必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Chatham

省份(region): Ontario

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       216.154.0.0 - 216.154.191.255
CIDR:           216.154.128.0/18, 216.154.0.0/17
NetName:        TS-1
NetHandle:      NET-216-154-0-0-1
Parent:         NET216 (NET-216-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   TekSavvy Solutions Inc. (TS-1)
RegDate:        2016-03-30
Updated:        2016-03-30
Ref:            https://rdap.arin.net/registry/ip/216.154.0.0


OrgName:        TekSavvy Solutions Inc.
OrgId:          TS-1
Address:        800 Richmond St.
City:           Chatham
StateProv:      ON
PostalCode:     N7M 5J5
Country:        CA
RegDate:        2010-10-15
Updated:        2019-03-29
Ref:            https://rdap.arin.net/registry/entity/TS-1

ReferralServer:  rwhois://rwhois.teksavvy.com:4321

OrgTechHandle: NOC1728-ARIN
OrgTechName:   NOC
OrgTechPhone:  +1-519-360-1575 
OrgTechEmail:  support@teksavvy.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC1728-ARIN

OrgAbuseHandle: ABUSE816-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-519-360-1575 
OrgAbuseEmail:  abuse@teksavvy.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE816-ARIN

OrgNOCHandle: TEKSA-ARIN
OrgNOCName:   Teksavvy NOC
OrgNOCPhone:  +1-519-360-1575 
OrgNOCEmail:  noc@teksavvy.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/TEKSA-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.teksavvy.com:4321.

%rwhois V-1.5:002010:00 rwhois.teksavvy.com (by Network Solutions, Inc. V-1.5.9.6)
network:Auth-Area:.
network:Class-Name:network
network:IP-Network:216.154.0.0/17
network:Network-Name:LNS pools
network:Organization:Private Customer - TEKSAVVY SOLUTIONS
network:Street-Address:Toronto, ON
network:Country-Code:CA

%ok
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.154.72.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15335
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;216.154.72.216.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031600 1800 900 604800 86400

;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 16 22:43:11 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
216.72.154.216.in-addr.arpa domain name pointer 216-154-72-216.cpe.teksavvy.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
216.72.154.216.in-addr.arpa	name = 216-154-72-216.cpe.teksavvy.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
165.22.33.32 attack
Sep  7 17:17:45 Tower sshd[20979]: Connection from 165.22.33.32 port 36340 on 192.168.10.220 port 22 rdomain ""
Sep  7 17:17:45 Tower sshd[20979]: Failed password for root from 165.22.33.32 port 36340 ssh2
Sep  7 17:17:46 Tower sshd[20979]: Received disconnect from 165.22.33.32 port 36340:11: Bye Bye [preauth]
Sep  7 17:17:46 Tower sshd[20979]: Disconnected from authenticating user root 165.22.33.32 port 36340 [preauth]
2020-09-08 05:40:12
45.142.120.93 attackspam
2020-09-08 00:19:54 dovecot_login authenticator failed for \(User\) \[45.142.120.93\]: 535 Incorrect authentication data \(set_id=tatsuya@org.ua\)2020-09-08 00:20:31 dovecot_login authenticator failed for \(User\) \[45.142.120.93\]: 535 Incorrect authentication data \(set_id=animalplanet@org.ua\)2020-09-08 00:21:10 dovecot_login authenticator failed for \(User\) \[45.142.120.93\]: 535 Incorrect authentication data \(set_id=iy@org.ua\)
...
2020-09-08 05:22:23
220.249.114.237 attackbots
Too many connections or unauthorized access detected from Arctic banned ip
2020-09-08 05:37:59
112.85.42.181 attackspambots
Failed password for invalid user from 112.85.42.181 port 64492 ssh2
2020-09-08 05:25:15
79.137.72.171 attackspambots
Sep  7 16:48:12 localhost sshd[51205]: Invalid user elision from 79.137.72.171 port 46671
Sep  7 16:48:12 localhost sshd[51205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.ip-79-137-72.eu
Sep  7 16:48:12 localhost sshd[51205]: Invalid user elision from 79.137.72.171 port 46671
Sep  7 16:48:14 localhost sshd[51205]: Failed password for invalid user elision from 79.137.72.171 port 46671 ssh2
Sep  7 16:54:56 localhost sshd[52078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.ip-79-137-72.eu  user=root
Sep  7 16:54:57 localhost sshd[52078]: Failed password for root from 79.137.72.171 port 49889 ssh2
...
2020-09-08 05:26:19
45.142.120.89 attackbots
2020-09-08 00:20:19 auth_plain authenticator failed for (User) [45.142.120.89]: 535 Incorrect authentication data (set_id=surgery@lavrinenko.info)
2020-09-08 00:20:58 auth_plain authenticator failed for (User) [45.142.120.89]: 535 Incorrect authentication data (set_id=s4@lavrinenko.info)
...
2020-09-08 05:24:49
172.105.28.132 attackspam
Port Scan detected!
...
2020-09-08 05:12:40
192.241.223.123 attackbotsspam
*Port Scan* detected from 192.241.223.123 (US/United States/California/Visitacion Valley/zg-0823a-149.stretchoid.com). 4 hits in the last 155 seconds
2020-09-08 05:13:54
129.211.73.2 attackspam
$f2bV_matches
2020-09-08 05:21:38
139.59.61.103 attackspambots
Port Scan
...
2020-09-08 05:17:04
37.59.55.14 attackbotsspam
Sep  7 19:27:54 ns381471 sshd[30871]: Failed password for root from 37.59.55.14 port 42712 ssh2
2020-09-08 05:28:24
159.65.111.89 attackspam
Sep  7 22:37:27 ns392434 sshd[5489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.111.89  user=root
Sep  7 22:37:28 ns392434 sshd[5489]: Failed password for root from 159.65.111.89 port 41180 ssh2
Sep  7 23:03:05 ns392434 sshd[5966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.111.89  user=root
Sep  7 23:03:07 ns392434 sshd[5966]: Failed password for root from 159.65.111.89 port 58336 ssh2
Sep  7 23:07:11 ns392434 sshd[6103]: Invalid user omcuser from 159.65.111.89 port 35496
Sep  7 23:07:11 ns392434 sshd[6103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.111.89
Sep  7 23:07:11 ns392434 sshd[6103]: Invalid user omcuser from 159.65.111.89 port 35496
Sep  7 23:07:13 ns392434 sshd[6103]: Failed password for invalid user omcuser from 159.65.111.89 port 35496 ssh2
Sep  7 23:11:02 ns392434 sshd[6252]: Invalid user admin from 159.65.111.89 port 40896
2020-09-08 05:40:26
123.207.250.132 attackspam
Too many connections or unauthorized access detected from Arctic banned ip
2020-09-08 05:38:20
115.159.153.180 attackbots
malicious Brute-Force reported by https://www.patrick-binder.de
...
2020-09-08 05:44:21
140.207.81.233 attack
Sep  7 18:52:33 melroy-server sshd[32712]: Failed password for root from 140.207.81.233 port 59642 ssh2
...
2020-09-08 05:35:52

最近上报的IP列表

91.66.146.156 4.154.227.46 34.12.107.152 185.244.104.207
104.155.11.101 149.119.188.27 143.180.22.208 101.181.164.237
103.181.164.237 125.42.96.246 40.5.110.209 80.94.92.10
39.100.80.150 101.133.131.45 43.165.3.25 114.66.54.183
36.113.115.150 20.46.225.117 1.234.96.192 69.92.141.241