必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Houston

省份(region): Texas

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b'#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       166.88.0.0 - 166.88.255.255
CIDR:           166.88.0.0/16
NetName:        ADCIL
NetHandle:      NET-166-88-0-0-1
Parent:         NET166 (NET-166-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Ace Data Centers II, L.L.C. (ADCIL)
RegDate:        2012-10-26
Updated:        2024-06-01
Comment:        https://www.acedatacenter.com/
Comment:        Geofeed: https://www.acedatacenter.com/geofeed.csv
Ref:            https://rdap.arin.net/registry/ip/166.88.0.0


OrgName:        Ace Data Centers II, L.L.C.
OrgId:          ADCIL
Address:        727 North 1550 East
Address:        Suite 400
City:           Orem
StateProv:      UT
PostalCode:     84097
Country:        US
RegDate:        2020-03-27
Updated:        2026-04-16
Ref:            https://rdap.arin.net/registry/entity/ADCIL


OrgTechHandle: ACEAD-ARIN
OrgTechName:   ACE ADMIN
OrgTechPhone:  +1-801-900-5673 
OrgTechEmail:  admin@acedatacenter.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ACEAD-ARIN

OrgAbuseHandle: ABUSE8727-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-801-851-5540 
OrgAbuseEmail:  ipabuse@acedatacenter.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE8727-ARIN

OrgTechHandle: LOWRY55-ARIN
OrgTechName:   Lowry, Justin 
OrgTechPhone:  +1-801-735-5256 
OrgTechEmail:  justin@acedatacenter.com
OrgTechRef:    https://rdap.arin.net/registry/entity/LOWRY55-ARIN

OrgTechHandle: HEATO37-ARIN
OrgTechName:   Heaton, Zachary 
OrgTechPhone:  +1-801-691-2659 
OrgTechEmail:  zach@acedatacenter.com
OrgTechRef:    https://rdap.arin.net/registry/entity/HEATO37-ARIN

RAbuseHandle: ABUSE8727-ARIN
RAbuseName:   Abuse
RAbusePhone:  +1-801-851-5540 
RAbuseEmail:  ipabuse@acedatacenter.com
RAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE8727-ARIN

# end


# start

NetRange:       166.88.142.0 - 166.88.142.255
CIDR:           166.88.142.0/24
NetName:        SNAJU
NetHandle:      NET-166-88-142-0-1
Parent:         ADCIL (NET-166-88-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   Snaju Development (SNAJU-1)
RegDate:        2024-10-08
Updated:        2024-11-07
Comment:        Geofeed https://dartnode.com/geofeed/csv
Ref:            https://rdap.arin.net/registry/ip/166.88.142.0


OrgName:        Snaju Development
OrgId:          SNAJU-1
Address:        1100 E NASA Parkway Ste 309
City:           Houston
StateProv:      TX
PostalCode:     77058
Country:        US
RegDate:        2022-09-19
Updated:        2025-04-11
Ref:            https://rdap.arin.net/registry/entity/SNAJU-1


OrgNOCHandle: PEDER140-ARIN
OrgNOCName:   Pedersen, Zackary 
OrgNOCPhone:  +1-281-724-4464 
OrgNOCEmail:  zackary@snaju.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/PEDER140-ARIN

OrgAbuseHandle: DARTN-ARIN
OrgAbuseName:   DartNode Abuse
OrgAbusePhone:  +1-713-714-1356 
OrgAbuseEmail:  abuse@dartnode.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/DARTN-ARIN

