必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): North Bergen

省份(region): New Jersey

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
159.65.217.130 attackspambots
SSH_attack
2020-06-24 19:31:46
159.65.217.53 attackbots
05/29/2020-09:41:10.680538 159.65.217.53 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-29 22:43:58
159.65.217.53 attackbotsspam
" "
2020-05-22 23:37:10
159.65.217.53 attackspam
firewall-block, port(s): 870/tcp
2020-05-20 11:19:43
159.65.217.53 attack
2020-05-14T12:38:49.164834shield sshd\[6140\]: Invalid user zjb from 159.65.217.53 port 37122
2020-05-14T12:38:49.175861shield sshd\[6140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.217.53
2020-05-14T12:38:50.992851shield sshd\[6140\]: Failed password for invalid user zjb from 159.65.217.53 port 37122 ssh2
2020-05-14T12:43:22.648807shield sshd\[7992\]: Invalid user admin from 159.65.217.53 port 44658
2020-05-14T12:43:22.652824shield sshd\[7992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.217.53
2020-05-14 22:54:24
159.65.217.53 attackbots
(sshd) Failed SSH login from 159.65.217.53 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May  7 20:11:48 s1 sshd[4884]: Invalid user tfs from 159.65.217.53 port 46536
May  7 20:11:50 s1 sshd[4884]: Failed password for invalid user tfs from 159.65.217.53 port 46536 ssh2
May  7 20:21:35 s1 sshd[5060]: Invalid user ftpadmin from 159.65.217.53 port 35214
May  7 20:21:37 s1 sshd[5060]: Failed password for invalid user ftpadmin from 159.65.217.53 port 35214 ssh2
May  7 20:26:49 s1 sshd[5161]: Invalid user syed from 159.65.217.53 port 44368
2020-05-08 02:22:19
159.65.217.53 attackbots
Apr 21 16:42:15 *** sshd[20369]: Invalid user ci from 159.65.217.53
2020-04-22 02:17:47
159.65.217.53 attackspam
Apr 20 21:56:58 host5 sshd[7261]: Invalid user ubuntu from 159.65.217.53 port 50294
...
2020-04-21 04:57:59
159.65.217.53 attack
Invalid user gf from 159.65.217.53 port 41960
2020-04-20 21:25:03
159.65.217.53 attackbotsspam
SSH Brute-Force attacks
2020-04-20 19:24:21
159.65.217.53 attack
2020-04-14T15:23:40.704879linuxbox-skyline sshd[125232]: Invalid user asecruc from 159.65.217.53 port 60050
...
2020-04-15 05:54:30
159.65.217.130 attackbotsspam
Port 22 Scan, PTR: None
2020-04-08 02:25:40
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       159.65.0.0 - 159.65.255.255
CIDR:           159.65.0.0/16
NetName:        DIGITALOCEAN-159-65-0-0
NetHandle:      NET-159-65-0-0-1
Parent:         NET159 (NET-159-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   DigitalOcean, LLC (DO-13)
RegDate:        2017-10-24
Updated:        2020-04-03
Comment:        Routing and Peering Policy can be found at https://www.as14061.net
Comment:        
Comment:        Please submit abuse reports at https://www.digitalocean.com/company/contact/#abuse
Ref:            https://rdap.arin.net/registry/ip/159.65.0.0



OrgName:        DigitalOcean, LLC
OrgId:          DO-13
Address:        105 Edgeview Drive, Suite 425
City:           Broomfield
StateProv:      CO
PostalCode:     80021
Country:        US
RegDate:        2012-05-14
Updated:        2025-04-11
Ref:            https://rdap.arin.net/registry/entity/DO-13


OrgTechHandle: NOC32014-ARIN
OrgTechName:   Network Operations Center
OrgTechPhone:  +1-646-827-4366 
OrgTechEmail:  noc@digitalocean.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC32014-ARIN

OrgAbuseHandle: DIGIT19-ARIN
OrgAbuseName:   DigitalOcean Abuse
OrgAbusePhone:  +1-646-827-4366 
OrgAbuseEmail:  abuse@digitalocean.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/DIGIT19-ARIN

OrgNOCHandle: NOC32014-ARIN
OrgNOCName:   Network Operations Center
OrgNOCPhone:  +1-646-827-4366 
OrgNOCEmail:  noc@digitalocean.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/NOC32014-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.65.217.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64405
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.65.217.21.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026012300 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 23 21:31:28 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 21.217.65.159.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.217.65.159.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.69.20.38 attackspambots
Autoban   103.69.20.38 AUTH/CONNECT
2019-11-18 18:01:39
85.12.245.153 attackspam
Autoban   85.12.245.153 ABORTED AUTH
2019-11-18 18:24:58
103.87.160.10 attackbotsspam
Autoban   103.87.160.10 AUTH/CONNECT
2019-11-18 17:47:06
103.84.39.49 attackspam
Autoban   103.84.39.49 AUTH/CONNECT
2019-11-18 17:48:21
91.92.209.25 attack
Autoban   91.92.209.25 ABORTED AUTH
2019-11-18 18:18:15
82.208.65.46 attack
Autoban   82.208.65.46 ABORTED AUTH
2019-11-18 18:26:18
159.203.201.9 attack
11/18/2019-03:04:23.388255 159.203.201.9 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-18 18:03:36
103.81.114.182 attackspam
proto=tcp  .  spt=44539  .  dpt=25  .     (Found on   Dark List de Nov 18)     (302)
2019-11-18 17:53:35
103.55.215.134 attackbots
Autoban   103.55.215.134 AUTH/CONNECT
2019-11-18 18:11:02
95.53.244.33 attackspambots
Autoban   95.53.244.33 ABORTED AUTH
2019-11-18 18:16:38
103.42.216.102 attack
Autoban   103.42.216.102 AUTH/CONNECT
2019-11-18 18:25:34
92.126.222.172 attack
Autoban   92.126.222.172 ABORTED AUTH
2019-11-18 18:17:31
103.50.146.22 attack
Autoban   103.50.146.22 AUTH/CONNECT
2019-11-18 18:13:35
103.54.86.58 attackbotsspam
Autoban   103.54.86.58 AUTH/CONNECT
2019-11-18 18:11:41
103.61.198.122 attackbots
Autoban   103.61.198.122 AUTH/CONNECT
2019-11-18 18:03:51

最近上报的IP列表

220.195.106.175 111.57.88.52 127.120.36.12 199.45.155.81
115.45.40.107 167.88.164.159 159.223.168.77 185.247.137.49
143.198.122.12 142.93.249.216 146.190.121.77 138.68.45.44
192.241.159.109 216.180.246.165 204.48.23.79 159.65.223.227
157.245.240.222 27.46.125.162 165.227.90.199 1.12.229.45