必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Seoul

省份(region): Seoul Special City

国家(country): South Korea

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       168.93.192.0 - 168.93.255.255
CIDR:           168.93.192.0/18
NetName:        ADCIL
NetHandle:      NET-168-93-192-0-1
Parent:         NET168 (NET-168-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Ace Data Centers II, L.L.C. (ADCIL)
RegDate:        2024-04-17
Updated:        2024-05-30
Comment:        https://www.acedatacenter.com/
Comment:        Geofeed: https://www.acedatacenter.com/geofeed.csv
Ref:            https://rdap.arin.net/registry/ip/168.93.192.0


OrgName:        Ace Data Centers II, L.L.C.
OrgId:          ADCIL
Address:        727 North 1550 East
Address:        Suite 400
City:           Orem
StateProv:      UT
PostalCode:     84097
Country:        US
RegDate:        2020-03-27
Updated:        2026-04-20
Ref:            https://rdap.arin.net/registry/entity/ADCIL


OrgTechHandle: ACEAD-ARIN
OrgTechName:   ACE ADMIN
OrgTechPhone:  +1-801-900-5673 
OrgTechEmail:  admin@acedatacenter.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ACEAD-ARIN

OrgAbuseHandle: ABUSE8727-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-801-851-5540 
OrgAbuseEmail:  ipabuse@acedatacenter.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE8727-ARIN

OrgTechHandle: LOWRY55-ARIN
OrgTechName:   Lowry, Justin 
OrgTechPhone:  +1-801-735-5256 
OrgTechEmail:  justin@acedatacenter.com
OrgTechRef:    https://rdap.arin.net/registry/entity/LOWRY55-ARIN

RAbuseHandle: ABUSE8727-ARIN
RAbuseName:   Abuse
RAbusePhone:  +1-801-851-5540 
RAbuseEmail:  ipabuse@acedatacenter.com
RAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE8727-ARIN

# end


# start

NetRange:       168.93.224.0 - 168.93.224.255
CIDR:           168.93.224.0/24
NetName:        EVOXT
NetHandle:      NET-168-93-224-0-1
Parent:         ADCIL (NET-168-93-192-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   Evoxt (KR) (EK-29)
RegDate:        2025-11-25
Updated:        2025-11-25
Comment:        Geofeed :https://raw.githubusercontent.com/evoxt/geofeed/main/geofeed.csv
Ref:            https://rdap.arin.net/registry/ip/168.93.224.0


OrgName:        Evoxt (KR)
OrgId:          EK-29
Address:        189 Gasan digital 1-ro
City:           Seoul
StateProv:      Geumcheon-gu
PostalCode:     08503
Country:        KR
RegDate:        2025-08-04
Updated:        2025-08-05
Ref:            https://rdap.arin.net/registry/entity/EK-29


OrgDNSHandle: KEAC-ARIN
OrgDNSName:   KR Evoxt, Abuse Contact 
OrgDNSPhone:  +601158988860 
OrgDNSEmail:  abuse@evoxt.com
OrgDNSRef:    https://rdap.arin.net/registry/entity/KEAC-ARIN

OrgRoutingHandle: KEAC-ARIN
OrgRoutingName:   KR Evoxt, Abuse Contact 
OrgRoutingPhone:  +601158988860 
OrgRoutingEmail:  abuse@evoxt.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/KEAC-ARIN

OrgNOCHandle: KEAC-ARIN
OrgNOCName:   KR Evoxt, Abuse Contact 
OrgNOCPhone:  +601158988860 
OrgNOCEmail:  abuse@evoxt.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/KEAC-ARIN

OrgTechHandle: KEAC-ARIN
OrgTechName:   KR Evoxt, Abuse Contact 
OrgTechPhone:  +601158988860 
OrgTechEmail:  abuse@evoxt.com
OrgTechRef:    https://rdap.arin.net/registry/entity/KEAC-ARIN

