必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Lock Haven

省份(region): Pennsylvania

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       205.174.96.0 - 205.174.111.255
CIDR:           205.174.96.0/20
NetName:        KCSDNET
NetHandle:      NET-205-174-96-0-1
Parent:         NET205 (NET-205-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Keystone Central School District (KCSD)
RegDate:        1995-03-23
Updated:        2021-12-14
Ref:            https://rdap.arin.net/registry/ip/205.174.96.0


OrgName:        Keystone Central School District
OrgId:          KCSD
Address:        86 Administration Drive
City:           Mill Hall
StateProv:      PA
PostalCode:     17751
Country:        US
RegDate:        1995-03-23
Updated:        2017-05-15
Ref:            https://rdap.arin.net/registry/entity/KCSD


OrgAbuseHandle: ZK18-ARIN
OrgAbuseName:   Keystone Central School District
OrgAbusePhone:  +1-570-893-4923 
OrgAbuseEmail:  kkern@kcsd.k12.pa.us
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ZK18-ARIN

OrgTechHandle: NETWO5477-ARIN
OrgTechName:   Network Supervisor
OrgTechPhone:  +1-570-748-1825 
OrgTechEmail:  admin@kcsd.k12.pa.us
OrgTechRef:    https://rdap.arin.net/registry/entity/NETWO5477-ARIN

RNOCHandle: NETWO5477-ARIN
RNOCName:   Network Supervisor
RNOCPhone:  +1-570-748-1825 
RNOCEmail:  admin@kcsd.k12.pa.us
RNOCRef:    https://rdap.arin.net/registry/entity/NETWO5477-ARIN

RAbuseHandle: NETWO5477-ARIN
RAbuseName:   Network Supervisor
RAbusePhone:  +1-570-748-1825 
RAbuseEmail:  admin@kcsd.k12.pa.us
RAbuseRef:    https://rdap.arin.net/registry/entity/NETWO5477-ARIN

