必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): RTC Communications LLC

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       208.132.128.0 - 208.138.15.255
CIDR:           208.132.128.0/17, 208.138.0.0/20, 208.133.0.0/16, 208.136.0.0/15, 208.134.0.0/15
NetName:        CENTURYLINK-LEGACY-SAVVIS-BLK93
NetHandle:      NET-208-132-128-0-1
Parent:         NET208 (NET-208-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   CenturyLink Communications, LLC (CCL-534)
RegDate:        1996-03-27
Updated:        2018-11-15
Ref:            https://rdap.arin.net/registry/ip/208.132.128.0



OrgName:        CenturyLink Communications, LLC
OrgId:          CCL-534
Address:        100 CENTURYLINK DR
City:           Monroe
StateProv:      LA
PostalCode:     71201
Country:        US
RegDate:        2018-07-12
Updated:        2024-06-17
Comment:        USAGE OF IP SPACE MUST COMPLY WITH OUR ACCEPTABLE USE POLICY:
Comment:        https://www.lumen.com/en-us/about/legal/acceptable-use-policy.html
Comment:        
Comment:        ADDRESSES COVERED BY THIS ORG-ID ARE NON-PORTABLE ANY ISP ANNOUNCING OR TRANSITING PORTIONS WITHIN OUR RANGES SHOULD NOT RELY ON PRESENTED LOA'S OR OLD WHOIS UNLESS THOSE RANGES ARE ALSO ACTIVELY DIRECTLY ANNOUNCED TO A LUMEN ASN. WITH ALL LOA'S THESE CONDITIONS APPLY:
Comment:        
Comment:        1. You are permitted to route the Lumen IP prefixes listed via Public BGP to your alternate ISP from the designated ASN. Any other ASN originating the prefix listed is forbidden.
Comment:        2. The Lumen IP prefixes listed can be routed via Public BGP to your alternate ISP as long as you remain an active customer with Lumen and continue to route the prefixes over at least one Lumen Internet circuit without significant traffic engineering.
Comment:        3. Should your Internet services with Lumen be discontinued, Lumen reserves the right to have your alternate ISP terminate the routing of the Lumen IP prefixes without advanced notification, should you fail to do so.
Comment:        4. All IP Addresses assigned or allocated by Lumen to an end-user (customer or ISP) shall be considered non-portable and will be reclaimed by Lumen upon service termination.
Comment:        5. Lumen reserves the right to conduct audits to ensure the LOA conditions are being met.
Comment:        6. Usage of IP space must comply with our AUP https://www.lumen.com/en-us/about/legal/acceptable-use-policy.html
Comment:        
Comment:        Our looking glass is located at: https://lookingglass.centurylink.com/
Comment:        
Comment:        For subpoena or court order please fax 844.254.5800 or refer to our Trust & Safety page:
Comment:        https://www.lumen.com/en-us/about/legal/trust-center/trust-and-safety.html
Comment:        
Comment:        For abuse issues, please email abuse@aup.lumen.com
Comment:        All abuse reports MUST include:
Comment:        * src IP
Comment:        * dest IP (your IP)
Comment:        * dest port
Comment:        * Accurate date/timestamp and timezone of activity
Comment:        * Intensity/frequency (short log extracts)
Comment:        * Your contact details (phone and email)
Comment:        Without these we will be unable to identify the correct owner of the IP address at that point in time.
Ref:            https://rdap.arin.net/registry/entity/CCL-534


OrgRoutingHandle: RPKIR-ARIN
OrgRoutingName:   RPKI-ROA
OrgRoutingPhone:  +1-877-886-6515 
OrgRoutingEmail:  rpki-roa@lumen.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/RPKIR-ARIN

OrgAbuseHandle: CAD54-ARIN
OrgAbuseName:   Centurylink Abuse Desk
OrgAbusePhone:  +1-877-886-6515 
OrgAbuseEmail:  abuse@aup.lumen.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/CAD54-ARIN

