必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): San Jose

省份(region): California

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       23.81.48.0 - 23.83.63.255
CIDR:           23.81.48.0/20, 23.83.0.0/18, 23.81.64.0/18, 23.81.128.0/17, 23.82.0.0/16
NetName:        LU
NetHandle:      NET-23-81-48-0-2
Parent:         NET23 (NET-23-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Leaseweb USA, Inc. (LU)
RegDate:        2013-05-06
Updated:        2022-06-27
Ref:            https://rdap.arin.net/registry/ip/23.81.48.0


OrgName:        Leaseweb USA, Inc.
OrgId:          LU
Address:        9480 Innovation Dr
City:           Manassas
StateProv:      VA
PostalCode:     20109
Country:        US
RegDate:        2010-09-13
Updated:        2024-11-25
Comment:        www.leaseweb.com
Ref:            https://rdap.arin.net/registry/entity/LU


OrgTechHandle: LEASE-ARIN
OrgTechName:   Leaseweb ARIN
OrgTechPhone:  +1-571-814-3777 
OrgTechEmail:  abuse@us.leaseweb.com
OrgTechRef:    https://rdap.arin.net/registry/entity/LEASE-ARIN

OrgNOCHandle: LEASE-ARIN
OrgNOCName:   Leaseweb ARIN
OrgNOCPhone:  +1-571-814-3777 
OrgNOCEmail:  abuse@us.leaseweb.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/LEASE-ARIN

OrgAbuseHandle: LUAD3-ARIN
OrgAbuseName:   Leaseweb US abuse dept
OrgAbusePhone:  +1-571-814-3777 
OrgAbuseEmail:  abuse@us.leaseweb.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/LUAD3-ARIN

# end


# start

NetRange:       23.82.16.0 - 23.82.23.255
CIDR:           23.82.16.0/21
NetName:        23-82-16-0
NetHandle:      NET-23-82-16-0-1
Parent:         LU (NET-23-81-48-0-2)
NetType:        Reallocated
OriginAS:       
Organization:   Leaseweb USA, Inc. (LU-76)
RegDate:        2022-03-27
Updated:        2022-06-27
Ref:            https://rdap.arin.net/registry/ip/23.82.16.0


OrgName:        Leaseweb USA, Inc.
OrgId:          LU-76
Address:        1735 Lundy Ave
City:           San Jose
StateProv:      CA
PostalCode:     95131
Country:        US
RegDate:        2015-07-30
Updated:        2016-03-15
Ref:            https://rdap.arin.net/registry/entity/LU-76


OrgAbuseHandle: LUAD3-ARIN
OrgAbuseName:   Leaseweb US abuse dept
OrgAbusePhone:  +1-571-814-3777 
OrgAbuseEmail:  abuse@us.leaseweb.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/LUAD3-ARIN

