必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       204.13.152.0 - 204.13.155.255
CIDR:           204.13.152.0/22
NetName:        MULTA-NET1
NetHandle:      NET-204-13-152-0-1
Parent:         NET204 (NET-204-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   MULTACOM CORPORATION (MULTA)
RegDate:        2005-04-20
Updated:        2012-03-02
Ref:            https://rdap.arin.net/registry/ip/204.13.152.0


OrgName:        MULTACOM CORPORATION
OrgId:          MULTA
Address:        16654 Soledad Canyon Rd #150
City:           Canyon Country
StateProv:      CA
PostalCode:     91387
Country:        US
RegDate:        2005-03-23
Updated:        2024-11-25
Ref:            https://rdap.arin.net/registry/entity/MULTA

ReferralServer:  rwhois://rwhois.multacom.com:4321

OrgTechHandle: NOC1793-ARIN
OrgTechName:   Network Operations Center
OrgTechPhone:  +1-661-977-9436 
OrgTechEmail:  noc@multacom.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC1793-ARIN

OrgAbuseHandle: ABUSE898-ARIN
OrgAbuseName:   Abuse Department
OrgAbusePhone:  +1-661-554-0287 
OrgAbuseEmail:  abuse@multacom.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE898-ARIN

RAbuseHandle: ABUSE898-ARIN
RAbuseName:   Abuse Department
RAbusePhone:  +1-661-554-0287 
RAbuseEmail:  abuse@multacom.com
RAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE898-ARIN

RTechHandle: NOC1793-ARIN
RTechName:   Network Operations Center
RTechPhone:  +1-661-977-9436 
RTechEmail:  noc@multacom.com
RTechRef:    https://rdap.arin.net/registry/entity/NOC1793-ARIN

RNOCHandle: NOC1793-ARIN
RNOCName:   Network Operations Center
RNOCPhone:  +1-661-977-9436 
RNOCEmail:  noc@multacom.com
RNOCRef:    https://rdap.arin.net/registry/entity/NOC1793-ARIN

# end


# start

NetRange:       204.13.154.0 - 204.13.155.255
CIDR:           204.13.154.0/23
NetName:        2GMCORPNET1
NetHandle:      NET-204-13-154-0-1
Parent:         MULTA-NET1 (NET-204-13-152-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       2GM Corporation (C01182882)
RegDate:        2005-09-25
Updated:        2005-09-25
Ref:            https://rdap.arin.net/registry/ip/204.13.154.0


CustName:       2GM Corporation
Address:        10501 Valley Blvd. #1175
City:           El Monte
StateProv:      CA
PostalCode:     91731
Country:        US
RegDate:        2005-09-25
Updated:        2011-03-19
Ref:            https://rdap.arin.net/registry/entity/C01182882

OrgTechHandle: NOC1793-ARIN
OrgTechName:   Network Operations Center
OrgTechPhone:  +1-661-977-9436 
OrgTechEmail:  noc@multacom.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC1793-ARIN

OrgAbuseHandle: ABUSE898-ARIN
OrgAbuseName:   Abuse Department
OrgAbusePhone:  +1-661-554-0287 
OrgAbuseEmail:  abuse@multacom.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE898-ARIN

RAbuseHandle: ABUSE898-ARIN
RAbuseName:   Abuse Department
RAbusePhone:  +1-661-554-0287 
RAbuseEmail:  abuse@multacom.com
RAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE898-ARIN

RTechHandle: NOC1793-ARIN
RTechName:   Network Operations Center
RTechPhone:  +1-661-977-9436 
RTechEmail:  noc@multacom.com
RTechRef:    https://rdap.arin.net/registry/entity/NOC1793-ARIN

