必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       2606:4700:: - 2606:4700:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF
CIDR:           2606:4700::/32
NetName:        CLOUDFLARENET
NetHandle:      NET6-2606-4700-1
Parent:         NET6-2600 (NET6-2600-1)
NetType:        Direct Allocation
OriginAS:       
Organization:   Cloudflare, Inc. (CLOUD14)
RegDate:        2011-11-01
Updated:        2024-09-04
Comment:        All Cloudflare abuse reporting can be done via https://www.cloudflare.com/abuse
Comment:        Geofeed: https://api.cloudflare.com/local-ip-ranges.csv
Ref:            https://rdap.arin.net/registry/ip/2606:4700::



OrgName:        Cloudflare, Inc.
OrgId:          CLOUD14
Address:        101 Townsend Street
City:           San Francisco
StateProv:      CA
PostalCode:     94107
Country:        US
RegDate:        2010-07-09
Updated:        2024-11-25
Ref:            https://rdap.arin.net/registry/entity/CLOUD14


OrgRoutingHandle: CLOUD146-ARIN
OrgRoutingName:   Cloudflare-NOC
OrgRoutingPhone:  +1-650-319-8930 
OrgRoutingEmail:  noc@cloudflare.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/CLOUD146-ARIN

OrgAbuseHandle: ABUSE2916-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-650-319-8930 
OrgAbuseEmail:  abuse@cloudflare.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE2916-ARIN

OrgTechHandle: ADMIN2521-ARIN
OrgTechName:   Admin
OrgTechPhone:  +1-650-319-8930 
OrgTechEmail:  rir@cloudflare.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ADMIN2521-ARIN

OrgNOCHandle: CLOUD146-ARIN
OrgNOCName:   Cloudflare-NOC
OrgNOCPhone:  +1-650-319-8930 
OrgNOCEmail:  noc@cloudflare.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/CLOUD146-ARIN

RAbuseHandle: ABUSE2916-ARIN
RAbuseName:   Abuse
RAbusePhone:  +1-650-319-8930 
RAbuseEmail:  abuse@cloudflare.com
RAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE2916-ARIN

RTechHandle: ADMIN2521-ARIN
RTechName:   Admin
RTechPhone:  +1-650-319-8930 
RTechEmail:  rir@cloudflare.com
RTechRef:    https://rdap.arin.net/registry/entity/ADMIN2521-ARIN

RNOCHandle: NOC11962-ARIN
RNOCName:   NOC
RNOCPhone:  +1-650-319-8930 
RNOCEmail:  noc@cloudflare.com
RNOCRef:    https://rdap.arin.net/registry/entity/NOC11962-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2606:4700:10::6814:8920
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 15809
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2606:4700:10::6814:8920.	IN	A

;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Thu Mar 26 15:17:34 CST 2026
;; MSG SIZE  rcvd: 52

'
HOST信息:
Host 0.2.9.8.4.1.8.6.0.0.0.0.0.0.0.0.0.0.0.0.0.1.0.0.0.0.7.4.6.0.6.2.ip6.arpa not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 0.2.9.8.4.1.8.6.0.0.0.0.0.0.0.0.0.0.0.0.0.1.0.0.0.0.7.4.6.0.6.2.ip6.arpa: NXDOMAIN
最新评论:
IP 类型 评论内容 时间
164.132.44.25 attack
Sep 17 05:16:00 friendsofhawaii sshd\[27166\]: Invalid user user from 164.132.44.25
Sep 17 05:16:00 friendsofhawaii sshd\[27166\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=25.ip-164-132-44.eu
Sep 17 05:16:03 friendsofhawaii sshd\[27166\]: Failed password for invalid user user from 164.132.44.25 port 32852 ssh2
Sep 17 05:20:37 friendsofhawaii sshd\[27563\]: Invalid user user from 164.132.44.25
Sep 17 05:20:37 friendsofhawaii sshd\[27563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=25.ip-164-132-44.eu
2019-09-17 23:21:05
114.242.245.251 attack
2019-09-17T14:47:37.418843abusebot-4.cloudsearch.cf sshd\[25663\]: Invalid user chandru from 114.242.245.251 port 54304
2019-09-17 22:53:10
158.69.217.87 attack
Automated report - ssh fail2ban:
Sep 17 15:34:47 authentication failure 
Sep 17 15:34:49 wrong password, user=common, port=60750, ssh2
Sep 17 15:34:53 wrong password, user=common, port=60750, ssh2
Sep 17 15:34:56 wrong password, user=common, port=60750, ssh2
2019-09-17 22:49:30
1.175.166.116 attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/1.175.166.116/ 
 TW - 1H : (134)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 1.175.166.116 
 
