必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): San Jose

省份(region): California

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       165.1.64.0 - 165.1.127.255
CIDR:           165.1.64.0/18
NetName:        ORACLE-4
NetHandle:      NET-165-1-64-0-1
Parent:         NET165 (NET-165-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Oracle Corporation (ORACLE-4)
RegDate:        2022-07-28
Updated:        2022-07-28
Ref:            https://rdap.arin.net/registry/ip/165.1.64.0


OrgName:        Oracle Corporation
OrgId:          ORACLE-4
Address:        2300 Oracle Way
Address:        Attn: Domain Administrator
City:           Austin
StateProv:      TX
PostalCode:     78741
Country:        US
RegDate:        1988-04-29
Updated:        2024-11-07
Ref:            https://rdap.arin.net/registry/entity/ORACLE-4


OrgTechHandle: ORACL1-ARIN
OrgTechName:   ORACLE NIS
OrgTechPhone:  +1-800-633-0738 
OrgTechEmail:  domain-contact_ww_grp@oracle.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ORACL1-ARIN

OrgRoutingHandle: ORACL2-ARIN
OrgRoutingName:   ORACLEROUTING
OrgRoutingPhone:  +1-800-392-2999 
OrgRoutingEmail:  network-contact_ww@oracle.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/ORACL2-ARIN

OrgAbuseHandle: NISAM-ARIN
OrgAbuseName:   Network Information Systems Abuse Management
OrgAbusePhone:  +1-800-633-0738 
OrgAbuseEmail:  abuse@oracleemaildelivery.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/NISAM-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 165.1.75.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36049
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;165.1.75.130.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026021601 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 17 07:43:26 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
Host 130.75.1.165.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 130.75.1.165.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
87.71.80.132 attackspambots
Unauthorized connection attempt detected from IP address 87.71.80.132 to port 445
2019-12-26 16:31:41
152.136.134.111 attack
Dec 26 09:09:44 v22018086721571380 sshd[5189]: Failed password for invalid user weigle from 152.136.134.111 port 33928 ssh2
2019-12-26 16:30:42
62.234.154.222 attackspam
Dec 26 07:27:34 icinga sshd[27478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.154.222
Dec 26 07:27:36 icinga sshd[27478]: Failed password for invalid user apache from 62.234.154.222 port 43813 ssh2
...
2019-12-26 16:23:44
87.239.242.115 attackspam
2323/tcp 5500/tcp...
[2019-12-13/24]4pkt,2pt.(tcp)
2019-12-26 16:43:13
103.3.226.166 attackspam
Automatic report - SSH Brute-Force Attack
2019-12-26 16:37:54
106.13.45.212 attackspam
Dec 26 07:50:53 DAAP sshd[3748]: Invalid user wwwrun from 106.13.45.212 port 53812
Dec 26 07:50:53 DAAP sshd[3748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.45.212
Dec 26 07:50:53 DAAP sshd[3748]: Invalid user wwwrun from 106.13.45.212 port 53812
Dec 26 07:50:55 DAAP sshd[3748]: Failed password for invalid user wwwrun from 106.13.45.212 port 53812 ssh2
Dec 26 07:53:53 DAAP sshd[3781]: Invalid user mysql from 106.13.45.212 port 46884
...
2019-12-26 16:22:53
218.92.0.155 attackbots
Dec 26 09:53:15 icinga sshd[9055]: Failed password for root from 218.92.0.155 port 23109 ssh2
Dec 26 09:53:30 icinga sshd[9055]: error: maximum authentication attempts exceeded for root from 218.92.0.155 port 23109 ssh2 [preauth]
...
2019-12-26 16:54:15
14.161.45.83 attackspambots
This IP Address sent many spam to @bit.co.id
mhamdanrifai@gmail.com is administrator
2019-12-26 16:32:50
218.92.0.168 attack
Dec 26 09:37:37 sip sshd[26725]: Failed password for root from 218.92.0.168 port 9250 ssh2
Dec 26 09:37:41 sip sshd[26725]: Failed password for root from 218.92.0.168 port 9250 ssh2
Dec 26 09:37:52 sip sshd[26725]: Failed password for root from 218.92.0.168 port 9250 ssh2
Dec 26 09:37:52 sip sshd[26725]: error: maximum authentication attempts exceeded for root from 218.92.0.168 port 9250 ssh2 [preauth]
2019-12-26 16:42:47
185.231.153.67 attack
RU email_SPAM
2019-12-26 16:28:54
117.220.177.123 attackspam
Unauthorized connection attempt detected from IP address 117.220.177.123 to port 445
2019-12-26 16:22:04
147.139.136.237 attackspambots
Dec 26 08:59:41 sd-53420 sshd\[17767\]: Invalid user rashawn from 147.139.136.237
Dec 26 08:59:41 sd-53420 sshd\[17767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.139.136.237
Dec 26 08:59:43 sd-53420 sshd\[17767\]: Failed password for invalid user rashawn from 147.139.136.237 port 38948 ssh2
Dec 26 09:01:49 sd-53420 sshd\[18592\]: Invalid user sidarta from 147.139.136.237
Dec 26 09:01:49 sd-53420 sshd\[18592\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.139.136.237
...
2019-12-26 16:52:01
182.53.96.198 attack
Unauthorized connection attempt detected from IP address 182.53.96.198 to port 445
2019-12-26 16:25:50
91.212.150.151 attackbots
Dec 26 06:27:28 thevastnessof sshd[19537]: Failed password for root from 91.212.150.151 port 33874 ssh2
...
2019-12-26 16:42:05
209.17.96.162 attack
8443/tcp 137/udp 4443/tcp...
[2019-10-24/12-24]61pkt,12pt.(tcp),1pt.(udp)
2019-12-26 16:38:47

最近上报的IP列表

121.230.89.185 121.234.219.127 2606:4700:10::6816:2031 2606:4700:10::6814:8117
2606:4700:10::6816:1320 2606:4700:10::6814:7090 2606:4700:10::6816:4495 2606:4700:10::6814:8593
2606:4700:10::6814:5902 2606:4700:10::6814:9534 2606:4700:10::6814:6400 2606:4700:10::6816:4899
2606:4700:10::6814:7581 2606:4700:10::6816:744 2606:4700:10::6816:1644 109.167.82.55
64.247.196.28 40.124.185.240 198.199.71.45 2606:4700:10::6816:3413