必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       208.0.0.0 - 208.35.255.255
CIDR:           208.0.0.0/11, 208.32.0.0/14
NetName:        COGC
NetHandle:      NET-208-0-0-0-1
Parent:         NET208 (NET-208-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Cogent Communications, LLC (COGC)
RegDate:        1996-03-13
Updated:        2025-12-23
Ref:            https://rdap.arin.net/registry/ip/208.0.0.0



OrgName:        Cogent Communications, LLC
OrgId:          COGC
Address:        2450 N Street NW
City:           Washington
StateProv:      DC
PostalCode:     20037
Country:        US
RegDate:        2000-05-30
Updated:        2025-09-23
Comment:        Geofeed https://geofeed.cogentco.com/geofeed.csv
Ref:            https://rdap.arin.net/registry/entity/COGC

ReferralServer:  rwhois://rwhois.cogentco.com:4321

OrgAbuseHandle: COGEN-ARIN
OrgAbuseName:   Cogent Abuse
OrgAbusePhone:  +1-877-875-4311 
OrgAbuseEmail:  abuse@cogentco.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/COGEN-ARIN

OrgNOCHandle: ZC108-ARIN
OrgNOCName:   Cogent Communications
OrgNOCPhone:  +1-877-875-4311 
OrgNOCEmail:  noc@cogentco.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/ZC108-ARIN

OrgTechHandle: IPALL-ARIN
OrgTechName:   IP Allocation
OrgTechPhone:  +1-877-875-4311 
OrgTechEmail:  ipalloc@cogentco.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPALL-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.cogentco.com:4321.

%rwhois V-1.5:0010b0:00 rwhois.cogentco.com (CGNT rwhoisd 1.2.2)
%error 230 No objects found
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 208.20.217.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44381
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;208.20.217.159.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032300 1800 900 604800 86400

;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 19:35:47 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
159.217.20.208.in-addr.arpa domain name pointer webmail.apigroupinc.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
159.217.20.208.in-addr.arpa	name = webmail.apigroupinc.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
205.185.118.61 attackbots
Scanning random ports - tries to find possible vulnerable services
2019-06-25 04:06:02
180.182.245.145 attackbots
[portscan] tcp/23 [TELNET]
*(RWIN=44738)(06240931)
2019-06-25 04:21:01
5.188.62.5 attackspam
Jun 24 17:00:14 ns3367391 proftpd\[18830\]: 127.0.0.1 \(5.188.62.5\[5.188.62.5\]\) - USER yourdailypornvideos: no such user found from 5.188.62.5 \[5.188.62.5\] to 37.187.78.186:21
Jun 24 17:00:14 ns3367391 proftpd\[18829\]: 127.0.0.1 \(5.188.62.5\[5.188.62.5\]\) - USER yourdailypornmovies: no such user found from 5.188.62.5 \[5.188.62.5\] to 37.187.78.186:21
...
2019-06-25 03:46:25
195.56.253.49 attackbotsspam
$f2bV_matches
2019-06-25 03:48:29
37.1.200.139 attackbots
""
2019-06-25 04:09:34
146.0.200.152 attackbotsspam
[portscan] tcp/23 [TELNET]
*(RWIN=64403)(06240931)
2019-06-25 04:23:28
123.136.30.98 attackbotsspam
[SMB remote code execution attempt: port tcp/445]
*(RWIN=8192)(06240931)
2019-06-25 04:24:11
121.168.248.218 attack
Invalid user tphan from 121.168.248.218 port 36204
2019-06-25 03:43:45
50.227.195.3 attackspam
2019-06-24T20:33:36.352894centos sshd\[5224\]: Invalid user zzz from 50.227.195.3 port 35870
2019-06-24T20:33:36.359216centos sshd\[5224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.227.195.3
2019-06-24T20:33:38.906477centos sshd\[5224\]: Failed password for invalid user zzz from 50.227.195.3 port 35870 ssh2
2019-06-25 03:45:43
213.32.12.3 attackspambots
Triggered by Fail2Ban at Ares web server
2019-06-25 03:59:05
202.79.4.45 attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(06240931)
2019-06-25 04:16:10
138.197.197.174 attackbots
Invalid user testuser from 138.197.197.174 port 35650
2019-06-25 04:01:31
109.80.207.223 attackspam
:
2019-06-25 03:54:23
120.52.152.17 attack
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-06-25 04:08:58
89.216.105.45 attackbots
$f2bV_matches
2019-06-25 04:10:00

最近上报的IP列表

206.212.81.96 208.15.8.202 207.243.1.216 204.96.144.9
205.139.120.65 201.38.157.32 193.73.172.155 192.100.129.53
192.145.80.115 192.168.86.80 187.94.136.219 188.136.154.61
233.40.82.210 180.1.127.189 216.180.246.39 175.250.38.70
183.165.71.22 172.2.62.214 172.10.21.181 172.16.73.215