 CIDR : 1.175.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 WYKRYTE ATAKI Z ASN3462 :  
  1H - 8 
  3H - 15 
  6H - 26 
 12H - 61 
 24H - 119 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery
2019-09-17 22:57:00
185.164.63.234 attack
Sep 17 12:15:26 vtv3 sshd\[14867\]: Invalid user hdd from 185.164.63.234 port 56140
Sep 17 12:15:26 vtv3 sshd\[14867\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.164.63.234
Sep 17 12:15:28 vtv3 sshd\[14867\]: Failed password for invalid user hdd from 185.164.63.234 port 56140 ssh2
Sep 17 12:24:47 vtv3 sshd\[19031\]: Invalid user mailtest from 185.164.63.234 port 53682
Sep 17 12:24:47 vtv3 sshd\[19031\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.164.63.234
Sep 17 12:36:18 vtv3 sshd\[25222\]: Invalid user kozai from 185.164.63.234 port 52294
Sep 17 12:36:18 vtv3 sshd\[25222\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.164.63.234
Sep 17 12:36:20 vtv3 sshd\[25222\]: Failed password for invalid user kozai from 185.164.63.234 port 52294 ssh2
Sep 17 12:40:20 vtv3 sshd\[27451\]: Invalid user maverick from 185.164.63.234 port 42378
Sep 17 12:40:20 vtv3 sshd\[274
2019-09-17 23:57:43
46.219.112.33 attackspam
proto=tcp  .  spt=49199  .  dpt=25  .     (listed on  dnsbl-sorbs abuseat-org barracuda)     (656)
2019-09-17 23:45:18
35.201.243.170 attack
Sep 17 16:29:43 server sshd\[24378\]: Invalid user tomcat from 35.201.243.170 port 1368
Sep 17 16:29:43 server sshd\[24378\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.201.243.170
Sep 17 16:29:45 server sshd\[24378\]: Failed password for invalid user tomcat from 35.201.243.170 port 1368 ssh2
Sep 17 16:33:33 server sshd\[30878\]: Invalid user xbian from 35.201.243.170 port 20992
Sep 17 16:33:33 server sshd\[30878\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.201.243.170
2019-09-18 00:06:00
129.150.172.40 attackspambots
Too many connections or unauthorized access detected from Arctic banned ip
2019-09-17 23:12:37
91.121.205.83 attack
Sep 17 16:35:13 OPSO sshd\[20285\]: Invalid user microsoft from 91.121.205.83 port 48054
Sep 17 16:35:13 OPSO sshd\[20285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.205.83
Sep 17 16:35:14 OPSO sshd\[20285\]: Failed password for invalid user microsoft from 91.121.205.83 port 48054 ssh2
Sep 17 16:42:56 OPSO sshd\[21671\]: Invalid user alin from 91.121.205.83 port 33400
Sep 17 16:42:56 OPSO sshd\[21671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.205.83
2019-09-17 22:58:54
216.218.206.107 attackbots
3389BruteforceFW21
2019-09-17 22:31:12
190.113.224.131 attack
Unauthorised access (Sep 17) SRC=190.113.224.131 LEN=40 TOS=0x10 PREC=0x40 TTL=46 ID=40628 TCP DPT=8080 WINDOW=37755 SYN
2019-09-18 00:03:53
116.21.175.240 attackspam
Sep 17 17:09:43 mxgate1 postfix/postscreen[20426]: CONNECT from [116.21.175.240]:43322 to [176.31.12.44]:25
Sep 17 17:09:43 mxgate1 postfix/dnsblog[20427]: addr 116.21.175.240 listed by domain cbl.abuseat.org as 127.0.0.2
Sep 17 17:09:43 mxgate1 postfix/dnsblog[20430]: addr 116.21.175.240 listed by domain zen.spamhaus.org as 127.0.0.11
Sep 17 17:09:43 mxgate1 postfix/dnsblog[20430]: addr 116.21.175.240 listed by domain zen.spamhaus.org as 127.0.0.4
Sep 17 17:09:43 mxgate1 postfix/dnsblog[20428]: addr 116.21.175.240 listed by domain bl.spamcop.net as 127.0.0.2
Sep 17 17:09:49 mxgate1 postfix/postscreen[20426]: DNSBL rank 4 for [116.21.175.240]:43322
Sep x@x
Sep 17 17:09:50 mxgate1 postfix/postscreen[20426]: DISCONNECT [116.21.175.240]:43322


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=116.21.175.240
2019-09-17 23:25:48
106.75.216.98 attackspam
Sep 17 16:44:25 eventyay sshd[24627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.216.98
Sep 17 16:44:27 eventyay sshd[24627]: Failed password for invalid user rcmoharana from 106.75.216.98 port 46528 ssh2
Sep 17 16:50:54 eventyay sshd[24688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.216.98
...
2019-09-17 23:02:35
54.37.129.235 attackbots
Sep 17 14:51:30 web8 sshd\[21741\]: Invalid user ae from 54.37.129.235
Sep 17 14:51:30 web8 sshd\[21741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.129.235
Sep 17 14:51:31 web8 sshd\[21741\]: Failed password for invalid user ae from 54.37.129.235 port 46502 ssh2
Sep 17 14:55:24 web8 sshd\[23542\]: Invalid user nishiyama from 54.37.129.235
Sep 17 14:55:24 web8 sshd\[23542\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.129.235
2019-09-17 23:10:50
103.215.82.113 attackspambots
Automatic report - Banned IP Access
2019-09-17 23:44:45

最近上报的IP列表

2606:4700:10::6816:3865 2606:4700:10::6814:5907 2606:4700:10::6816:3079 2606:4700:10::6814:8216
136.80.204.169 171.89.13.67 168.228.149.165 171.89.13.151
10.49.15.134 143.64.231.148 134.35.157.177 2606:4700:10::6814:7517
2606:4700:10::6816:4321 2606:4700:10::6814:7221 2606:4700:10::6814:8114 2606:4700:10::6814:8386
2606:4700:10::6816:1952 2606:4700:10::6816:4289 2606:4700:10::6816:3961 139.116.180.129