RTechHandle: ZK18-ARIN
RTechName:   Keystone Central School District
RTechPhone:  +1-570-893-4923 
RTechEmail:  kkern@kcsd.k12.pa.us
RTechRef:    https://rdap.arin.net/registry/entity/ZK18-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 205.174.99.185
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32387
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;205.174.99.185.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032400 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 24 22:15:17 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 185.99.174.205.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 205.174.99.185.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
157.230.113.87 attackbotsspam
xmlrpc attack
2019-07-02 07:16:49
209.17.96.114 attack
port scan and connect, tcp 443 (https)
2019-07-02 07:14:36
198.211.122.197 attackbots
Jul  2 00:28:24 mail sshd\[725\]: Invalid user apache from 198.211.122.197 port 39356
Jul  2 00:28:24 mail sshd\[725\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.122.197
...
2019-07-02 07:32:52
152.136.34.52 attack
Mar 30 17:53:11 vtv3 sshd\[23519\]: Invalid user ismail from 152.136.34.52 port 52304
Mar 30 17:53:11 vtv3 sshd\[23519\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.34.52
Mar 30 17:53:13 vtv3 sshd\[23519\]: Failed password for invalid user ismail from 152.136.34.52 port 52304 ssh2
Mar 30 18:02:30 vtv3 sshd\[27285\]: Invalid user support from 152.136.34.52 port 60466
Mar 30 18:02:30 vtv3 sshd\[27285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.34.52
Jul  2 02:06:30 vtv3 sshd\[13744\]: Invalid user arsene from 152.136.34.52 port 44600
Jul  2 02:06:30 vtv3 sshd\[13744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.34.52
Jul  2 02:06:32 vtv3 sshd\[13744\]: Failed password for invalid user arsene from 152.136.34.52 port 44600 ssh2
Jul  2 02:10:43 vtv3 sshd\[15822\]: Invalid user admin from 152.136.34.52 port 59450
Jul  2 02:10:43 vtv3 sshd\[15822\]:
2019-07-02 07:33:54
140.143.30.191 attack
Jul  1 19:11:10 plusreed sshd[25502]: Invalid user thecle from 140.143.30.191
...
2019-07-02 07:22:12
142.93.101.13 attack
01.07.2019 23:30:32 SSH access blocked by firewall
2019-07-02 07:32:36
140.143.134.86 attackbots
01.07.2019 13:27:39 SSH access blocked by firewall
2019-07-02 06:59:55
95.85.69.87 attack
Attack me on crypto exchange HITBTC with hecking my account.
2019-07-02 07:10:39
186.178.61.140 attackbots
Fail2Ban Ban Triggered
2019-07-02 06:58:32
92.118.160.45 attack
Port scan: Attack repeated for 24 hours
2019-07-02 07:22:46
23.94.69.34 attackbotsspam
Jul  1 07:23:01 our-server-hostname postfix/smtpd[6359]: connect from unknown[23.94.69.34]
Jul x@x
Jul  1 07:23:03 our-server-hostname postfix/smtpd[6359]: lost connection after RCPT from unknown[23.94.69.34]
Jul  1 07:23:03 our-server-hostname postfix/smtpd[6359]: disconnect from unknown[23.94.69.34]
Jul  1 07:26:07 our-server-hostname postfix/smtpd[7730]: connect from unknown[23.94.69.34]
Jul x@x
Jul  1 07:26:08 our-server-hostname postfix/smtpd[7730]: lost connection after RCPT from unknown[23.94.69.34]
Jul  1 07:26:08 our-server-hostname postfix/smtpd[7730]: disconnect from unknown[23.94.69.34]
Jul  1 07:37:52 our-server-hostname postfix/smtpd[11149]: connect from unknown[23.94.69.34]
Jul x@x
Jul  1 07:37:53 our-server-hostname postfix/smtpd[11149]: lost connection after RCPT from unknown[23.94.69.34]
Jul  1 07:37:53 our-server-hostname postfix/smtpd[11149]: disconnect from unknown[23.94.69.34]
Jul  1 07:41:36 our-server-hostname postfix/smtpd[13426]: connect from u........
-------------------------------
2019-07-02 06:55:48
139.59.28.61 attack
Jul  1 20:42:22 MainVPS sshd[7124]: Invalid user security from 139.59.28.61 port 34278
Jul  1 20:42:22 MainVPS sshd[7124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.28.61
Jul  1 20:42:22 MainVPS sshd[7124]: Invalid user security from 139.59.28.61 port 34278
Jul  1 20:42:24 MainVPS sshd[7124]: Failed password for invalid user security from 139.59.28.61 port 34278 ssh2
Jul  1 20:45:59 MainVPS sshd[7374]: Invalid user juiia from 139.59.28.61 port 42988
...
2019-07-02 07:12:06
68.183.225.129 attackspam
Jul  2 01:07:22 cp sshd[24227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.225.129
Jul  2 01:07:23 cp sshd[24227]: Failed password for invalid user foo from 68.183.225.129 port 36540 ssh2
Jul  2 01:11:16 cp sshd[26574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.225.129
2019-07-02 07:19:43
94.191.31.230 attackspambots
2019-07-01T21:58:26.226033hub.schaetter.us sshd\[8834\]: Invalid user lab from 94.191.31.230
2019-07-01T21:58:26.256209hub.schaetter.us sshd\[8834\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.31.230
2019-07-01T21:58:28.512322hub.schaetter.us sshd\[8834\]: Failed password for invalid user lab from 94.191.31.230 port 45920 ssh2
2019-07-01T21:59:40.861989hub.schaetter.us sshd\[8839\]: Invalid user musicbot from 94.191.31.230
2019-07-01T21:59:40.892304hub.schaetter.us sshd\[8839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.31.230
...
2019-07-02 06:57:47
64.113.113.158 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 62
2019-07-02 06:56:57

最近上报的IP列表

64.235.100.81 155.193.33.54 106.114.199.174 91.224.92.125
49.76.204.196 49.67.89.34 220.185.85.118 171.213.223.4
171.114.231.250 125.112.149.92 118.120.181.118 114.233.89.117
114.230.58.162 203.236.207.239 111.224.218.219 106.57.252.236
2606:4700:10::6814:4513 2606:4700:10::6816:4250 121.134.176.108 2606:4700:10::6814:5081