必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       215.0.0.0 - 215.255.255.255
CIDR:           215.0.0.0/8
NetName:        DNIC-NET-215
NetHandle:      NET-215-0-0-0-1
Parent:          ()
NetType:        Direct Allocation
OriginAS:       
Organization:   United States Department of Defense (DoD) (USDDD)
RegDate:        1998-06-05
Updated:        2025-09-05
Ref:            https://rdap.arin.net/registry/ip/215.0.0.0



OrgName:        United States Department of Defense (DoD)
OrgId:          USDDD
Address:        3990 E. Broad Street
City:           Columbus
StateProv:      OH
PostalCode:     43218
Country:        US
RegDate:        2007-01-12
Updated:        2025-03-13
Ref:            https://rdap.arin.net/registry/entity/USDDD


OrgAbuseHandle: MIL-HSTMST-ARIN
OrgAbuseName:   Network DoD
OrgAbusePhone:  +1-844-347-2457 
OrgAbuseEmail:  disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgAbuseRef:    https://rdap.arin.net/registry/entity/MIL-HSTMST-ARIN

OrgTechHandle: MIL-HSTMST-ARIN
OrgTechName:   Network DoD
OrgTechPhone:  +1-844-347-2457 
OrgTechEmail:  disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgTechRef:    https://rdap.arin.net/registry/entity/MIL-HSTMST-ARIN

OrgTechHandle: REGIS10-ARIN
OrgTechName:   Registration
OrgTechPhone:  +1-844-347-2457 
OrgTechEmail:  disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgTechRef:    https://rdap.arin.net/registry/entity/REGIS10-ARIN

OrgNOCHandle: MIL-HSTMST-ARIN
OrgNOCName:   Network DoD
OrgNOCPhone:  +1-844-347-2457 
OrgNOCEmail:  disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgNOCRef:    https://rdap.arin.net/registry/entity/MIL-HSTMST-ARIN

# end


# start

NetRange:       215.0.0.0 - 215.255.255.255
CIDR:           215.0.0.0/8
NetName:        DNIC-NET-215
NetHandle:      NET-215-0-0-0-2
Parent:         DNIC-NET-215 (NET-215-0-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   DoD Network Information Center (DNIC)
RegDate:        2025-09-05
Updated:        2025-09-05
Ref:            https://rdap.arin.net/registry/ip/215.0.0.0



OrgName:        DoD Network Information Center
OrgId:          DNIC
Address:        3990 E. Broad Street
City:           Columbus
StateProv:      OH
PostalCode:     43218
Country:        US
RegDate:        
Updated:        2025-03-13
Ref:            https://rdap.arin.net/registry/entity/DNIC


OrgTechHandle: REGIS10-ARIN
OrgTechName:   Registration
OrgTechPhone:  +1-844-347-2457 
OrgTechEmail:  disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgTechRef:    https://rdap.arin.net/registry/entity/REGIS10-ARIN

OrgAbuseHandle: REGIS10-ARIN
OrgAbuseName:   Registration
OrgAbusePhone:  +1-844-347-2457 
OrgAbuseEmail:  disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgAbuseRef:    https://rdap.arin.net/registry/entity/REGIS10-ARIN

OrgTechHandle: MIL-HSTMST-ARIN
OrgTechName:   Network DoD
OrgTechPhone:  +1-844-347-2457 
OrgTechEmail:  disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgTechRef:    https://rdap.arin.net/registry/entity/MIL-HSTMST-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 215.130.108.58
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44770
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;215.130.108.58.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031901 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 20 03:39:32 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 58.108.130.215.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 215.130.108.58.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.129.222.135 attack
SSH invalid-user multiple login attempts
2020-01-17 03:52:08
49.234.179.127 attackspam
Invalid user g from 49.234.179.127 port 45988
2020-01-17 03:55:29
106.54.219.94 attack
Unauthorized connection attempt detected from IP address 106.54.219.94 to port 2220 [J]
2020-01-17 04:15:45
144.217.13.40 attackspambots
Unauthorized connection attempt detected from IP address 144.217.13.40 to port 2220 [J]
2020-01-17 04:08:11
106.12.204.75 attackbotsspam
Unauthorized connection attempt detected from IP address 106.12.204.75 to port 2220 [J]
2020-01-17 04:17:18
106.52.16.54 attackspambots
Unauthorized connection attempt detected from IP address 106.52.16.54 to port 2220 [J]
2020-01-17 04:16:16
123.20.242.165 attackbots
Invalid user admin from 123.20.242.165 port 39844
2020-01-17 04:12:42
193.248.60.205 attackspambots
Unauthorized connection attempt detected from IP address 193.248.60.205 to port 2220 [J]
2020-01-17 04:02:53
211.24.110.125 attackspambots
SSH Brute-Force reported by Fail2Ban
2020-01-17 03:59:02
83.28.180.231 attackspambots
Invalid user ftpd from 83.28.180.231 port 42190
2020-01-17 03:53:37
51.178.28.196 attack
Unauthorized connection attempt detected from IP address 51.178.28.196 to port 2220 [J]
2020-01-17 04:21:15
132.148.129.180 attackbotsspam
Invalid user avis from 132.148.129.180 port 58398
2020-01-17 04:10:46
87.81.169.74 attackspambots
Invalid user carlos from 87.81.169.74 port 44606
2020-01-17 04:19:14
218.78.54.84 attackbots
Jan 16 20:43:39 ns37 sshd[19575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.54.84
Jan 16 20:43:39 ns37 sshd[19575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.54.84
2020-01-17 03:58:26
41.63.0.133 attack
Unauthorized connection attempt detected from IP address 41.63.0.133 to port 2220 [J]
2020-01-17 04:22:28

最近上报的IP列表

34.6.160.102 122.193.247.143 121.8.28.51 2606:4700:10::ac43:220e
2606:4700:10::6816:3637 2606:4700:10::ac43:2237 2606:4700:10::6816:3018 2606:4700:10::6816:1742
2606:4700:10::6814:7283 2606:4700:10::ac43:1119 121.108.113.250 12.39.168.85
121.254.76.213 50.19.163.240 3.81.224.7 34.226.195.14
173.0.255.10 2606:4700:10::6816:2330 2606:4700:10::ac43:636 2606:4700:10::6814:6586