必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       216.36.64.0 - 216.36.127.255
CIDR:           216.36.64.0/18
NetName:        MEGAPATH-BLK-3
NetHandle:      NET-216-36-64-0-1
Parent:         NET216 (NET-216-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   GTT Americas, LLC (GAL-104)
RegDate:        2000-08-10
Updated:        2025-05-07
Ref:            https://rdap.arin.net/registry/ip/216.36.64.0



OrgName:        GTT Americas, LLC
OrgId:          GAL-104
Address:        4201 Wilson Blvd -Suite 504
City:           Arlington
StateProv:      VA
PostalCode:     22203
Country:        US
RegDate:        2025-02-11
Updated:        2025-07-08
Ref:            https://rdap.arin.net/registry/entity/GAL-104


OrgNOCHandle: GNOC16-ARIN
OrgNOCName:   GTT Network Operations Center
OrgNOCPhone:  +1-703-442-5500 
OrgNOCEmail:  noc@gtt.net
OrgNOCRef:    https://rdap.arin.net/registry/entity/GNOC16-ARIN

OrgTechHandle: GLD5-ARIN
OrgTechName:   GTT Legal Departement
OrgTechPhone:  +359886606 
OrgTechEmail:  alexander.mutafchiyski@gtt.net
OrgTechRef:    https://rdap.arin.net/registry/entity/GLD5-ARIN

OrgTechHandle: AS3251-ARIN
OrgTechName:   AS3257 Netguard
OrgTechPhone:  +49 69 48007422 
OrgTechEmail:  netguard@gtt.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AS3251-ARIN

OrgTechHandle: GIT5-ARIN
OrgTechName:   GTT IPAM Team
OrgTechPhone:  +1-703-442-5500 
OrgTechEmail:  netguard@gtt.net
OrgTechRef:    https://rdap.arin.net/registry/entity/GIT5-ARIN

OrgAbuseHandle: GAD46-ARIN
OrgAbuseName:   GTT Abuse Department
OrgAbusePhone:  +1-703-442-5501 
OrgAbuseEmail:  abuse@gtt.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/GAD46-ARIN

# end


# start

NetRange:       216.36.96.0 - 216.36.127.255
CIDR:           216.36.96.0/19
NetName:        GTT-CUSTOMER
NetHandle:      NET-216-36-96-0-1
Parent:         MEGAPATH-BLK-3 (NET-216-36-64-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       Private Customer (C11405734)
RegDate:        2025-10-29
Updated:        2025-10-29
Ref:            https://rdap.arin.net/registry/ip/216.36.96.0


CustName:       Private Customer
Address:        Private Residence
City:           Los Angeles
StateProv:      CA
PostalCode:     90012
Country:        US
RegDate:        2025-10-29
Updated:        2025-10-29
Ref:            https://rdap.arin.net/registry/entity/C11405734

OrgNOCHandle: GNOC16-ARIN
OrgNOCName:   GTT Network Operations Center
OrgNOCPhone:  +1-703-442-5500 
OrgNOCEmail:  noc@gtt.net
OrgNOCRef:    https://rdap.arin.net/registry/entity/GNOC16-ARIN

OrgTechHandle: GLD5-ARIN
OrgTechName:   GTT Legal Departement
OrgTechPhone:  +359886606 
OrgTechEmail:  alexander.mutafchiyski@gtt.net
OrgTechRef:    https://rdap.arin.net/registry/entity/GLD5-ARIN

OrgTechHandle: AS3251-ARIN
OrgTechName:   AS3257 Netguard
OrgTechPhone:  +49 69 48007422 
OrgTechEmail:  netguard@gtt.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AS3251-ARIN

OrgTechHandle: GIT5-ARIN
OrgTechName:   GTT IPAM Team
OrgTechPhone:  +1-703-442-5500 
OrgTechEmail:  netguard@gtt.net
OrgTechRef:    https://rdap.arin.net/registry/entity/GIT5-ARIN

