必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b'#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       23.180.120.0 - 23.180.120.255
CIDR:           23.180.120.0/24
NetName:        NET-UHQ-202406
NetHandle:      NET-23-180-120-0-1
Parent:         NET23 (NET-23-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   UHQ Services LLC (USL-61)
RegDate:        2024-06-06
Updated:        2025-06-25
Comment:        http://uhq.services
Comment:        Standard NOC hours 
Comment:        7:00 AM to 11:00 PM CEST
Ref:            https://rdap.arin.net/registry/ip/23.180.120.0


OrgName:        UHQ Services LLC
OrgId:          USL-61
Address:        30 N Gould St Ste R
City:           Sheridan
StateProv:      WY
PostalCode:     82801
Country:        US
RegDate:        2024-05-12
Updated:        2024-05-20
Comment:        https://uhq.services
Comment:        Standard NOC hours are 7:00 AM to 11:00 PM CEST
Ref:            https://rdap.arin.net/registry/entity/USL-61


OrgAbuseHandle: MAT79-ARIN
OrgAbuseName:   Maintenance and Administration Team
OrgAbusePhone:  +1-307-763-5123 
OrgAbuseEmail:  noc@uhq.services
OrgAbuseRef:    https://rdap.arin.net/registry/entity/MAT79-ARIN

OrgNOCHandle: MAT79-ARIN
OrgNOCName:   Maintenance and Administration Team
OrgNOCPhone:  +1-307-763-5123 
OrgNOCEmail:  noc@uhq.services
OrgNOCRef:    https://rdap.arin.net/registry/entity/MAT79-ARIN

OrgTechHandle: MAT79-ARIN
OrgTechName:   Maintenance and Administration Team
OrgTechPhone:  +1-307-763-5123 
OrgTechEmail:  noc@uhq.services
OrgTechRef:    https://rdap.arin.net/registry/entity/MAT79-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#'
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 23.180.120.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61679
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;23.180.120.131.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026020202 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 03 12:31:00 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
b'Host 131.120.180.23.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 23.180.120.131.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
202.77.122.67 attack
Trying to (more than 3 packets) bruteforce (not open) Samba/Microsoft-DS port 445
2019-06-30 07:28:36
82.166.93.77 attack
Jun 29 20:56:25 dev sshd\[21416\]: Invalid user test from 82.166.93.77 port 34786
Jun 29 20:56:25 dev sshd\[21416\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.166.93.77
...
2019-06-30 07:58:43
103.48.21.58 attackbots
port 23 attempt blocked
2019-06-30 07:38:09
180.120.198.189 attackspambots
2019-06-29T20:44:33.054469 X postfix/smtpd[29428]: warning: unknown[180.120.198.189]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-29T20:55:33.022958 X postfix/smtpd[29428]: warning: unknown[180.120.198.189]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-29T20:55:41.466363 X postfix/smtpd[29428]: warning: unknown[180.120.198.189]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-30 08:12:25
41.210.252.100 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-29 18:40:54,526 INFO [amun_request_handler] PortScan Detected on Port: 445 (41.210.252.100)
2019-06-30 08:01:12
159.65.153.163 attackspambots
Jun 29 23:37:40 apollo sshd\[32480\]: Invalid user sirsi from 159.65.153.163Jun 29 23:37:42 apollo sshd\[32480\]: Failed password for invalid user sirsi from 159.65.153.163 port 37322 ssh2Jun 29 23:40:41 apollo sshd\[32493\]: Invalid user prod from 159.65.153.163
...
2019-06-30 08:14:48
77.247.110.78 attackbots
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-06-30 08:08:19
203.34.117.5 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-29 18:41:26,204 INFO [amun_request_handler] PortScan Detected on Port: 445 (203.34.117.5)
2019-06-30 07:52:46
95.64.77.154 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-29 18:43:36,418 INFO [amun_request_handler] PortScan Detected on Port: 445 (95.64.77.154)
2019-06-30 07:44:36
190.111.0.227 attackspambots
Trying to (more than 3 packets) bruteforce (not open) Samba/Microsoft-DS port 445
2019-06-30 07:31:07
182.185.134.145 attackbots
Trying to (more than 3 packets) bruteforce (not open) Samba/Microsoft-DS port 445
2019-06-30 07:32:56
103.87.31.205 attackbotsspam
Trying to (more than 3 packets) bruteforce (not open) Samba/Microsoft-DS port 445
2019-06-30 07:37:52
138.197.72.48 attackspam
Jun 29 16:48:20 Ubuntu-1404-trusty-64-minimal sshd\[6791\]: Invalid user ubuntu from 138.197.72.48
Jun 29 16:48:20 Ubuntu-1404-trusty-64-minimal sshd\[6791\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.72.48
Jun 29 16:48:22 Ubuntu-1404-trusty-64-minimal sshd\[6791\]: Failed password for invalid user ubuntu from 138.197.72.48 port 47342 ssh2
Jun 30 02:01:44 Ubuntu-1404-trusty-64-minimal sshd\[20556\]: Invalid user mysql from 138.197.72.48
Jun 30 02:01:44 Ubuntu-1404-trusty-64-minimal sshd\[20556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.72.48
2019-06-30 08:05:20
77.247.108.127 attackbotsspam
Trying to (more than 3 packets) bruteforce (not in use) VoIP/SIP port 5060
2019-06-30 07:39:54
104.140.188.22 attack
TCP port 23 (Telnet) attempt blocked by firewall. [2019-06-29 20:55:05]
2019-06-30 08:07:29

最近上报的IP列表

3.91.58.30 162.216.149.81 52.188.189.7 85.190.102.113
101.108.51.244 40.124.175.155 15.185.64.118 85.217.149.30
94.231.206.153 94.231.206.134 157.1.234.65 153.32.146.53
192.71.2.99 38.98.39.0 47.84.0.253 47.84.116.48
39.191.209.250 111.19.57.126 1.83.125.166 121.40.43.190