必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Los Angeles

省份(region): California

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       216.234.140.0 - 216.234.143.255
CIDR:           216.234.140.0/22
NetName:        DMITI-IPV4-D
NetHandle:      NET-216-234-140-0-1
Parent:         NET216 (NET-216-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   DMIT Cloud Services (DMITI)
RegDate:        2023-09-29
Updated:        2023-09-29
Ref:            https://rdap.arin.net/registry/ip/216.234.140.0


OrgName:        DMIT Cloud Services
OrgId:          DMITI
Address:        418 Broadway Ste N
City:           Albany
StateProv:      NY
PostalCode:     12207
Country:        US
RegDate:        2018-01-08
Updated:        2026-01-27
Ref:            https://rdap.arin.net/registry/entity/DMITI


OrgTechHandle: NOC32817-ARIN
OrgTechName:   Network Operations Center
OrgTechPhone:  +1-518-992-0595 
OrgTechEmail:  noc@dmit.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC32817-ARIN

OrgNOCHandle: NOC32817-ARIN
OrgNOCName:   Network Operations Center
OrgNOCPhone:  +1-518-992-0595 
OrgNOCEmail:  noc@dmit.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/NOC32817-ARIN

OrgAbuseHandle: ABUSE7106-ARIN
OrgAbuseName:   Abuse Department
OrgAbusePhone:  +1-518-992-0595 
OrgAbuseEmail:  abuse@dmit.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE7106-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.234.140.59
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51571
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;216.234.140.59.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026020504 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 06 07:45:22 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
b'59.140.234.216.in-addr.arpa domain name pointer host-by.dmit.com.
'
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
59.140.234.216.in-addr.arpa	name = Host-By.DMIT.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
14.186.234.70 attack
Invalid user admin from 14.186.234.70 port 60140
2020-05-24 03:34:34
216.206.86.101 attackbotsspam
Invalid user scn from 216.206.86.101 port 44527
2020-05-24 03:36:03
117.158.175.167 attack
(sshd) Failed SSH login from 117.158.175.167 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: May 23 14:15:01 host sshd[60934]: Invalid user hll from 117.158.175.167 port 40916
2020-05-24 03:22:01
87.123.198.161 attack
Invalid user justice from 87.123.198.161 port 26356
2020-05-24 03:26:52
129.205.112.253 attack
5x Failed Password
2020-05-24 03:17:44
188.131.173.220 attackbots
2020-05-23T11:15:55.514068xentho-1 sshd[680917]: Invalid user sfj from 188.131.173.220 port 48448
2020-05-23T11:15:56.967662xentho-1 sshd[680917]: Failed password for invalid user sfj from 188.131.173.220 port 48448 ssh2
2020-05-23T11:16:43.145570xentho-1 sshd[680925]: Invalid user hfj from 188.131.173.220 port 57160
2020-05-23T11:16:43.155244xentho-1 sshd[680925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.173.220
2020-05-23T11:16:43.145570xentho-1 sshd[680925]: Invalid user hfj from 188.131.173.220 port 57160
2020-05-23T11:16:44.860474xentho-1 sshd[680925]: Failed password for invalid user hfj from 188.131.173.220 port 57160 ssh2
2020-05-23T11:17:39.173506xentho-1 sshd[680952]: Invalid user ishihara from 188.131.173.220 port 37640
2020-05-23T11:17:39.179325xentho-1 sshd[680952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.173.220
2020-05-23T11:17:39.173506xentho-1 sshd[680952]: In
...
2020-05-24 03:10:18
119.29.3.45 attack
May 23 12:10:16 mockhub sshd[27003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.3.45
May 23 12:10:18 mockhub sshd[27003]: Failed password for invalid user qqm from 119.29.3.45 port 50695 ssh2
...
2020-05-24 03:20:51
2.36.136.146 attackspambots
Repeated brute force against a port
2020-05-24 03:35:25
129.211.22.55 attackspambots
Failed password for invalid user mashuai from 129.211.22.55 port 41434 ssh2
2020-05-24 03:17:24
51.75.70.30 attack
May 24 03:23:32 NG-HHDC-SVS-001 sshd[1451]: Invalid user uqf from 51.75.70.30
...
2020-05-24 03:30:34
79.137.82.213 attack
Invalid user qvr from 79.137.82.213 port 58862
2020-05-24 03:27:23
40.72.97.22 attackspambots
Invalid user nam from 40.72.97.22 port 46380
2020-05-24 03:32:26
124.251.110.147 attackspam
May 23 19:33:01 electroncash sshd[49104]: Invalid user bn from 124.251.110.147 port 50858
May 23 19:33:01 electroncash sshd[49104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.251.110.147 
May 23 19:33:01 electroncash sshd[49104]: Invalid user bn from 124.251.110.147 port 50858
May 23 19:33:04 electroncash sshd[49104]: Failed password for invalid user bn from 124.251.110.147 port 50858 ssh2
May 23 19:36:26 electroncash sshd[50088]: Invalid user bvh from 124.251.110.147 port 50476
...
2020-05-24 03:18:29
150.223.2.48 attack
Invalid user rln from 150.223.2.48 port 34141
2020-05-24 03:15:38
183.134.89.199 attack
May 23 21:29:05 abendstille sshd\[3533\]: Invalid user ojn from 183.134.89.199
May 23 21:29:05 abendstille sshd\[3533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.134.89.199
May 23 21:29:07 abendstille sshd\[3533\]: Failed password for invalid user ojn from 183.134.89.199 port 40828 ssh2
May 23 21:31:45 abendstille sshd\[5868\]: Invalid user eg from 183.134.89.199
May 23 21:31:45 abendstille sshd\[5868\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.134.89.199
...
2020-05-24 03:40:10

最近上报的IP列表

123.5.215.28 120.9.189.180 115.63.124.220 115.60.128.187
111.208.78.229 110.18.12.103 101.28.195.235 54.144.193.250
61.224.89.26 117.44.229.17 171.35.100.71 40.70.26.226
14.212.55.66 34.22.151.18 104.152.52.220 110.249.201.12
10.1.224.3 41.38.56.232 162.216.150.199 216.58.217.120