必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Hermiston

省份(region): Oregon

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       208.65.216.0 - 208.65.219.255
CIDR:           208.65.216.0/22
NetName:        WINDWAVE
NetHandle:      NET-208-65-216-0-1
Parent:         NET208 (NET-208-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   WindWave Communications (WINDW-1)
RegDate:        2006-03-14
Updated:        2017-03-23
Ref:            https://rdap.arin.net/registry/ip/208.65.216.0


OrgName:        WindWave Communications
OrgId:          WINDW-1
Address:        P.O. Box 1390
City:           Boardman
StateProv:      OR
PostalCode:     97818
Country:        US
RegDate:        2005-01-26
Updated:        2017-06-28
Ref:            https://rdap.arin.net/registry/entity/WINDW-1


OrgTechHandle: MORGA357-ARIN
OrgTechName:   Morgan, Brian 
OrgTechPhone:  +1-800-862-8508 
OrgTechEmail:  bmorgan@windwave.tc
OrgTechRef:    https://rdap.arin.net/registry/entity/MORGA357-ARIN

OrgAbuseHandle: ABUSE6015-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-800-862-8508 
OrgAbuseEmail:  abuse@windwave.tc
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE6015-ARIN

OrgNOCHandle: MUNRO1-ARIN
OrgNOCName:   Munro
OrgNOCPhone:  +1-800-862-8508 
OrgNOCEmail:  bruce.munro@windwave.tc
OrgNOCRef:    https://rdap.arin.net/registry/entity/MUNRO1-ARIN

# end


# start

NetRange:       208.65.217.0 - 208.65.217.127
CIDR:           208.65.217.0/25
NetName:        MACHMEDIA
NetHandle:      NET-208-65-217-0-1
Parent:         WINDWAVE (NET-208-65-216-0-1)
NetType:        Reassigned
OriginAS:       
Organization:   MachMedia (MACHM-2)
RegDate:        2018-10-24
Updated:        2018-10-24
Ref:            https://rdap.arin.net/registry/ip/208.65.217.0


OrgName:        MachMedia
OrgId:          MACHM-2
Address:        1304 E Main Street
City:           Hermiston
StateProv:      OR
PostalCode:     97838
Country:        US
RegDate:        2018-10-24
Updated:        2018-10-24
Ref:            https://rdap.arin.net/registry/entity/MACHM-2


OrgTechHandle: CALAM8-ARIN
OrgTechName:   Calame, Michael 
OrgTechPhone:  +1-541-720-0080 
OrgTechEmail:  mcalame@machmedia.net
OrgTechRef:    https://rdap.arin.net/registry/entity/CALAM8-ARIN