OrgTechHandle: LEASE-ARIN
OrgTechName:   Leaseweb ARIN
OrgTechPhone:  +1-571-814-3777 
OrgTechEmail:  abuse@us.leaseweb.com
OrgTechRef:    https://rdap.arin.net/registry/entity/LEASE-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 23.82.16.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37010
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;23.82.16.53.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025120200 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 03 01:01:45 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
Host 53.16.82.23.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.16.82.23.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
115.84.92.32 attackbots
Dovecot Invalid User Login Attempt.
2020-05-08 16:01:46
195.54.167.9 attackspambots
May  8 09:34:08 debian-2gb-nbg1-2 kernel: \[11182130.511495\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=195.54.167.9 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=10517 PROTO=TCP SPT=55840 DPT=42303 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-08 15:55:19
139.216.102.151 attackspambots
Port probing on unauthorized port 81
2020-05-08 16:02:26
51.254.32.102 attack
May  8 06:49:44 piServer sshd[23485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.32.102 
May  8 06:49:46 piServer sshd[23485]: Failed password for invalid user roma from 51.254.32.102 port 41162 ssh2
May  8 06:59:22 piServer sshd[24406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.32.102 
...
2020-05-08 15:32:14
196.52.43.62 attackbotsspam
Honeypot attack, port: 139, PTR: 196.52.43.62.netsystemsresearch.com.
2020-05-08 15:39:59
189.38.192.204 attackbotsspam
Lines containing failures of 189.38.192.204
May  8 00:55:29 kmh-vmh-001-fsn05 sshd[20033]: Invalid user rego from 189.38.192.204 port 54258
May  8 00:55:29 kmh-vmh-001-fsn05 sshd[20033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.38.192.204 
May  8 00:55:32 kmh-vmh-001-fsn05 sshd[20033]: Failed password for invalid user rego from 189.38.192.204 port 54258 ssh2
May  8 00:55:32 kmh-vmh-001-fsn05 sshd[20033]: Received disconnect from 189.38.192.204 port 54258:11: Bye Bye [preauth]
May  8 00:55:32 kmh-vmh-001-fsn05 sshd[20033]: Disconnected from invalid user rego 189.38.192.204 port 54258 [preauth]
May  8 01:07:45 kmh-vmh-001-fsn05 sshd[22141]: Invalid user admin from 189.38.192.204 port 58930
May  8 01:07:45 kmh-vmh-001-fsn05 sshd[22141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.38.192.204 
May  8 01:07:48 kmh-vmh-001-fsn05 sshd[22141]: Failed password for invalid user admin ........
------------------------------
2020-05-08 16:03:00
122.152.210.200 attack
May  7 23:54:28 mail sshd\[28484\]: Invalid user fa from 122.152.210.200
May  7 23:54:28 mail sshd\[28484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.210.200
...
2020-05-08 15:39:30
1.179.137.10 attack
May  8 09:44:54 eventyay sshd[14391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.137.10
May  8 09:44:56 eventyay sshd[14391]: Failed password for invalid user rex from 1.179.137.10 port 33643 ssh2
May  8 09:49:44 eventyay sshd[14458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.137.10
...
2020-05-08 15:50:02
83.24.255.250 attackbots
$f2bV_matches
2020-05-08 15:33:51
157.245.188.231 attackspambots
php WP PHPmyadamin ABUSE blocked for 12h
2020-05-08 15:46:59
87.226.165.143 attackbots
$f2bV_matches
2020-05-08 15:51:38
190.202.109.244 attack
detected by Fail2Ban
2020-05-08 15:39:03
190.52.166.83 attackbotsspam
$f2bV_matches
2020-05-08 15:48:41
61.154.174.54 attackbotsspam
2020-05-08T03:07:55.1697861495-001 sshd[16793]: Failed password for invalid user user11 from 61.154.174.54 port 8005 ssh2
2020-05-08T03:12:50.2059721495-001 sshd[17123]: Invalid user sas from 61.154.174.54 port 41632
2020-05-08T03:12:50.2093271495-001 sshd[17123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.154.174.54
2020-05-08T03:12:50.2059721495-001 sshd[17123]: Invalid user sas from 61.154.174.54 port 41632
2020-05-08T03:12:51.9583631495-001 sshd[17123]: Failed password for invalid user sas from 61.154.174.54 port 41632 ssh2
2020-05-08T03:17:48.8263641495-001 sshd[17354]: Invalid user postgre from 61.154.174.54 port 11370
...
2020-05-08 16:03:27
206.189.136.156 attackspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-05-08 15:46:16

最近上报的IP列表

212.32.255.111 10.18.228.177 164.92.81.101 203.242.123.55
103.242.215.138 40.124.173.171 128.1.44.106 14.205.104.200
97.149.179.88 97.149.179.248 97.149.179.27 98.94.64.78
44.212.70.191 159.75.166.146 35.172.190.251 180.153.236.246
157.245.247.18 128.14.226.191 17.246.19.56 17.246.19.157