OrgTechHandle: PEDER140-ARIN
OrgTechName:   Pedersen, Zackary 
OrgTechPhone:  +1-281-724-4464 
OrgTechEmail:  zackary@snaju.com
OrgTechRef:    https://rdap.arin.net/registry/entity/PEDER140-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#'
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.88.142.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50336
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;166.88.142.143.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041800 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 19 00:16:29 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 143.142.88.166.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 143.142.88.166.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
159.203.30.208 attackspam
Apr  3 01:09:47 vpn01 sshd[30851]: Failed password for root from 159.203.30.208 port 43715 ssh2
Apr  3 01:15:06 vpn01 sshd[30930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.30.208
...
2020-04-03 07:42:39
49.232.58.113 attackspam
Apr  3 00:22:01 OPSO sshd\[25483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.58.113  user=root
Apr  3 00:22:03 OPSO sshd\[25483\]: Failed password for root from 49.232.58.113 port 51230 ssh2
Apr  3 00:24:34 OPSO sshd\[25875\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.58.113  user=root
Apr  3 00:24:36 OPSO sshd\[25875\]: Failed password for root from 49.232.58.113 port 49604 ssh2
Apr  3 00:27:00 OPSO sshd\[26413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.58.113  user=root
2020-04-03 07:19:18
51.15.222.27 attackbotsspam
Unauthorized SSH connection attempt
2020-04-03 07:13:54
115.202.84.121 attackbots
2020-04-02T21:51:06.367898 X postfix/smtpd[854752]: lost connection after AUTH from unknown[115.202.84.121]
2020-04-02T21:51:07.131969 X postfix/smtpd[854693]: lost connection after AUTH from unknown[115.202.84.121]
2020-04-02T21:51:07.893507 X postfix/smtpd[854752]: lost connection after AUTH from unknown[115.202.84.121]
2020-04-03 07:26:46
114.119.165.38 attackspambots
[Fri Apr 03 04:51:01.106940 2020] [:error] [pid 13418:tid 139715470677760] [client 114.119.165.38:17276] [client 114.119.165.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/index.php/prakiraan-iklim/agroklimatologi/kalender-tanam/1032-kalender-tanam-katam-terpadu-pulau-jawa/kalender-tanam-katam-terpadu-provinsi-jawa-timur/kalender-tanam-katam-terpadu-kabupaten-pacitan/kalender-tanam-katam-terpadu-kecamatan-punung-kabupaten
...
2020-04-03 07:30:52
122.114.171.57 attack
SSH Login Bruteforce
2020-04-03 07:47:11
23.113.8.248 attack
Apr  2 23:51:32 nextcloud sshd\[11076\]: Invalid user  from 23.113.8.248
Apr  2 23:51:32 nextcloud sshd\[11076\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.113.8.248
Apr  2 23:51:34 nextcloud sshd\[11076\]: Failed password for invalid user  from 23.113.8.248 port 50974 ssh2
2020-04-03 07:07:39
162.243.131.246 attackspambots
" "
2020-04-03 07:33:12
218.92.0.173 attack
2020-04-02T23:08:48.142443dmca.cloudsearch.cf sshd[29625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.173  user=root
2020-04-02T23:08:50.400619dmca.cloudsearch.cf sshd[29625]: Failed password for root from 218.92.0.173 port 65389 ssh2
2020-04-02T23:08:52.935667dmca.cloudsearch.cf sshd[29625]: Failed password for root from 218.92.0.173 port 65389 ssh2
2020-04-02T23:08:48.142443dmca.cloudsearch.cf sshd[29625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.173  user=root
2020-04-02T23:08:50.400619dmca.cloudsearch.cf sshd[29625]: Failed password for root from 218.92.0.173 port 65389 ssh2
2020-04-02T23:08:52.935667dmca.cloudsearch.cf sshd[29625]: Failed password for root from 218.92.0.173 port 65389 ssh2
2020-04-02T23:08:48.142443dmca.cloudsearch.cf sshd[29625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.173  user=root
2020-04-02T23:0
...
2020-04-03 07:13:37
77.93.33.212 attackspambots
$f2bV_matches
2020-04-03 07:38:21
128.199.157.228 attackspam
bruteforce detected
2020-04-03 07:08:51
188.166.16.118 attackbots
Apr  3 00:34:32 ArkNodeAT sshd\[3836\]: Invalid user upload from 188.166.16.118
Apr  3 00:34:32 ArkNodeAT sshd\[3836\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.16.118
Apr  3 00:34:35 ArkNodeAT sshd\[3836\]: Failed password for invalid user upload from 188.166.16.118 port 45534 ssh2
2020-04-03 07:10:32
181.174.84.69 attackspam
Apr  2 22:48:28 124388 sshd[18810]: Failed password for root from 181.174.84.69 port 44964 ssh2
Apr  2 22:52:26 124388 sshd[18861]: Invalid user zihao from 181.174.84.69 port 56424
Apr  2 22:52:26 124388 sshd[18861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.174.84.69
Apr  2 22:52:26 124388 sshd[18861]: Invalid user zihao from 181.174.84.69 port 56424
Apr  2 22:52:27 124388 sshd[18861]: Failed password for invalid user zihao from 181.174.84.69 port 56424 ssh2
2020-04-03 07:25:58
103.48.140.39 attack
Apr  2 17:50:57 Tower sshd[14037]: Connection from 103.48.140.39 port 39380 on 192.168.10.220 port 22 rdomain ""
Apr  2 17:51:00 Tower sshd[14037]: Failed password for root from 103.48.140.39 port 39380 ssh2
Apr  2 17:51:00 Tower sshd[14037]: Received disconnect from 103.48.140.39 port 39380:11: Bye Bye [preauth]
Apr  2 17:51:00 Tower sshd[14037]: Disconnected from authenticating user root 103.48.140.39 port 39380 [preauth]
2020-04-03 07:17:25
64.20.43.233 attack
Apr  2 22:31:40 XXX sshd[19000]: reveeclipse mapping checking getaddrinfo for mail.ecuempresarios.net [64.20.43.233] failed - POSSIBLE BREAK-IN ATTEMPT!
Apr  2 22:31:40 XXX sshd[19000]: User r.r from 64.20.43.233 not allowed because none of user's groups are listed in AllowGroups
Apr  2 22:31:40 XXX sshd[19000]: Received disconnect from 64.20.43.233: 11: Bye Bye [preauth]
Apr  2 22:31:41 XXX sshd[19002]: reveeclipse mapping checking getaddrinfo for mail.ecuempresarios.net [64.20.43.233] failed - POSSIBLE BREAK-IN ATTEMPT!
Apr  2 22:31:41 XXX sshd[19002]: User r.r from 64.20.43.233 not allowed because none of user's groups are listed in AllowGroups
Apr  2 22:31:41 XXX sshd[19002]: Received disconnect from 64.20.43.233: 11: Bye Bye [preauth]
Apr  2 22:31:42 XXX sshd[19006]: reveeclipse mapping checking getaddrinfo for mail.ecuempresarios.net [64.20.43.233] failed - POSSIBLE BREAK-IN ATTEMPT!
Apr  2 22:31:42 XXX sshd[19006]: User r.r from 64.20.43.233 not allowed because n........
-------------------------------
2020-04-03 07:46:34

最近上报的IP列表

2606:4700:10::6814:4899 110.78.150.162 2606:4700:10::6816:1235 2606:4700:10::6816:4905
66.132.195.103 222.199.16.39 116.204.183.163 116.204.183.187
2606:4700:10::6814:5922 2606:4700:10::6814:6162 2606:4700:10::6816:3845 35.249.72.11
192.71.126.151 114.32.76.133 109.162.246.95 2606:4700:10::6816:2894
2606:4700:10::6814:7687 2606:4700:10::6814:4608 2606:4700:10::6816:2464 164.155.74.156