必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '176.65.144.0 - 176.65.144.255'

% Abuse contact for '176.65.144.0 - 176.65.144.255' is 'abuse@dedik.io'

inetnum:        176.65.144.0 - 176.65.144.255
netname:        DEDIKIO
country:        CH
admin-c:        HE2788-RIPE
tech-c:         HE2788-RIPE
org:            ORG-DSL56-RIPE
status:         ASSIGNED PA
mnt-by:         MNT-ZEXOTEK
created:        2025-12-29T10:36:05Z
last-modified:  2025-12-29T10:36:05Z
source:         RIPE

organisation:   ORG-DSL56-RIPE
org-name:       DEDIK SERVICES LIMITED
address:        60 ST. MARTIN& # 039;S LANE
address:        WC2N 4JS LONDON, UNITED KINGDOM OF GREAT BRITAIN AND NORTHERN IRELAND*
country:        GB
org-type:       OTHER
admin-c:        HE2788-RIPE
tech-c:         HE2788-RIPE
abuse-c:        AR78383-RIPE
mnt-ref:        VIA-REGISTRY-MNT
mnt-ref:        netutils-mnt
mnt-ref:        mnt-bg-eurocrypt-1
mnt-ref:        bg-sofcompany-1-mnt
mnt-ref:        lir-bg-telco-1-MNT
mnt-ref:        DEDIKIO-MNT
mnt-ref:        MNT-ZEXOTEK
mnt-ref:        mnt-bg-myacct-1
mnt-by:         VIA-REGISTRY-MNT
mnt-by:         DEDIKIO-MNT
created:        2025-06-11T23:18:45Z
last-modified:  2026-03-06T14:06:48Z
source:         RIPE # Filtered

role:           HRAMCOVS EDUARDS
address:        60 ST. MARTIN& # 039;S LANE
address:        WC2N 4JS LONDON, UNITED KINGDOM OF GREAT BRITAIN AND NORTHERN IRELAND*
mnt-by:         VIA-REGISTRY-MNT
mnt-by:         DEDIKIO-MNT
nic-hdl:        HE2788-RIPE
created:        2025-06-11T23:18:45Z
last-modified:  2025-06-12T13:18:47Z
source:         RIPE # Filtered

% Information related to '176.65.144.0/24AS209413'

route:          176.65.144.0/24
origin:         AS209413
created:        2026-01-20T07:53:40Z
last-modified:  2026-01-20T07:53:40Z
source:         RIPE
mnt-by:         MNT-ZEXOTEK

% Information related to '176.65.144.0/24AS51852'

