必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       162.63.0.0 - 162.63.255.255
CIDR:           162.63.0.0/16
NetName:        PWNET2
NetHandle:      NET-162-63-0-0-1
Parent:         NET162 (NET-162-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   UBS AG (UBSAG)
RegDate:        1992-08-12
Updated:        2021-12-14
Ref:            https://rdap.arin.net/registry/ip/162.63.0.0


OrgName:        UBS AG
OrgId:          UBSAG
Address:        677 Washington Boulevard
City:           Stamford
StateProv:      CT
PostalCode:     06901
Country:        US
RegDate:        2006-06-07
Updated:        2020-08-17
Ref:            https://rdap.arin.net/registry/entity/UBSAG


OrgNOCHandle: UBSHO-ARIN
OrgNOCName:   UBS Hostmaster
OrgNOCPhone:  +41 1 23 61629 
OrgNOCEmail:  hostmaster@ubs.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/UBSHO-ARIN

OrgRoutingHandle: UBSHO-ARIN
OrgRoutingName:   UBS Hostmaster
OrgRoutingPhone:  +41 1 23 61629 
OrgRoutingEmail:  hostmaster@ubs.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/UBSHO-ARIN

OrgDNSHandle: UBSHO-ARIN
OrgDNSName:   UBS Hostmaster
OrgDNSPhone:  +41 1 23 61629 
OrgDNSEmail:  hostmaster@ubs.com
OrgDNSRef:    https://rdap.arin.net/registry/entity/UBSHO-ARIN

OrgTechHandle: UBSHO-ARIN
OrgTechName:   UBS Hostmaster
OrgTechPhone:  +41 1 23 61629 
OrgTechEmail:  hostmaster@ubs.com
OrgTechRef:    https://rdap.arin.net/registry/entity/UBSHO-ARIN

OrgAbuseHandle: ABUSE5252-ARIN
OrgAbuseName:   Abuse Team
OrgAbusePhone:  +41442361629 
OrgAbuseEmail:  abuse-network@ubs.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE5252-ARIN

RTechHandle: UBSHO-ARIN
RTechName:   UBS Hostmaster
RTechPhone:  +41 1 23 61629 
RTechEmail:  hostmaster@ubs.com
RTechRef:    https://rdap.arin.net/registry/entity/UBSHO-ARIN

RNOCHandle: UBSHO-ARIN
RNOCName:   UBS Hostmaster
RNOCPhone:  +41 1 23 61629 
RNOCEmail:  hostmaster@ubs.com
RNOCRef:    https://rdap.arin.net/registry/entity/UBSHO-ARIN