OrgAbuseHandle: CALAM8-ARIN
OrgAbuseName:   Calame, Michael 
OrgAbusePhone:  +1-541-720-0080 
OrgAbuseEmail:  mcalame@machmedia.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/CALAM8-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 208.65.217.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63221
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;208.65.217.1.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026051601 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 17 09:45:21 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
1.217.65.208.in-addr.arpa domain name pointer m2m-208-65-217-1.cust.windwave.tc.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
1.217.65.208.in-addr.arpa	name = m2m-208-65-217-1.cust.windwave.tc.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.233.53.132 attackspam
Nov 23 06:22:44 php1 sshd\[14329\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.233.53.132  user=root
Nov 23 06:22:47 php1 sshd\[14329\]: Failed password for root from 222.233.53.132 port 39438 ssh2
Nov 23 06:26:41 php1 sshd\[14950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.233.53.132  user=backup
Nov 23 06:26:42 php1 sshd\[14950\]: Failed password for backup from 222.233.53.132 port 46410 ssh2
Nov 23 06:30:29 php1 sshd\[15287\]: Invalid user guest from 222.233.53.132
2019-11-24 06:10:11
35.201.243.170 attackbots
Nov 23 17:02:28 server sshd\[32237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.243.201.35.bc.googleusercontent.com 
Nov 23 17:02:30 server sshd\[32237\]: Failed password for invalid user bristow from 35.201.243.170 port 8366 ssh2
Nov 24 00:28:05 server sshd\[19451\]: Invalid user ching from 35.201.243.170
Nov 24 00:28:05 server sshd\[19451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.243.201.35.bc.googleusercontent.com 
Nov 24 00:28:08 server sshd\[19451\]: Failed password for invalid user ching from 35.201.243.170 port 18988 ssh2
...
2019-11-24 06:25:54
112.140.187.72 attackbots
112.140.187.72 - - [23/Nov/2019:16:33:40 +0100] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
112.140.187.72 - - [23/Nov/2019:16:33:42 +0100] "POST /wp-login.php HTTP/1.1" 200 1503 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
112.140.187.72 - - [23/Nov/2019:16:33:43 +0100] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
112.140.187.72 - - [23/Nov/2019:16:33:44 +0100] "POST /wp-login.php HTTP/1.1" 200 1489 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
112.140.187.72 - - [23/Nov/2019:16:33:45 +0100] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
112.140.187.72 - - [23/Nov/2019:16:33:47 +0100] "POST /wp-login.php HTTP/1.1" 200 1491 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-11-24 06:33:00
88.116.5.26 attack
2019-11-23 05:46:41 server sshd[33197]: Failed password for invalid user kaliyah from 88.116.5.26 port 42018 ssh2
2019-11-24 06:11:13
188.166.108.161 attack
Invalid user jump from 188.166.108.161 port 59566
2019-11-24 06:18:48
148.70.3.199 attackspambots
Nov 23 20:32:33 vibhu-HP-Z238-Microtower-Workstation sshd\[5651\]: Invalid user annio from 148.70.3.199
Nov 23 20:32:33 vibhu-HP-Z238-Microtower-Workstation sshd\[5651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.3.199
Nov 23 20:32:34 vibhu-HP-Z238-Microtower-Workstation sshd\[5651\]: Failed password for invalid user annio from 148.70.3.199 port 35360 ssh2
Nov 23 20:38:19 vibhu-HP-Z238-Microtower-Workstation sshd\[5870\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.3.199  user=uucp
Nov 23 20:38:21 vibhu-HP-Z238-Microtower-Workstation sshd\[5870\]: Failed password for uucp from 148.70.3.199 port 44030 ssh2
...
2019-11-24 06:29:38
134.209.152.90 attackbotsspam
Automatic report - XMLRPC Attack
2019-11-24 06:05:21
186.249.213.59 attack
Connection by 186.249.213.59 on port: 23 got caught by honeypot at 11/23/2019 1:17:27 PM
2019-11-24 06:14:51
183.211.130.72 attackbots
badbot
2019-11-24 06:39:37
89.248.168.202 attackbotsspam
11/23/2019-16:26:51.416596 89.248.168.202 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-24 06:08:34
165.227.15.124 attackbotsspam
Automatic report - XMLRPC Attack
2019-11-24 06:10:36
178.207.160.6 attack
Nov 23 09:03:50 php1 sshd\[29431\]: Invalid user bar from 178.207.160.6
Nov 23 09:03:50 php1 sshd\[29431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.207.160.6
Nov 23 09:03:53 php1 sshd\[29431\]: Failed password for invalid user bar from 178.207.160.6 port 43634 ssh2
Nov 23 09:07:34 php1 sshd\[29759\]: Invalid user tya from 178.207.160.6
Nov 23 09:07:34 php1 sshd\[29759\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.207.160.6
2019-11-24 06:29:04
41.38.73.245 attackbots
Repeated brute force against a port
2019-11-24 06:19:59
116.29.140.31 attackbots
badbot
2019-11-24 06:16:21
113.141.70.239 attack
11/23/2019-09:17:03.923515 113.141.70.239 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-11-24 06:21:13

最近上报的IP列表

207.145.214.197 163.191.99.2 175.27.188.56 43.153.207.127
2606:4700:10::6814:6156 2606:4700:10::ac43:2164 164.155.74.49 103.112.79.210
111.102.109.205 74.222.3.233 43.134.224.16 220.197.78.48
122.29.2.35 165.232.111.70 121.29.84.223 101.204.251.227
34.62.70.232 43.134.187.251 5.61.209.126 34.77.181.31