OrgAbuseHandle: GAD46-ARIN
OrgAbuseName:   GTT Abuse Department
OrgAbusePhone:  +1-703-442-5501 
OrgAbuseEmail:  abuse@gtt.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/GAD46-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.36.112.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10176
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;216.36.112.80.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025120201 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 03 13:51:33 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
80.112.36.216.in-addr.arpa domain name pointer ip-216-36-112-80.dsl.sea.megapath.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.112.36.216.in-addr.arpa	name = ip-216-36-112-80.dsl.sea.megapath.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
206.189.131.211 attackbotsspam
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root
2020-09-04 07:18:54
137.74.118.135 attackspambots
ban
2020-09-04 07:14:31
41.142.245.48 attackspambots
2020-09-03 11:40:01.688513-0500  localhost smtpd[17531]: NOQUEUE: reject: RCPT from unknown[41.142.245.48]: 554 5.7.1 Service unavailable; Client host [41.142.245.48] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/41.142.245.48; from= to= proto=ESMTP helo=<[41.142.245.48]>
2020-09-04 07:15:38
59.97.135.146 attackbots
Port probing on unauthorized port 445
2020-09-04 07:09:50
41.144.80.18 attackbots
Sep  2 10:18:58 mxgate1 postfix/postscreen[17278]: CONNECT from [41.144.80.18]:29510 to [176.31.12.44]:25
Sep  2 10:18:58 mxgate1 postfix/dnsblog[17284]: addr 41.144.80.18 listed by domain zen.spamhaus.org as 127.0.0.4
Sep  2 10:18:58 mxgate1 postfix/dnsblog[17284]: addr 41.144.80.18 listed by domain zen.spamhaus.org as 127.0.0.10
Sep  2 10:18:58 mxgate1 postfix/dnsblog[17287]: addr 41.144.80.18 listed by domain cbl.abuseat.org as 127.0.0.2
Sep  2 10:18:58 mxgate1 postfix/dnsblog[17286]: addr 41.144.80.18 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Sep  2 10:18:58 mxgate1 postfix/dnsblog[17283]: addr 41.144.80.18 listed by domain b.barracudacentral.org as 127.0.0.2
Sep  2 10:19:04 mxgate1 postfix/postscreen[17278]: DNSBL rank 5 for [41.144.80.18]:29510
Sep x@x
Sep  2 10:19:05 mxgate1 postfix/postscreen[17278]: HANGUP after 1.4 from [41.144.80.18]:29510 in tests after SMTP handshake
Sep  2 10:19:05 mxgate1 postfix/postscreen[17278]: DISCONNECT [41.144.80.18]:29510
........
-------------------------------
2020-09-04 07:07:42
95.213.243.71 attackbots
SSH Invalid Login
2020-09-04 07:05:44
37.49.229.237 attack
[2020-09-03 18:47:54] NOTICE[1194][C-000000cc] chan_sip.c: Call from '' (37.49.229.237:5412) to extension '00447537174009' rejected because extension not found in context 'public'.
[2020-09-03 18:47:54] SECURITY[1233] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-09-03T18:47:54.364-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00447537174009",SessionID="0x7f2ddc38f978",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.49.229.237/5412",ACLName="no_extension_match"
[2020-09-03 18:53:04] NOTICE[1194][C-000000d0] chan_sip.c: Call from '' (37.49.229.237:7260) to extension '00447537174009' rejected because extension not found in context 'public'.
...
2020-09-04 07:04:05
207.249.163.34 attack
Sep  3 18:48:09 mellenthin postfix/smtpd[20928]: NOQUEUE: reject: RCPT from unknown[207.249.163.34]: 554 5.7.1 Service unavailable; Client host [207.249.163.34] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/207.249.163.34; from= to= proto=ESMTP helo=<[207.249.163.34]>
2020-09-04 07:08:13
51.178.86.97 attack
Sep  4 00:51:24 ns381471 sshd[14656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.86.97
Sep  4 00:51:26 ns381471 sshd[14656]: Failed password for invalid user solange from 51.178.86.97 port 34760 ssh2
2020-09-04 07:17:07
124.113.216.253 attack
2020-09-03 18:47:48,958 fail2ban.actions: WARNING [ssh] Ban 124.113.216.253
2020-09-04 07:27:56
116.103.168.253 attackbots
2020-09-03 11:41:08.585863-0500  localhost smtpd[17531]: NOQUEUE: reject: RCPT from unknown[116.103.168.253]: 554 5.7.1 Service unavailable; Client host [116.103.168.253] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/116.103.168.253; from= to= proto=ESMTP helo=<[116.103.168.253]>
2020-09-04 07:14:54
46.229.168.161 attackspam
The IP has triggered Cloudflare WAF. CF-Ray: 5cccc2fddb99740d | WAF_Rule_ID: 4c344d8609cf47c88674e7c5f743a22c | WAF_Kind: firewall | CF_Action: drop | Country: US | CF_IPClass: unknown | Protocol: HTTP/1.1 | Method: GET | Host: www.wevg.org | User-Agent: Mozilla/5.0 (compatible; SemrushBot/6~bl; +http://www.semrush.com/bot.html) | CF_DC: IAD. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2020-09-04 07:00:25
95.154.30.238 attackspam
Sep  3 18:47:40 mellenthin postfix/smtpd[19910]: NOQUEUE: reject: RCPT from 5F9A1EEE.rev.sefiber.dk[95.154.30.238]: 554 5.7.1 Service unavailable; Client host [95.154.30.238] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/95.154.30.238; from= to= proto=ESMTP helo=<5F9A1EEE.rev.sefiber.dk>
2020-09-04 07:32:57
222.186.180.17 attackspambots
Sep  4 00:55:21 vserver sshd\[2287\]: Failed password for root from 222.186.180.17 port 50746 ssh2Sep  4 00:55:24 vserver sshd\[2287\]: Failed password for root from 222.186.180.17 port 50746 ssh2Sep  4 00:55:28 vserver sshd\[2287\]: Failed password for root from 222.186.180.17 port 50746 ssh2Sep  4 00:55:31 vserver sshd\[2287\]: Failed password for root from 222.186.180.17 port 50746 ssh2
...
2020-09-04 06:57:13
201.211.207.71 attack
Brute forcing RDP port 3389
2020-09-04 07:04:29

最近上报的IP列表

47.243.69.126 8.212.74.149 47.129.241.187 110.90.206.61
183.7.147.251 104.17.79.153 116.233.82.171 212.83.131.64
192.169.24.226 14.212.111.25 101.228.247.1 82.198.246.97
41.47.238.134 134.199.146.176 176.242.35.253 194.187.177.52
194.187.177.239 180.3.204.223 20.7.40.126 86.54.42.197