必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Montréal

省份(region): Quebec

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       198.168.100.0 - 198.168.101.255
CIDR:           198.168.100.0/23
NetName:        COOPTEL-QC-CA-03
NetHandle:      NET-198-168-100-0-1
Parent:         NET198 (NET-198-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Cooptel Coop de Telecommunication (COOPT)
RegDate:        1993-07-15
Updated:        2012-03-02
Ref:            https://rdap.arin.net/registry/ip/198.168.100.0


OrgName:        Cooptel Coop de Telecommunication
OrgId:          COOPT
Address:        5523 Chemin de l'Aeroport
Address:        P.O.Box 160
City:           Valcourt
StateProv:      QC
PostalCode:     J0E-2L0
Country:        CA
RegDate:        2006-04-12
Updated:        2024-11-25
Ref:            https://rdap.arin.net/registry/entity/COOPT


OrgAbuseHandle: NOC2095-ARIN
OrgAbuseName:   Network Operations Center
OrgAbusePhone:  +1-450-532-3141 
OrgAbuseEmail:  poc@cooptel.qc.ca
OrgAbuseRef:    https://rdap.arin.net/registry/entity/NOC2095-ARIN

OrgTechHandle: NOC2095-ARIN
OrgTechName:   Network Operations Center
OrgTechPhone:  +1-450-532-3141 
OrgTechEmail:  poc@cooptel.qc.ca
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC2095-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.168.100.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12504
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;198.168.100.52.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040201 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 03 09:04:54 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
b''
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
52.100.168.198.in-addr.arpa	name = ftth-198-168-100-52.cooptel.qc.ca.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
116.22.198.8 attack
Found on   CINS badguys     / proto=6  .  srcport=57685  .  dstport=445  .     (3078)
2020-09-23 14:59:38
36.80.137.114 attack
Listed on    zen-spamhaus   / proto=6  .  srcport=60937  .  dstport=445  .     (3077)
2020-09-23 15:06:16
155.159.252.25 attackbots
Sep 23 02:09:28 r.ca sshd[14759]: Failed password for invalid user demo2 from 155.159.252.25 port 37652 ssh2
2020-09-23 15:24:31
61.177.172.54 attackspam
Sep 23 08:50:10 minden010 sshd[11047]: Failed password for root from 61.177.172.54 port 2157 ssh2
Sep 23 08:50:14 minden010 sshd[11047]: Failed password for root from 61.177.172.54 port 2157 ssh2
Sep 23 08:50:17 minden010 sshd[11047]: Failed password for root from 61.177.172.54 port 2157 ssh2
Sep 23 08:50:21 minden010 sshd[11047]: Failed password for root from 61.177.172.54 port 2157 ssh2
...
2020-09-23 15:29:42
212.70.149.68 attackbotsspam
Sep 23 08:19:51 web01.agentur-b-2.de postfix/smtps/smtpd[1717774]: warning: unknown[212.70.149.68]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 23 08:19:56 web01.agentur-b-2.de postfix/smtps/smtpd[1717774]: lost connection after AUTH from unknown[212.70.149.68]
Sep 23 08:21:49 web01.agentur-b-2.de postfix/smtps/smtpd[1717774]: warning: unknown[212.70.149.68]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 23 08:21:55 web01.agentur-b-2.de postfix/smtps/smtpd[1717774]: lost connection after AUTH from unknown[212.70.149.68]
Sep 23 08:23:49 web01.agentur-b-2.de postfix/smtps/smtpd[1717774]: warning: unknown[212.70.149.68]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-09-23 15:08:59
190.152.213.126 attack
Automatic report - Banned IP Access
2020-09-23 15:20:57
187.45.103.15 attackspam
SSH Login Bruteforce
2020-09-23 15:20:13
170.80.141.41 attackbots
Unauthorized connection attempt from IP address 170.80.141.41 on Port 445(SMB)
2020-09-23 15:03:22
212.119.48.48 attackspambots
Sep 22 17:02:00 ssh2 sshd[20648]: Invalid user support from 212.119.48.48 port 51688
Sep 22 17:02:00 ssh2 sshd[20648]: Failed password for invalid user support from 212.119.48.48 port 51688 ssh2
Sep 22 17:02:00 ssh2 sshd[20648]: Connection closed by invalid user support 212.119.48.48 port 51688 [preauth]
...
2020-09-23 14:58:45
182.121.150.63 attackspambots
[portscan] Port scan
2020-09-23 15:31:30
209.244.77.241 attackbots
Invalid user firefart from 209.244.77.241 port 4008
2020-09-23 15:17:21
217.138.254.72 attack
SSH Server Abuse (217.138.254.72 as ): Sep 22 21:02:51 box sshd[16243]: error: Received disconnect from 217.138.254.72 port 8508:3: com.jcraft.jsch.JSchException: Auth fail [preauth]
...
2020-09-23 15:30:17
161.97.112.133 attack
2020-09-23T08:10[Censored Hostname] sshd[31812]: Failed password for root from 161.97.112.133 port 58762 ssh2
2020-09-23T08:39[Censored Hostname] sshd[15145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=vmi445862.contaboserver.net  user=root
2020-09-23T08:39[Censored Hostname] sshd[15145]: Failed password for root from 161.97.112.133 port 40732 ssh2[...]
2020-09-23 15:00:57
222.186.190.2 attackspambots
Sep 23 10:14:18 ift sshd\[38764\]: Failed password for root from 222.186.190.2 port 8762 ssh2Sep 23 10:14:28 ift sshd\[38764\]: Failed password for root from 222.186.190.2 port 8762 ssh2Sep 23 10:14:31 ift sshd\[38764\]: Failed password for root from 222.186.190.2 port 8762 ssh2Sep 23 10:14:37 ift sshd\[38822\]: Failed password for root from 222.186.190.2 port 29102 ssh2Sep 23 10:14:41 ift sshd\[38822\]: Failed password for root from 222.186.190.2 port 29102 ssh2
...
2020-09-23 15:16:22
106.12.4.158 attackspam
 TCP (SYN) 106.12.4.158:59057 -> port 26309, len 44
2020-09-23 15:05:36

最近上报的IP列表

195.140.214.30 2606:4700:10::6814:4652 2606:4700:10::6814:6310 2606:4700:10::ac43:1948
2606:4700:10::6816:4346 2606:4700:10::6814:6085 14.207.194.186 2606:4700:10::6816:3592
2606:4700:10::ac43:2230 2606:4700:10::6814:8889 2606:4700:10::6814:5401 2606:4700:10::6814:5737
143.92.60.205 183.202.134.16 134.122.197.16 195.140.214.26
75.240.98.76 6.240.223.59 21.194.25.163 2606:4700:10::6814:9336