必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Los Angeles

省份(region): California

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       208.80.248.0 - 208.80.251.255
CIDR:           208.80.248.0/22
NetName:        CDNETWORKSUS-01
NetHandle:      NET-208-80-248-0-1
Parent:         NET208 (NET-208-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   CDNetworks Inc. (CDNET)
RegDate:        2007-08-03
Updated:        2021-12-14
Comment:        Any abuse related problem, please contact sod@cdnetworks.com
Ref:            https://rdap.arin.net/registry/ip/208.80.248.0


OrgName:        CDNetworks Inc.
OrgId:          CDNET
Address:        1550 Valley Vista Dr., Suite 110
City:           Diamond Bar
StateProv:      CA
PostalCode:     91765
Country:        US
RegDate:        2007-01-05
Updated:        2020-01-22
Ref:            https://rdap.arin.net/registry/entity/CDNET


OrgTechHandle: NOCAN2-ARIN
OrgTechName:   NOC and TroubleShooting
OrgTechPhone:  +1-877-937-4236 
OrgTechEmail:  netops@cdnetworks.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NOCAN2-ARIN

OrgNOCHandle: NOCAN2-ARIN
OrgNOCName:   NOC and TroubleShooting
OrgNOCPhone:  +1-877-937-4236 
OrgNOCEmail:  netops@cdnetworks.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/NOCAN2-ARIN

OrgAbuseHandle: IAA24-ARIN
OrgAbuseName:   IP Addressing Abuse
OrgAbusePhone:  +1-877-937-4236 
OrgAbuseEmail:  ABUSE@cdnetworks.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/IAA24-ARIN

RAbuseHandle: IAA24-ARIN
RAbuseName:   IP Addressing Abuse
RAbusePhone:  +1-877-937-4236 
RAbuseEmail:  ABUSE@cdnetworks.com
RAbuseRef:    https://rdap.arin.net/registry/entity/IAA24-ARIN

RTechHandle: NOCAN2-ARIN
RTechName:   NOC and TroubleShooting
RTechPhone:  +1-877-937-4236 
RTechEmail:  netops@cdnetworks.com
RTechRef:    https://rdap.arin.net/registry/entity/NOCAN2-ARIN

RNOCHandle: NOCAN2-ARIN
RNOCName:   NOC and TroubleShooting
RNOCPhone:  +1-877-937-4236 
RNOCEmail:  netops@cdnetworks.com
RNOCRef:    https://rdap.arin.net/registry/entity/NOCAN2-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 208.80.248.225
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21475
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;208.80.248.225.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041201 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 13 14:39:54 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
b'Host 225.248.80.208.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 225.248.80.208.in-addr.arpa: SERVFAIL

相关IP信息:
最新评论:
IP 类型 评论内容 时间
42.118.242.189 attack
Unauthorized connection attempt detected from IP address 42.118.242.189 to port 2220 [J]
2020-01-25 17:55:16
14.162.92.20 attackbots
Unauthorized connection attempt detected from IP address 14.162.92.20 to port 88 [J]
2020-01-25 17:57:56
112.112.114.133 attackbots
Unauthorized connection attempt detected from IP address 112.112.114.133 to port 5555 [J]
2020-01-25 17:45:22
45.10.175.13 attack
Unauthorized connection attempt detected from IP address 45.10.175.13 to port 80 [J]
2020-01-25 17:54:41
140.143.17.156 attackspambots
Unauthorized connection attempt detected from IP address 140.143.17.156 to port 2220 [J]
2020-01-25 17:43:41
122.51.219.2 attack
Unauthorized connection attempt detected from IP address 122.51.219.2 to port 2220 [J]
2020-01-25 18:12:13
160.20.253.19 attackbots
Unauthorized connection attempt detected from IP address 160.20.253.19 to port 1433 [J]
2020-01-25 17:42:45
192.241.133.33 attackspambots
Unauthorized connection attempt detected from IP address 192.241.133.33 to port 2220 [J]
2020-01-25 17:37:10
151.234.47.42 attackbotsspam
Unauthorized connection attempt detected from IP address 151.234.47.42 to port 8080 [J]
2020-01-25 18:09:23
122.191.100.14 attack
Unauthorized connection attempt detected from IP address 122.191.100.14 to port 1433 [J]
2020-01-25 18:11:30
176.106.162.202 attackbots
Unauthorized connection attempt detected from IP address 176.106.162.202 to port 4567 [J]
2020-01-25 18:07:17
167.114.152.25 attack
Automatic report - SSH Brute-Force Attack
2020-01-25 17:33:42
49.51.12.179 attackspam
Unauthorized connection attempt detected from IP address 49.51.12.179 to port 7788 [J]
2020-01-25 17:53:55
196.47.67.180 attackspambots
Jan 24 21:34:09 home sshd[25193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.47.67.180  user=root
Jan 24 21:34:11 home sshd[25193]: Failed password for root from 196.47.67.180 port 44092 ssh2
Jan 24 21:51:32 home sshd[25493]: Invalid user adam from 196.47.67.180 port 52605
Jan 24 21:51:32 home sshd[25493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.47.67.180
Jan 24 21:51:32 home sshd[25493]: Invalid user adam from 196.47.67.180 port 52605
Jan 24 21:51:34 home sshd[25493]: Failed password for invalid user adam from 196.47.67.180 port 52605 ssh2
Jan 24 21:59:48 home sshd[25646]: Invalid user billy from 196.47.67.180 port 39182
Jan 24 21:59:48 home sshd[25646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.47.67.180
Jan 24 21:59:48 home sshd[25646]: Invalid user billy from 196.47.67.180 port 39182
Jan 24 21:59:50 home sshd[25646]: Failed password for invalid user billy f
2020-01-25 18:02:15
191.5.252.218 attackspambots
unauthorized connection attempt
2020-01-25 18:02:47

最近上报的IP列表

185.23.46.40 54.105.246.56 91.65.186.135 31.77.102.54
2606:4700:10::ac43:2019 2606:4700:10::6814:7032 2606:4700:10::ac43:1569 2606:4700:10::6814:5172
2606:4700:10::6814:4900 2606:4700:10::ac43:2724 51.103.43.80 2606:4700:10::ac43:1352
2606:4700:10::6816:2311 2606:4700:10::6814:9453 43.129.247.237 172.232.209.215
35.195.84.127 34.95.249.32 161.35.175.50 2606:4700:10::6816:2158