必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       192.81.168.0 - 192.81.169.255
CIDR:           192.81.168.0/23
NetName:        HOSTUPON-YYZ-BLOCK1
NetHandle:      NET-192-81-168-0-1
Parent:         NET192 (NET-192-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   HOSTUPON INC. (HOSTU-10)
RegDate:        2013-01-14
Updated:        2025-08-13
Ref:            https://rdap.arin.net/registry/ip/192.81.168.0


OrgName:        HOSTUPON INC.
OrgId:          HOSTU-10
Address:        2 Gladstone Ave
Address:        Suite 506
City:           Toronto
StateProv:      ON
PostalCode:     M6J 1J6
Country:        CA
RegDate:        2024-01-19
Updated:        2024-07-09
Ref:            https://rdap.arin.net/registry/entity/HOSTU-10


OrgAbuseHandle: ABUSE9065-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-866-973-4678 
OrgAbuseEmail:  abuse@hostupon.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE9065-ARIN

OrgTechHandle: KMO18-ARIN
OrgTechName:   Moonlight, Kevin 
OrgTechPhone:  +1-647-478-2587 
OrgTechEmail:  kevin.moonlight@inverdigm.ca
OrgTechRef:    https://rdap.arin.net/registry/entity/KMO18-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 192.81.168.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27851
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;192.81.168.2.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031001 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 11 02:44:14 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
2.168.81.192.in-addr.arpa domain name pointer cp2.uhcloud.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
2.168.81.192.in-addr.arpa	name = cp2.uhcloud.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
203.129.218.76 attackspambots
Invalid user jenkins from 203.129.218.76 port 42380
2020-09-27 13:32:12
102.89.3.26 attackspam
1601152749 - 09/26/2020 22:39:09 Host: 102.89.3.26/102.89.3.26 Port: 445 TCP Blocked
2020-09-27 13:33:11
181.30.28.201 attackspam
Sep 27 00:11:32 marvibiene sshd[16546]: Invalid user friend from 181.30.28.201 port 41538
Sep 27 00:11:32 marvibiene sshd[16546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.28.201
Sep 27 00:11:32 marvibiene sshd[16546]: Invalid user friend from 181.30.28.201 port 41538
Sep 27 00:11:34 marvibiene sshd[16546]: Failed password for invalid user friend from 181.30.28.201 port 41538 ssh2
2020-09-27 14:09:09
177.182.181.84 attack
 TCP (SYN) 177.182.181.84:48754 -> port 445, len 60
2020-09-27 13:25:43
222.186.175.216 attack
Sep 26 19:54:27 kapalua sshd\[11900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216  user=root
Sep 26 19:54:28 kapalua sshd\[11900\]: Failed password for root from 222.186.175.216 port 13444 ssh2
Sep 26 19:54:31 kapalua sshd\[11900\]: Failed password for root from 222.186.175.216 port 13444 ssh2
Sep 26 19:54:34 kapalua sshd\[11900\]: Failed password for root from 222.186.175.216 port 13444 ssh2
Sep 26 19:54:37 kapalua sshd\[11900\]: Failed password for root from 222.186.175.216 port 13444 ssh2
2020-09-27 13:55:08
13.127.50.37 attack
Sep 27 04:54:07 mail sshd[259721]: Invalid user wh from 13.127.50.37 port 53666
Sep 27 04:54:08 mail sshd[259721]: Failed password for invalid user wh from 13.127.50.37 port 53666 ssh2
Sep 27 05:05:51 mail sshd[260149]: Invalid user ts3 from 13.127.50.37 port 41976
...
2020-09-27 13:41:38
91.235.185.233 attackbotsspam
Listed on    abuseat.org plus barracudaCentral and zen-spamhaus   / proto=6  .  srcport=2159  .  dstport=445  .     (2676)
2020-09-27 14:03:28
122.117.77.22 attackbots
Unauthorised access (Sep 27) SRC=122.117.77.22 LEN=40 TTL=45 ID=34632 TCP DPT=23 WINDOW=9271 SYN
2020-09-27 13:55:47
136.232.118.34 attack
23/tcp
[2020-09-26]1pkt
2020-09-27 13:52:23
111.172.193.40 attackbotsspam
SSH break in attempt
...
2020-09-27 13:40:43
112.225.137.248 attack
11211/udp
[2020-09-26]1pkt
2020-09-27 13:29:55
125.178.227.57 attackbotsspam
frenzy
2020-09-27 13:59:54
37.57.71.39 attack
8080/tcp
[2020-09-26]1pkt
2020-09-27 14:07:02
78.128.113.121 attackspam
Sep 27 02:09:14 web01.agentur-b-2.de postfix/smtpd[308231]: warning: unknown[78.128.113.121]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 27 02:09:14 web01.agentur-b-2.de postfix/smtpd[308231]: lost connection after AUTH from unknown[78.128.113.121]
Sep 27 02:09:19 web01.agentur-b-2.de postfix/smtpd[307864]: lost connection after AUTH from unknown[78.128.113.121]
Sep 27 02:09:24 web01.agentur-b-2.de postfix/smtpd[307862]: lost connection after AUTH from unknown[78.128.113.121]
Sep 27 02:09:29 web01.agentur-b-2.de postfix/smtpd[308231]: lost connection after AUTH from unknown[78.128.113.121]
2020-09-27 13:27:01
218.92.0.145 attackspambots
Sep 26 19:16:33 hpm sshd\[7553\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.145  user=root
Sep 26 19:16:35 hpm sshd\[7553\]: Failed password for root from 218.92.0.145 port 53238 ssh2
Sep 26 19:16:38 hpm sshd\[7553\]: Failed password for root from 218.92.0.145 port 53238 ssh2
Sep 26 19:16:41 hpm sshd\[7553\]: Failed password for root from 218.92.0.145 port 53238 ssh2
Sep 26 19:16:44 hpm sshd\[7553\]: Failed password for root from 218.92.0.145 port 53238 ssh2
2020-09-27 13:31:51

最近上报的IP列表

47.92.232.117 36.43.201.192 159.65.156.72 139.59.67.232
68.183.81.163 157.245.108.89 38.34.8.202 52.87.243.92
139.59.66.30 157.245.243.118 139.59.89.35 116.76.37.65
216.167.1.158 34.58.19.223 41.59.227.69 167.71.230.20
159.65.156.134 216.167.83.137 1.9.4.61 58.35.19.126