RNOCHandle: NOC1793-ARIN
RNOCName:   Network Operations Center
RNOCPhone:  +1-661-977-9436 
RNOCEmail:  noc@multacom.com
RNOCRef:    https://rdap.arin.net/registry/entity/NOC1793-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.multacom.com:4321.
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 204.13.154.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25266
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;204.13.154.3.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025110801 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 09 10:33:27 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
3.154.13.204.in-addr.arpa domain name pointer lg-lax02.racknerd.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
3.154.13.204.in-addr.arpa	name = lg-lax02.racknerd.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.13.147.89 attackspambots
sshd: Failed password for .... from 106.13.147.89 port 33094 ssh2
2020-10-08 00:24:45
85.209.0.25 attack
Triggered: repeated knocking on closed ports.
2020-10-08 00:42:17
111.230.148.82 attack
SSH login attempts.
2020-10-08 00:31:58
201.148.121.94 attack
20/10/6@16:40:48: FAIL: Alarm-Telnet address from=201.148.121.94
...
2020-10-08 00:37:15
128.199.194.107 attackspam
Oct  7 11:51:37 journals sshd\[78575\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.194.107  user=root
Oct  7 11:51:39 journals sshd\[78575\]: Failed password for root from 128.199.194.107 port 54892 ssh2
Oct  7 11:55:49 journals sshd\[78953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.194.107  user=root
Oct  7 11:55:50 journals sshd\[78953\]: Failed password for root from 128.199.194.107 port 33182 ssh2
Oct  7 12:00:03 journals sshd\[79779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.194.107  user=root
...
2020-10-08 00:51:54
45.59.236.186 attackbots
1602016852 - 10/06/2020 22:40:52 Host: 45.59.236.186/45.59.236.186 Port: 445 TCP Blocked
...
2020-10-08 00:35:56
121.213.240.181 attackbotsspam
RDPBrutePap24
2020-10-08 00:57:34
185.55.242.31 attackbotsspam
Lines containing failures of 185.55.242.31
Oct  6 18:15:18 srv02 postfix/smtpd[23160]: connect from unknown[185.55.242.31]
Oct x@x
Oct  6 18:15:18 srv02 postfix/smtpd[23160]: disconnect from unknown[185.55.242.31] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5
Oct  6 22:36:52 srv02 postfix/smtpd[7817]: connect from unknown[185.55.242.31]
Oct x@x
Oct  6 22:36:52 srv02 postfix/smtpd[7817]: disconnect from unknown[185.55.242.31] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5
Oct  6 22:36:56 srv02 postfix/smtpd[7817]: connect from unknown[185.55.242.31]
Oct x@x
Oct  6 22:36:56 srv02 postfix/smtpd[7817]: disconnect from unknown[185.55.242.31] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5
Oct  6 22:36:58 srv02 postfix/smtpd[7817]: connect from unknown[185.55.242.31]
Oct x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=185.55.242.31
2020-10-08 00:38:32
118.24.7.98 attackspam
Banned for a week because repeated abuses, for example SSH, but not only
2020-10-08 00:49:38
45.142.120.38 attackbots
Oct  7 18:18:51 srv01 postfix/smtpd\[22845\]: warning: unknown\[45.142.120.38\]: SASL LOGIN authentication failed: VXNlcm5hbWU6
Oct  7 18:19:00 srv01 postfix/smtpd\[29877\]: warning: unknown\[45.142.120.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  7 18:19:02 srv01 postfix/smtpd\[22845\]: warning: unknown\[45.142.120.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  7 18:19:02 srv01 postfix/smtpd\[31249\]: warning: unknown\[45.142.120.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  7 18:19:05 srv01 postfix/smtpd\[31217\]: warning: unknown\[45.142.120.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-10-08 00:30:09
222.239.28.177 attackbots
Oct  7 16:37:34 game-panel sshd[18875]: Failed password for root from 222.239.28.177 port 53764 ssh2
Oct  7 16:41:24 game-panel sshd[19137]: Failed password for root from 222.239.28.177 port 58932 ssh2
2020-10-08 00:46:16
122.224.129.237 attackbots
$f2bV_matches
2020-10-08 00:55:02
103.253.200.161 attackspam
Oct  7 11:14:16 la sshd[120982]: Failed password for root from 103.253.200.161 port 39552 ssh2
Oct  7 11:16:37 la sshd[121005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.253.200.161  user=root
Oct  7 11:16:38 la sshd[121005]: Failed password for root from 103.253.200.161 port 45862 ssh2
...
2020-10-08 01:00:18
170.246.204.110 attackbots
2020-10-06 22:31:32 plain_virtual_exim authenticator failed for ([170.246.204.110]) [170.246.204.110]: 535 Incorrect authentication data


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=170.246.204.110
2020-10-08 00:29:17
192.241.214.142 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-10-08 01:02:48

最近上报的IP列表

34.224.26.102 34.203.227.71 9.68.8.82 212.83.131.156
9.54.68.9 1.47.2.83 193.56.113.39 171.124.41.221
144.217.181.208 45.249.101.171 20.55.36.63 154.44.25.252
45.142.154.30 157.245.125.255 36.154.71.247 117.28.225.148
196.31.106.164 159.203.21.34 91.92.241.115 124.23.134.91