgTechName:   IPXO Support Team
OrgTechPhone:  +1 (650) 564-3425  
OrgTechEmail:  support@ipxo.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IST36-ARIN

# end


# start

NetRange:       157.254.0.0 - 157.254.127.255
CIDR:           157.254.0.0/17
NetName:        NETUTILS
NetHandle:      NET-157-254-0-0-3
Parent:         IPXO-157-254-0-0-17 (NET-157-254-0-0-2)
NetType:        Reallocated
OriginAS:       
Organization:   Internet Utilities NA LLC (DCL-577)
RegDate:        2025-01-07
Updated:        2025-01-07
Ref:            https://rdap.arin.net/registry/ip/157.254.0.0



OrgName:        Internet Utilities NA LLC
OrgId:          DCL-577
Address:        2711 Centerville Road
City:           Wilmington
StateProv:      DE
PostalCode:     19808
Country:        US
RegDate:        2015-11-18
Updated:        2024-08-23
Ref:            https://rdap.arin.net/registry/entity/DCL-577


OrgTechHandle: IUS-ARIN
OrgTechName:   Internet Utilities Support
OrgTechPhone:  +1-650-564-3425 
OrgTechEmail:  support@netutils.io
OrgTechRef:    https://rdap.arin.net/registry/entity/IUS-ARIN