OrgTechHandle: QIA-ARIN
OrgTechName:   Centurylink IP Admin
OrgTechPhone:  +1-877-886-6515 
OrgTechEmail:  ipadmin@centurylink.com
OrgTechRef:    https://rdap.arin.net/registry/entity/QIA-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 208.137.10.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 408
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;208.137.10.133.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032101 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 22 04:09:15 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 133.10.137.208.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 208.137.10.133.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
183.14.135.209 attackbots
detected by Fail2Ban
2020-08-10 06:29:49
45.176.208.50 attackspambots
Aug 10 03:19:45 webhost01 sshd[5787]: Failed password for root from 45.176.208.50 port 44393 ssh2
...
2020-08-10 06:26:43
121.122.81.195 attackbotsspam
2020-08-09T14:44:25.260363correo.[domain] sshd[43933]: Failed password for root from 121.122.81.195 port 12447 ssh2 2020-08-09T14:48:22.104524correo.[domain] sshd[44775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.122.81.195 user=root 2020-08-09T14:48:23.974918correo.[domain] sshd[44775]: Failed password for root from 121.122.81.195 port 48260 ssh2 ...
2020-08-10 06:29:27
166.62.122.244 attackspam
166.62.122.244 - - [10/Aug/2020:00:32:37 +0200] "GET /wp-login.php HTTP/1.1" 200 5990 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
166.62.122.244 - - [10/Aug/2020:00:32:40 +0200] "POST /wp-login.php HTTP/1.1" 200 6220 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
166.62.122.244 - - [10/Aug/2020:00:32:41 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-10 06:35:30
223.247.194.43 attack
Aug  9 23:32:11 vps639187 sshd\[6020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.194.43  user=root
Aug  9 23:32:13 vps639187 sshd\[6020\]: Failed password for root from 223.247.194.43 port 54636 ssh2
Aug  9 23:35:28 vps639187 sshd\[6063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.194.43  user=root
...
2020-08-10 06:24:51
60.167.191.86 attackspambots
Failed password for root from 60.167.191.86 port 60877 ssh2
2020-08-10 06:31:26
120.210.134.49 attack
Aug 10 01:22:13 gw1 sshd[15227]: Failed password for root from 120.210.134.49 port 57600 ssh2
...
2020-08-10 06:36:00
101.231.124.6 attackspam
IP blocked
2020-08-10 06:06:20
51.75.241.233 attack
Aug 10 03:36:44 gw1 sshd[18086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.241.233
Aug 10 03:36:46 gw1 sshd[18086]: Failed password for invalid user ramon from 51.75.241.233 port 52748 ssh2
...
2020-08-10 06:40:56
183.111.204.148 attackspam
prod6
...
2020-08-10 06:11:29
61.110.178.150 attackbots
Port Scan detected!
...
2020-08-10 06:27:04
188.165.230.118 attack
188.165.230.118 - - [09/Aug/2020:23:03:45 +0100] "POST /wp-login.php HTTP/1.1" 200 5927 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
188.165.230.118 - - [09/Aug/2020:23:07:43 +0100] "POST /wp-login.php HTTP/1.1" 200 5920 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
188.165.230.118 - - [09/Aug/2020:23:09:08 +0100] "POST /wp-login.php HTTP/1.1" 200 5920 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
...
2020-08-10 06:20:22
61.181.80.253 attackspambots
$f2bV_matches
2020-08-10 06:37:29
114.32.239.219 attack
Sent packet to closed port: 9530
2020-08-10 06:42:38
103.122.32.99 attackbotsspam
Aug  9 16:24:16 Host-KEWR-E sshd[2562]: User root from 103.122.32.99 not allowed because not listed in AllowUsers
...
2020-08-10 06:39:37

最近上报的IP列表

199.145.107.231 171.66.101.0 172.162.2.122 163.64.176.16
192.168.1.203 155.26.114.182 140.11.28.161 137.142.187.141
138.197.172.191 134.84.30.48 146.110.207.1 109.36.174.112
10.44.3.113 10.45.29.198 10.211.20.95 10.195.245.57
10.102.4.65 10.140.99.168 10.116.163.132 10.177.22.109