必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Phoenix

省份(region): Arizona

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#


NetRange:       20.160.0.0 - 20.175.255.255
CIDR:           20.160.0.0/12
NetName:        MSFT
NetHandle:      NET-20-160-0-0-1
Parent:         NET20 (NET-20-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Microsoft Corporation (MSFT)
RegDate:        2017-02-22
Updated:        2017-02-22
Ref:            https://rdap.arin.net/registry/ip/20.160.0.0



OrgName:        Microsoft Corporation
OrgId:          MSFT
Address:        One Microsoft Way
City:           Redmond
StateProv:      WA
PostalCode:     98052
Country:        US
RegDate:        1998-07-10
Updated:        2025-06-10
Comment:        To report suspected security issues specific to traffic emanating from Microsoft online services, including the distribution of malicious content or other illicit or illegal material through a Microsoft online service, please submit reports to:
Comment:        * https://cert.microsoft.com.  
Comment:        
Comment:        For SPAM and other abuse issues, such as Microsoft Accounts, please contact:
Comment:        * abuse@microsoft.com.  
Comment:        
Comment:        To report security vulnerabilities in Microsoft products and services, please contact:
Comment:        * secure@microsoft.com.  
Comment:        
Comment:        For legal and law enforcement-related requests, please contact:
Comment:        * msndcc@microsoft.com
Comment:        
Comment:        For routing, peering or DNS issues, please 
Comment:        contact:
Comment:        * IOC@microsoft.com
Ref:            https://rdap.arin.net/registry/entity/MSFT


OrgTechHandle: BEDAR6-ARIN
OrgTechName:   Bedard, Dawn 
OrgTechPhone:  +1-425-538-6637 
OrgTechEmail:  dabedard@microsoft.com
OrgTechRef:    https://rdap.arin.net/registry/entity/BEDAR6-ARIN

OrgRoutingHandle: CHATU3-ARIN
OrgRoutingName:   Chaturmohta, Somesh 
OrgRoutingPhone:  +1-425-882-8080 
OrgRoutingEmail:  someshch@microsoft.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/CHATU3-ARIN

OrgAbuseHandle: MAC74-ARIN
OrgAbuseName:   Microsoft Abuse Contact
OrgAbusePhone:  +1-425-882-8080 
OrgAbuseEmail:  abuse@microsoft.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/MAC74-ARIN

OrgTechHandle: MRPD-ARIN
OrgTechName:   Microsoft Routing, Peering, and DNS
OrgTechPhone:  +1-425-882-8080 
OrgTechEmail:  IOC@microsoft.com
OrgTechRef:    https://rdap.arin.net/registry/entity/MRPD-ARIN

OrgTechHandle: SINGH683-ARIN
OrgTechName:   Singh, Prachi 
OrgTechPhone:  +1-425-707-5601 
OrgTechEmail:  pracsin@microsoft.com
OrgTechRef:    https://rdap.arin.net/registry/entity/SINGH683-ARIN