RAbuseHandle: ABUSE5252-ARIN
RAbuseName:   Abuse Team
RAbusePhone:  +41442361629 
RAbuseEmail:  abuse-network@ubs.com
RAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE5252-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 162.63.216.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47916
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;162.63.216.193.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042500 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 25 20:27:35 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 193.216.63.162.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 193.216.63.162.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
113.124.94.186 attackbotsspam
Apr 14 05:34:28 our-server-hostname postfix/smtpd[6698]: connect from unknown[113.124.94.186]
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.124.94.186
2020-04-14 08:36:58
106.13.34.173 attack
Automatic report BANNED IP
2020-04-14 08:16:18
117.50.96.235 attackbots
Apr 14 02:14:04 nextcloud sshd\[3384\]: Invalid user gabrielle from 117.50.96.235
Apr 14 02:14:04 nextcloud sshd\[3384\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.96.235
Apr 14 02:14:06 nextcloud sshd\[3384\]: Failed password for invalid user gabrielle from 117.50.96.235 port 41260 ssh2
2020-04-14 08:36:31
104.248.37.217 attack
xmlrpc attack
2020-04-14 08:26:20
5.135.164.126 attackspambots
Automatic report - WordPress Brute Force
2020-04-14 08:25:00
177.38.187.251 attackspambots
Invalid user git from 177.38.187.251 port 55374
2020-04-14 08:40:06
175.24.83.214 attack
2020-04-13T12:49:10.7640821495-001 sshd[5368]: Invalid user admin from 175.24.83.214 port 43494
2020-04-13T12:49:13.0377751495-001 sshd[5368]: Failed password for invalid user admin from 175.24.83.214 port 43494 ssh2
2020-04-13T12:51:47.2246631495-001 sshd[5494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.83.214  user=root
2020-04-13T12:51:49.7157101495-001 sshd[5494]: Failed password for root from 175.24.83.214 port 43110 ssh2
2020-04-13T12:54:41.5375321495-001 sshd[5596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.83.214  user=root
2020-04-13T12:54:43.9130281495-001 sshd[5596]: Failed password for root from 175.24.83.214 port 42740 ssh2
...
2020-04-14 08:42:48
45.143.220.209 attackspambots
[2020-04-13 20:30:23] NOTICE[1170][C-000001a6] chan_sip.c: Call from '' (45.143.220.209:56612) to extension '011441205804657' rejected because extension not found in context 'public'.
[2020-04-13 20:30:23] SECURITY[1184] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-13T20:30:23.699-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441205804657",SessionID="0x7f6c0838c568",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.220.209/56612",ACLName="no_extension_match"
[2020-04-13 20:31:10] NOTICE[1170][C-000001a7] chan_sip.c: Call from '' (45.143.220.209:62934) to extension '9011441205804657' rejected because extension not found in context 'public'.
[2020-04-13 20:31:10] SECURITY[1184] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-13T20:31:10.985-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011441205804657",SessionID="0x7f6c0838c568",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4
...
2020-04-14 08:45:14
200.133.39.71 attackbots
(sshd) Failed SSH login from 200.133.39.71 (BR/Brazil/200-133-39-71.compute.rnp.br): 5 in the last 3600 secs
2020-04-14 08:19:03
192.144.132.172 attackbots
Apr 14 08:52:34 gw1 sshd[7577]: Failed password for root from 192.144.132.172 port 37400 ssh2
Apr 14 08:55:35 gw1 sshd[7658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.132.172
...
2020-04-14 12:09:02
185.59.66.233 attackbotsspam
185.59.66.233 - - [13/Apr/2020:19:11:26 +0200] "POST /boaform/admin/formPing HTTP/1.1" 400 0 "-" "polaris botnet"
2020-04-14 08:33:06
119.198.85.191 attackspam
2020-04-14T02:08:26.347328librenms sshd[21015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.198.85.191  user=root
2020-04-14T02:08:28.503782librenms sshd[21015]: Failed password for root from 119.198.85.191 port 52028 ssh2
2020-04-14T02:10:41.296562librenms sshd[21450]: Invalid user d from 119.198.85.191 port 58064
...
2020-04-14 08:25:54
14.29.250.133 attackspam
Apr 14 03:48:10 game-panel sshd[22282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.250.133
Apr 14 03:48:13 game-panel sshd[22282]: Failed password for invalid user 123456 from 14.29.250.133 port 44317 ssh2
Apr 14 03:55:45 game-panel sshd[22578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.250.133
2020-04-14 12:00:36
92.118.161.1 attackbots
Honeypot attack, port: 135, PTR: 92.118.161.1.netsystemsresearch.com.
2020-04-14 08:37:12
118.187.5.37 attackspam
Invalid user sun from 118.187.5.37 port 43190
2020-04-14 12:07:01

最近上报的IP列表

68.183.223.205 91.196.152.156 20.65.194.105 161.35.70.8
27.115.124.159 26.134.42.148 72.255.32.50 45.142.154.103
192.175.111.232 123.14.90.33 2606:4700:10::6814:8913 8.36.72.235
123.51.239.160 148.135.115.106 66.132.172.142 185.242.3.48
2606:4700:10::6814:6592 2606:4700:10::6814:5595 2606:4700:10::6814:6229 2606:4700:10::6816:1155