OrgAbuseHandle: KEAC-ARIN
OrgAbuseName:   KR Evoxt, Abuse Contact 
OrgAbusePhone:  +601158988860 
OrgAbuseEmail:  abuse@evoxt.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/KEAC-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 168.93.224.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17795
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;168.93.224.221.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026050400 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 04 21:30:19 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
221.224.93.168.in-addr.arpa domain name pointer 168-93-224-221.aceips.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
221.224.93.168.in-addr.arpa	name = 168-93-224-221.aceips.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.173.154 attack
Dec 23 19:53:55 firewall sshd[24627]: Failed password for root from 222.186.173.154 port 6474 ssh2
Dec 23 19:54:07 firewall sshd[24627]: error: maximum authentication attempts exceeded for root from 222.186.173.154 port 6474 ssh2 [preauth]
Dec 23 19:54:07 firewall sshd[24627]: Disconnecting: Too many authentication failures [preauth]
...
2019-12-24 06:54:51
27.115.124.6 attack
27.115.124.6 - - [23/Dec/2019:23:48:52 +0100] "GET / HTTP/1.0" 403 141 "-" "-"
27.115.124.6 - - [23/Dec/2019:23:49:03 +0100] "GET / HTTP/1.0" 403 3132 "-" "-"
27.115.124.6 - - [23/Dec/2019:23:49:03 +0100] "GET /nmaplowercheck1577141342 HTTP/1.1" 403 3132 "-" "Mozilla/5.0 (compatible; Nmap Scripting Engine; https://nmap.org/book/nse.html)"
27.115.124.6 - - [23/Dec/2019:23:49:04 +0100] "GET / HTTP/1.1" 403 3132 "-" "-"
27.115.124.6 - - [23/Dec/2019:23:49:04 +0100] "GET /HNAP1 HTTP/1.1" 403 3132 "-" "Mozilla/5.0 (compatible; Nmap Scripting Engine; https://nmap.org/book/nse.html)"
...
2019-12-24 06:59:50
81.249.131.18 attack
20 attempts against mh-ssh on cloud.magehost.pro
2019-12-24 06:53:30
222.87.37.54 attack
" "
2019-12-24 06:48:06
187.1.162.224 attackbots
Unauthorized connection attempt detected from IP address 187.1.162.224 to port 445
2019-12-24 07:01:08
41.63.1.40 attackspam
--- report ---
Dec 23 18:53:54 sshd: Connection from 41.63.1.40 port 62902
Dec 23 18:54:15 sshd: Invalid user odsbu from 41.63.1.40
Dec 23 18:54:17 sshd: Failed password for invalid user odsbu from 41.63.1.40 port 62902 ssh2
Dec 23 18:54:17 sshd: Received disconnect from 41.63.1.40: 11: Bye Bye [preauth]
2019-12-24 06:32:31
117.48.231.173 attackspam
Dec 23 14:53:22 IngegnereFirenze sshd[23461]: Failed password for invalid user piltz from 117.48.231.173 port 36684 ssh2
...
2019-12-24 06:33:59
128.75.64.70 attack
Feb 14 14:00:30 dillonfme sshd\[5019\]: Invalid user production from 128.75.64.70 port 50940
Feb 14 14:00:30 dillonfme sshd\[5019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.75.64.70
Feb 14 14:00:31 dillonfme sshd\[5019\]: Failed password for invalid user production from 128.75.64.70 port 50940 ssh2
Feb 14 14:06:14 dillonfme sshd\[5179\]: Invalid user manoj from 128.75.64.70 port 42006
Feb 14 14:06:14 dillonfme sshd\[5179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.75.64.70
...
2019-12-24 06:47:49
79.101.106.74 attack
Automatic report - Banned IP Access
2019-12-24 07:01:40
49.235.138.2 attackbotsspam
Dec 23 23:39:47 sd-53420 sshd\[20884\]: User root from 49.235.138.2 not allowed because none of user's groups are listed in AllowGroups
Dec 23 23:39:47 sd-53420 sshd\[20884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.138.2  user=root
Dec 23 23:39:49 sd-53420 sshd\[20884\]: Failed password for invalid user root from 49.235.138.2 port 60730 ssh2
Dec 23 23:49:18 sd-53420 sshd\[24278\]: Invalid user nan from 49.235.138.2
Dec 23 23:49:18 sd-53420 sshd\[24278\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.138.2
...
2019-12-24 06:52:06
218.92.0.148 attackspam
Dec 23 23:27:53 icinga sshd[18276]: Failed password for root from 218.92.0.148 port 62117 ssh2
Dec 23 23:28:06 icinga sshd[18276]: error: maximum authentication attempts exceeded for root from 218.92.0.148 port 62117 ssh2 [preauth]
...
2019-12-24 06:32:50
78.134.17.219 attack
Automatic report - Port Scan Attack
2019-12-24 06:53:51
190.213.0.102 attack
Dec 23 14:53:07 hermescis postfix/smtpd[6479]: NOQUEUE: reject: RCPT from unknown[190.213.0.102]: 550 5.1.1 : Recipient address rejected:* from= to= proto=ESMTP helo=<[190.213.0.102]>
2019-12-24 06:42:14
83.239.188.186 attackspambots
Unauthorized connection attempt detected from IP address 83.239.188.186 to port 445
2019-12-24 06:39:51
123.133.78.120 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-24 06:28:57

最近上报的IP列表

110.78.156.119 86.107.179.250 110.77.248.63 2606:4700:10::6814:7475
59.173.109.115 202.71.15.136 220.132.147.68 43.164.196.47
66.167.147.115 45.152.20.2 2606:4700:10::6814:7358 174.77.92.8
152.233.20.99 98.98.137.69 201.209.191.127 74.67.145.192
182.42.99.102 180.93.164.1 2606:4700:10::6814:8357 2606:4700:10::6816:4605