route:          176.65.144.0/24
origin:         AS51852
mnt-by:         MNT-ZEXOTEK
created:        2025-12-13T10:56:02Z
last-modified:  2025-12-13T10:56:02Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121 (SHETLAND)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 176.65.144.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52569
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;176.65.144.138.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031102 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 12 09:10:10 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 138.144.65.176.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.144.65.176.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.79.44.52 attackspambots
Aug 22 23:34:53 sip sshd[1391710]: Invalid user myftp from 51.79.44.52 port 52908
Aug 22 23:34:55 sip sshd[1391710]: Failed password for invalid user myftp from 51.79.44.52 port 52908 ssh2
Aug 22 23:38:46 sip sshd[1391790]: Invalid user mrl from 51.79.44.52 port 33748
...
2020-08-23 06:52:51
192.241.154.168 attack
Aug 22 22:41:53 localhost sshd\[20616\]: Invalid user file from 192.241.154.168 port 36936
Aug 22 22:41:53 localhost sshd\[20616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.154.168
Aug 22 22:41:55 localhost sshd\[20616\]: Failed password for invalid user file from 192.241.154.168 port 36936 ssh2
...
2020-08-23 06:45:36
41.60.86.21 attackspambots
Unauthorized connection attempt from IP address 41.60.86.21 on Port 445(SMB)
2020-08-23 07:02:37
104.248.205.67 attackspam
SSH Invalid Login
2020-08-23 06:51:44
81.94.255.12 attackbots
Aug 22 22:38:11 localhost sshd[43496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=host-duv-81-94-255-12.satelit-kft.hu  user=root
Aug 22 22:38:13 localhost sshd[43496]: Failed password for root from 81.94.255.12 port 47784 ssh2
Aug 22 22:46:09 localhost sshd[44423]: Invalid user erica from 81.94.255.12 port 55818
Aug 22 22:46:09 localhost sshd[44423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=host-duv-81-94-255-12.satelit-kft.hu
Aug 22 22:46:09 localhost sshd[44423]: Invalid user erica from 81.94.255.12 port 55818
Aug 22 22:46:10 localhost sshd[44423]: Failed password for invalid user erica from 81.94.255.12 port 55818 ssh2
...
2020-08-23 07:04:08
119.45.151.125 attack
SSH Invalid Login
2020-08-23 06:42:14
106.53.97.24 attackbotsspam
Invalid user enrique from 106.53.97.24 port 44948
2020-08-23 06:53:35
222.186.175.217 attack
2020-08-22T23:04:58.271236vps1033 sshd[28409]: Failed password for root from 222.186.175.217 port 13034 ssh2
2020-08-22T23:05:01.558166vps1033 sshd[28409]: Failed password for root from 222.186.175.217 port 13034 ssh2
2020-08-22T23:05:04.584414vps1033 sshd[28409]: Failed password for root from 222.186.175.217 port 13034 ssh2
2020-08-22T23:05:07.023318vps1033 sshd[28409]: Failed password for root from 222.186.175.217 port 13034 ssh2
2020-08-22T23:05:10.547587vps1033 sshd[28409]: Failed password for root from 222.186.175.217 port 13034 ssh2
...
2020-08-23 07:08:28
180.247.192.30 attackbots
Unauthorized connection attempt from IP address 180.247.192.30 on Port 445(SMB)
2020-08-23 07:05:35
191.240.113.159 attack
Brute force attempt
2020-08-23 07:13:39
24.232.195.32 attackspam
C1,WP GET /wp-login.php
2020-08-23 07:13:09
222.186.175.202 attackspambots
2020-08-22T23:00:14.912343shield sshd\[16209\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202  user=root
2020-08-22T23:00:17.499217shield sshd\[16209\]: Failed password for root from 222.186.175.202 port 27782 ssh2
2020-08-22T23:00:20.540415shield sshd\[16209\]: Failed password for root from 222.186.175.202 port 27782 ssh2
2020-08-22T23:00:23.998038shield sshd\[16209\]: Failed password for root from 222.186.175.202 port 27782 ssh2
2020-08-22T23:00:27.681874shield sshd\[16209\]: Failed password for root from 222.186.175.202 port 27782 ssh2
2020-08-23 07:03:04
54.39.151.64 attackbots
Aug 23 00:25:41 * sshd[32711]: Failed password for root from 54.39.151.64 port 54991 ssh2
Aug 23 00:35:22 * sshd[1264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.151.64
2020-08-23 07:12:19
139.59.67.82 attackspam
Aug 23 05:55:12 webhost01 sshd[22087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.67.82
Aug 23 05:55:14 webhost01 sshd[22087]: Failed password for invalid user qiang from 139.59.67.82 port 40776 ssh2
...
2020-08-23 06:59:10
161.35.58.35 attackspam
Aug 23 00:38:16 sip sshd[1392368]: Invalid user rajesh from 161.35.58.35 port 54804
Aug 23 00:38:19 sip sshd[1392368]: Failed password for invalid user rajesh from 161.35.58.35 port 54804 ssh2
Aug 23 00:41:55 sip sshd[1392422]: Invalid user kub from 161.35.58.35 port 36492
...
2020-08-23 06:55:34

最近上报的IP列表

18.201.145.56 1.24.16.99 192.168.200.40 172.237.108.226
47.115.227.158 10.52.1.94 211.219.38.254 209.16.171.144
3.255.98.162 18.201.172.11 154.3.28.28 240e:0454::988e:5db9:1cce:ba01:7964
240e:0454:41be:988e:5db9:1cce:ba01:7964 152.89.218.84 240e:47e:9400:6fe2:c45d:aeff:feae:1d49 240e:47c:9440:117b:a0fc:12ff:fe7f:1eb4
183.46.161.117 240e:47f:9448:4731:88e2:68ff:fe35:e197 14.24.242.115 110.249.201.115