OrgTechHandle: IPHOS5-ARIN
OrgTechName:   IPHostmaster, IPHostmaster 
OrgTechPhone:  +1-425-538-6637 
OrgTechEmail:  iphostmaster@microsoft.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPHOS5-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.169.106.10
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54147
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.169.106.10.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025101300 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 14 00:30:07 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
10.106.169.20.in-addr.arpa domain name pointer azpdwgoolpp1.stretchoid.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
10.106.169.20.in-addr.arpa	name = azpdwgoolpp1.stretchoid.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
167.114.226.137 attack
Dec 18 23:37:42 server sshd\[32627\]: Invalid user suong from 167.114.226.137
Dec 18 23:37:42 server sshd\[32627\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.226.137 
Dec 18 23:37:44 server sshd\[32627\]: Failed password for invalid user suong from 167.114.226.137 port 48724 ssh2
Dec 18 23:43:47 server sshd\[1716\]: Invalid user moncivais from 167.114.226.137
Dec 18 23:43:47 server sshd\[1716\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.226.137 
...
2019-12-19 04:54:09
35.210.157.201 attackbotsspam
Dec 18 14:47:15 TORMINT sshd\[19458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.210.157.201  user=root
Dec 18 14:47:17 TORMINT sshd\[19458\]: Failed password for root from 35.210.157.201 port 46880 ssh2
Dec 18 14:52:45 TORMINT sshd\[19859\]: Invalid user jean from 35.210.157.201
Dec 18 14:52:45 TORMINT sshd\[19859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.210.157.201
...
2019-12-19 04:48:06
119.136.125.194 attackspam
Dec 18 15:31:15 grey postfix/smtpd\[23208\]: NOQUEUE: reject: RCPT from unknown\[119.136.125.194\]: 554 5.7.1 Service unavailable\; Client host \[119.136.125.194\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[119.136.125.194\]\; from=\ to=\ proto=SMTP helo=\
...
2019-12-19 05:09:23
2800:810:504:747:589b:f6e3:1b57:bb5 attack
Sniffing for wp-login
2019-12-19 04:44:33
165.227.187.185 attackspambots
Invalid user workstation from 165.227.187.185 port 40384
2019-12-19 05:15:38
146.185.180.19 attack
Dec 19 03:33:37 webhost01 sshd[31223]: Failed password for root from 146.185.180.19 port 57581 ssh2
...
2019-12-19 04:54:53
182.253.188.59 attack
12,41-02/01 [bc01/m68] PostRequest-Spammer scoring: maputo01_x2b
2019-12-19 05:13:16
45.136.108.158 attack
Dec 18 20:30:16 h2177944 kernel: \[9572394.172575\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.108.158 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=47010 PROTO=TCP SPT=46722 DPT=4304 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 18 21:00:53 h2177944 kernel: \[9574230.560647\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.108.158 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=44190 PROTO=TCP SPT=46722 DPT=5405 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 18 21:10:54 h2177944 kernel: \[9574831.811183\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.108.158 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=18940 PROTO=TCP SPT=46722 DPT=4955 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 18 21:19:35 h2177944 kernel: \[9575352.149455\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.108.158 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=53159 PROTO=TCP SPT=46722 DPT=4299 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 18 21:28:16 h2177944 kernel: \[9575872.760519\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.108.158 DST=85.214.
2019-12-19 05:03:06
61.179.243.9 attack
3389BruteforceFW21
2019-12-19 05:01:22
40.92.72.56 attack
Dec 18 17:31:24 debian-2gb-vpn-nbg1-1 kernel: [1057848.637992] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.72.56 DST=78.46.192.101 LEN=52 TOS=0x02 PREC=0x00 TTL=112 ID=22460 DF PROTO=TCP SPT=7492 DPT=25 WINDOW=8192 RES=0x00 CWR ECE SYN URGP=0
2019-12-19 04:59:41
75.98.144.15 attack
Brute-force attempt banned
2019-12-19 05:20:44
118.32.223.61 attack
Dec 18 21:02:57 herz-der-gamer sshd[3452]: Invalid user fauzi from 118.32.223.61 port 53402
Dec 18 21:02:57 herz-der-gamer sshd[3452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.32.223.61
Dec 18 21:02:57 herz-der-gamer sshd[3452]: Invalid user fauzi from 118.32.223.61 port 53402
Dec 18 21:02:58 herz-der-gamer sshd[3452]: Failed password for invalid user fauzi from 118.32.223.61 port 53402 ssh2
...
2019-12-19 05:04:21
69.197.191.226 attack
SMB Server BruteForce Attack
2019-12-19 05:16:49
77.247.110.22 attackspambots
\[2019-12-18 15:34:39\] NOTICE\[2839\] chan_sip.c: Registration from '"3" \' failed for '77.247.110.22:5331' - Wrong password
\[2019-12-18 15:34:39\] SECURITY\[2857\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-12-18T15:34:39.457-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="3",SessionID="0x7f0fb4234468",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.22/5331",Challenge="2d5e25d1",ReceivedChallenge="2d5e25d1",ReceivedHash="428bb9fccb75c0af63039b762749b1ee"
\[2019-12-18 15:34:39\] NOTICE\[2839\] chan_sip.c: Registration from '"3" \' failed for '77.247.110.22:5331' - Wrong password
\[2019-12-18 15:34:39\] SECURITY\[2857\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-12-18T15:34:39.514-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="3",SessionID="0x7f0fb447f838",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.22/53
2019-12-19 04:57:45
212.15.133.98 attackbots
Unauthorized connection attempt from IP address 212.15.133.98 on Port 445(SMB)
2019-12-19 05:19:42

最近上报的IP列表

204.0.11.244 123.4.243.228 165.154.203.180 155.117.19.97
35.175.186.28 120.232.31.250 20.169.104.255 13.222.0.200
84.5.241.227 216.246.56.36 38.175.215.117 88.230.0.15
20.118.227.20 176.65.148.164 150.255.120.83 118.212.122.43
45.58.127.135 93.123.109.72 66.249.77.96 167.71.4.34