OrgAbuseHandle: IUA-ARIN
OrgAbuseName:   Internet Utilities Abuse
OrgAbusePhone:  +1-650-934-1667 
OrgAbuseEmail:  report@abuseradar.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/IUA-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.254.38.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32561
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;157.254.38.118.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026052203 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 23 09:02:24 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 118.38.254.157.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 118.38.254.157.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
81.22.45.107 attack
2019-10-11T07:29:28.815261+02:00 lumpi kernel: [594183.923298] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.107 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=59376 PROTO=TCP SPT=49905 DPT=1480 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-10-11 13:42:00
123.207.153.52 attack
Oct 11 07:08:39 vps01 sshd[10358]: Failed password for root from 123.207.153.52 port 46060 ssh2
2019-10-11 13:14:50
51.255.168.127 attackbotsspam
Oct 11 07:14:36 SilenceServices sshd[947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.168.127
Oct 11 07:14:38 SilenceServices sshd[947]: Failed password for invalid user Emanuel@2017 from 51.255.168.127 port 49326 ssh2
Oct 11 07:18:49 SilenceServices sshd[2087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.168.127
2019-10-11 13:41:10
218.92.0.141 attackbotsspam
Oct 10 23:57:13 ast sshd[16488]: error: PAM: Authentication failure for root from 218.92.0.141
Oct 10 23:57:17 ast sshd[16488]: error: PAM: Authentication failure for root from 218.92.0.141
Oct 10 23:57:13 ast sshd[16488]: error: PAM: Authentication failure for root from 218.92.0.141
Oct 10 23:57:17 ast sshd[16488]: error: PAM: Authentication failure for root from 218.92.0.141
Oct 10 23:57:13 ast sshd[16488]: error: PAM: Authentication failure for root from 218.92.0.141
Oct 10 23:57:17 ast sshd[16488]: error: PAM: Authentication failure for root from 218.92.0.141
Oct 10 23:57:21 ast sshd[16488]: error: PAM: Authentication failure for root from 218.92.0.141
...
2019-10-11 13:14:17
31.14.135.117 attack
Oct 11 06:47:41 www sshd\[21993\]: Failed password for root from 31.14.135.117 port 51184 ssh2Oct 11 06:51:44 www sshd\[22175\]: Failed password for root from 31.14.135.117 port 34538 ssh2Oct 11 06:56:00 www sshd\[22365\]: Failed password for root from 31.14.135.117 port 46120 ssh2
...
2019-10-11 14:01:54
104.197.58.239 attack
ssh failed login
2019-10-11 13:18:31
45.64.104.167 attackspam
Automatic report - XMLRPC Attack
2019-10-11 13:09:32
200.56.60.44 attack
Oct 10 17:47:35 kapalua sshd\[2976\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.56.60.44  user=root
Oct 10 17:47:37 kapalua sshd\[2976\]: Failed password for root from 200.56.60.44 port 26689 ssh2
Oct 10 17:52:20 kapalua sshd\[3382\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.56.60.44  user=root
Oct 10 17:52:22 kapalua sshd\[3382\]: Failed password for root from 200.56.60.44 port 55671 ssh2
Oct 10 17:57:06 kapalua sshd\[3770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.56.60.44  user=root
2019-10-11 13:21:45
112.169.9.150 attackbotsspam
Automatic report - Banned IP Access
2019-10-11 13:15:53
103.205.68.2 attackspambots
Sep 12 07:30:05 microserver sshd[46736]: Invalid user minecraft from 103.205.68.2 port 48268
Sep 12 07:30:05 microserver sshd[46736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.205.68.2
Sep 12 07:30:07 microserver sshd[46736]: Failed password for invalid user minecraft from 103.205.68.2 port 48268 ssh2
Sep 12 07:36:52 microserver sshd[47938]: Invalid user test from 103.205.68.2 port 53722
Sep 12 07:36:52 microserver sshd[47938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.205.68.2
Sep 12 07:50:20 microserver sshd[49648]: Invalid user admin from 103.205.68.2 port 36376
Sep 12 07:50:20 microserver sshd[49648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.205.68.2
Sep 12 07:50:22 microserver sshd[49648]: Failed password for invalid user admin from 103.205.68.2 port 36376 ssh2
Sep 12 07:57:13 microserver sshd[50767]: Invalid user ftpuser2 from 103.205.68.2 port 41818
Sep
2019-10-11 13:05:16
142.93.235.214 attackspambots
Oct 11 06:52:48 www sshd\[128267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.235.214  user=root
Oct 11 06:52:49 www sshd\[128267\]: Failed password for root from 142.93.235.214 port 44348 ssh2
Oct 11 06:56:11 www sshd\[128313\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.235.214  user=root
...
2019-10-11 13:55:05
101.251.72.205 attack
Oct 11 07:14:53 www sshd\[93722\]: Invalid user Contrasena! from 101.251.72.205
Oct 11 07:14:53 www sshd\[93722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.251.72.205
Oct 11 07:14:54 www sshd\[93722\]: Failed password for invalid user Contrasena! from 101.251.72.205 port 50906 ssh2
...
2019-10-11 13:24:25
180.253.224.12 attackbotsspam
19/10/10@23:56:12: FAIL: Alarm-Intrusion address from=180.253.224.12
...
2019-10-11 13:54:40
83.171.107.216 attackbots
2019-10-11T05:01:53.644494abusebot-2.cloudsearch.cf sshd\[14589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ppp.83-171-107-216.pppoe.avangarddsl.ru  user=root
2019-10-11 13:51:02
115.238.236.74 attackspam
Oct 11 07:05:52 localhost sshd\[20690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.238.236.74  user=root
Oct 11 07:05:54 localhost sshd\[20690\]: Failed password for root from 115.238.236.74 port 7451 ssh2
Oct 11 07:10:08 localhost sshd\[21143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.238.236.74  user=root
2019-10-11 13:58:13

最近上报的IP列表

121.234.219.86 2606:4700:10::6814:9322 23.94.204.22 206.189.42.12
110.78.138.173 2606:4700:10::6816:510 2606:4700:10::6816:4688 185.93.89.154
183.153.102.240 2606:4700:10::6816:2151 2606:4700:10::6814:7197 2606:4700:10::6814:6667
221.207.34.16 180.95.238.114 139.212.69.208 101.71.221.1
2606:4700:10::ac43:666 94.231.206.201 94.231.206.158 2606:4700:10::6814:6450