必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#


NetRange:       216.167.0.0 - 216.167.127.255
CIDR:           216.167.0.0/17
NetName:        NTTA-216-167
NetHandle:      NET-216-167-0-0-1
Parent:         NET216 (NET-216-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   NTT America, Inc. (NTTAM-1)
RegDate:        2001-02-06
Updated:        2023-10-04
Comment:        Geofeed https://geo.ip.gin.ntt.net/geofeeds/geofeeds.csv
Comment:        Reassignment information for this block is
Comment:        available at rwhois.gin.ntt.net port 4321
Ref:            https://rdap.arin.net/registry/ip/216.167.0.0


OrgName:        NTT America, Inc.
OrgId:          NTTAM-1
Address:        15809 Bear Creek Pkwy
Address:        Suite 320
City:           Redmond
StateProv:      WA
PostalCode:     98052
Country:        US
RegDate:        2005-12-08
Updated:        2024-03-04
Ref:            https://rdap.arin.net/registry/entity/NTTAM-1

ReferralServer:  rwhois://rwhois.gin.ntt.net:4321

OrgTechHandle: VIPAR-ARIN
OrgTechName:   VIPAR
OrgTechPhone:  +1-877-688-6625 
OrgTechEmail:  ipr@gin.ntt.net
OrgTechRef:    https://rdap.arin.net/registry/entity/VIPAR-ARIN

OrgRoutingHandle: PEERI-ARIN
OrgRoutingName:   Peering
OrgRoutingPhone:  +1-877-688-6625 
OrgRoutingEmail:  peering@ntt.net
OrgRoutingRef:    https://rdap.arin.net/registry/entity/PEERI-ARIN

OrgAbuseHandle: NAAC-ARIN
OrgAbuseName:   NTT America Abuse Contact
OrgAbusePhone:  +1-877-688-6625 
OrgAbuseEmail:  abuse@ntt.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/NAAC-ARIN

OrgNOCHandle: NASC-ARIN
OrgNOCName:   NTT America Support Contact
OrgNOCPhone:  +1-877-688-6625 
OrgNOCEmail:  ce-support@gin.ntt.net
OrgNOCRef:    https://rdap.arin.net/registry/entity/NASC-ARIN

OrgTechHandle: CANDE70-ARIN
OrgTechName:   Candela, Massimo 
OrgTechPhone:  +1-214-915-1366 
OrgTechEmail:  massimo@ntt.net
OrgTechRef:    https://rdap.arin.net/registry/entity/CANDE70-ARIN

RTechHandle: VIA4-ORG-ARIN
RTechName:   VIPAR
RTechPhone:  +1-877-688-6625 
RTechEmail:  ipr@gin.ntt.net
RTechRef:    https://rdap.arin.net/registry/entity/VIA4-ORG-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.gin.ntt.net:4321.

%rwhois V-1.5:0078b6:00 rwhois.gin.ntt.net (Vipar 0.1a. Comments to ipr@gin.ntt.net)
network:Class-Name:network
network:Auth-Area:216.167.0.0/17
network:ID:NETBLK-USV4-216-167-000.127.0.0.1/32
network:Handle:NETBLK-USV4-216-167-000
network:Network-Name:USV4-216-167-000
network:IP-Network:216.167.0.0/17
network:In-Addr-Server;I:GIN1-HST.127.0.0.1/32
network:In-Addr-Server;I:GIN2-HST.127.0.0.1/32
network:In-Addr-Server;I:GIN3-HST.127.0.0.1/32
network:In-Addr-Server;I:GIN4-HST.127.0.0.1/32
network:In-Addr-Server;I:GIN5-HST.127.0.0.1/32
network:IP-Network-Block:216.167.0.0 - 216.167.127.255
network:Org-Name:NTT DATA
network:Street-Address:8300 E Maplewood Ave. Suite 400
network:City:Greenwood Village
network:State:CO
network:Postal-Code:80111
network:Country-Code:US
network:Tech-Contact;I:GIN-BBV4.127.0.0.1/32
network:Created:2000-05-23 06:26:41+00
network:Updated:2025-07-11 13:36:18.422828+00

%ok
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.167.121.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48169
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;216.167.121.124.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025110800 1800 900 604800 86400

;; Query time: 92 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 09 00:26:25 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
b'Host 124.121.167.216.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 216.167.121.124.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
200.195.171.74 attack
Invalid user degenius from 200.195.171.74 port 47198
2020-01-04 04:52:15
5.196.226.217 attackbotsspam
Unauthorized connection attempt detected from IP address 5.196.226.217 to port 22
2020-01-04 04:23:40
132.232.52.60 attackbotsspam
Invalid user neria from 132.232.52.60 port 44334
2020-01-04 04:35:50
197.248.16.118 attack
Invalid user tomcat from 197.248.16.118 port 39914
2020-01-04 04:26:49
42.243.111.90 attackspambots
Unauthorized connection attempt detected from IP address 42.243.111.90 to port 22
2020-01-04 04:49:04
49.232.37.191 attackspam
Jan  3 10:24:32 wbs sshd\[28429\]: Invalid user bsp from 49.232.37.191
Jan  3 10:24:32 wbs sshd\[28429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.37.191
Jan  3 10:24:33 wbs sshd\[28429\]: Failed password for invalid user bsp from 49.232.37.191 port 47624 ssh2
Jan  3 10:26:27 wbs sshd\[28609\]: Invalid user bki from 49.232.37.191
Jan  3 10:26:27 wbs sshd\[28609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.37.191
2020-01-04 04:47:31
35.199.154.128 attackbotsspam
Jan  3 15:07:30 main sshd[25149]: Failed password for invalid user python from 35.199.154.128 port 44944 ssh2
2020-01-04 04:22:55
138.197.25.187 attackspam
Invalid user wwwadmin from 138.197.25.187 port 48056
2020-01-04 04:34:43
159.89.134.64 attack
Invalid user nasuka from 159.89.134.64 port 50182
2020-01-04 04:32:23
104.168.246.128 attack
Invalid user vangestad from 104.168.246.128 port 57222
2020-01-04 04:42:47
106.12.16.140 attackbots
Jan  3 21:28:30 markkoudstaal sshd[22593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.16.140
Jan  3 21:28:32 markkoudstaal sshd[22593]: Failed password for invalid user test from 106.12.16.140 port 51878 ssh2
Jan  3 21:32:58 markkoudstaal sshd[22938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.16.140
2020-01-04 04:42:11
85.192.134.226 attack
20/1/3@07:59:23: FAIL: Alarm-Intrusion address from=85.192.134.226
...
2020-01-04 04:43:47
200.105.183.118 attack
$f2bV_matches
2020-01-04 04:26:21
185.81.96.39 attack
Invalid user teodora from 185.81.96.39 port 35972
2020-01-04 04:28:54
222.252.46.6 attackbotsspam
Invalid user admin from 222.252.46.6 port 51751
2020-01-04 04:24:14

最近上报的IP列表

38.240.36.246 247.129.96.154 103.120.91.227 27.224.127.11
216.132.108.123 27.224.127.203 3.79.2.152 113.195.55.205
143.198.13.10 8.105.238.76 38.220.131.206 38.220.131.211
103.167.204.116 121.199.161.161 154.36.182.80 38.143.109.225
121.41.100.68 112.124.67.2 196.251.86.122 20.81.46.129