必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       2606:4700:: - 2606:4700:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF
CIDR:           2606:4700::/32
NetName:        CLOUDFLARENET
NetHandle:      NET6-2606-4700-1
Parent:         NET6-2600 (NET6-2600-1)
NetType:        Direct Allocation
OriginAS:       
Organization:   Cloudflare, Inc. (CLOUD14)
RegDate:        2011-11-01
Updated:        2024-09-04
Comment:        All Cloudflare abuse reporting can be done via https://www.cloudflare.com/abuse
Comment:        Geofeed: https://api.cloudflare.com/local-ip-ranges.csv
Ref:            https://rdap.arin.net/registry/ip/2606:4700::



OrgName:        Cloudflare, Inc.
OrgId:          CLOUD14
Address:        101 Townsend Street
City:           San Francisco
StateProv:      CA
PostalCode:     94107
Country:        US
RegDate:        2010-07-09
Updated:        2024-11-25
Ref:            https://rdap.arin.net/registry/entity/CLOUD14


OrgAbuseHandle: ABUSE2916-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-650-319-8930 
OrgAbuseEmail:  abuse@cloudflare.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE2916-ARIN

OrgRoutingHandle: CLOUD146-ARIN
OrgRoutingName:   Cloudflare-NOC
OrgRoutingPhone:  +1-650-319-8930 
OrgRoutingEmail:  noc@cloudflare.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/CLOUD146-ARIN

OrgNOCHandle: CLOUD146-ARIN
OrgNOCName:   Cloudflare-NOC
OrgNOCPhone:  +1-650-319-8930 
OrgNOCEmail:  noc@cloudflare.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/CLOUD146-ARIN

OrgTechHandle: ADMIN2521-ARIN
OrgTechName:   Admin
OrgTechPhone:  +1-650-319-8930 
OrgTechEmail:  rir@cloudflare.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ADMIN2521-ARIN

RTechHandle: ADMIN2521-ARIN
RTechName:   Admin
RTechPhone:  +1-650-319-8930 
RTechEmail:  rir@cloudflare.com
RTechRef:    https://rdap.arin.net/registry/entity/ADMIN2521-ARIN

RAbuseHandle: ABUSE2916-ARIN
RAbuseName:   Abuse
RAbusePhone:  +1-650-319-8930 
RAbuseEmail:  abuse@cloudflare.com
RAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE2916-ARIN

RNOCHandle: NOC11962-ARIN
RNOCName:   NOC
RNOCPhone:  +1-650-319-8930 
RNOCEmail:  noc@cloudflare.com
RNOCRef:    https://rdap.arin.net/registry/entity/NOC11962-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2606:4700:10::6814:8986
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 16294
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2606:4700:10::6814:8986.	IN	A

;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Fri Apr 17 13:11:29 CST 2026
;; MSG SIZE  rcvd: 52

'
HOST信息:
Host 6.8.9.8.4.1.8.6.0.0.0.0.0.0.0.0.0.0.0.0.0.1.0.0.0.0.7.4.6.0.6.2.ip6.arpa not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 6.8.9.8.4.1.8.6.0.0.0.0.0.0.0.0.0.0.0.0.0.1.0.0.0.0.7.4.6.0.6.2.ip6.arpa: NXDOMAIN
最新评论:
IP 类型 评论内容 时间
113.190.90.202 attackbots
$f2bV_matches
2020-02-27 13:25:26
210.12.130.219 attackspam
Feb 27 04:52:45 hcbbdb sshd\[16371\]: Invalid user juan from 210.12.130.219
Feb 27 04:52:45 hcbbdb sshd\[16371\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.12.130.219
Feb 27 04:52:47 hcbbdb sshd\[16371\]: Failed password for invalid user juan from 210.12.130.219 port 42927 ssh2
Feb 27 04:59:26 hcbbdb sshd\[17074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.12.130.219  user=root
Feb 27 04:59:27 hcbbdb sshd\[17074\]: Failed password for root from 210.12.130.219 port 60304 ssh2
2020-02-27 13:05:30
79.33.19.233 attackbots
Email rejected due to spam filtering
2020-02-27 13:41:10
14.177.93.245 attackspam
Email rejected due to spam filtering
2020-02-27 13:27:37
218.92.0.165 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.165  user=root
Failed password for root from 218.92.0.165 port 29641 ssh2
Failed password for root from 218.92.0.165 port 29641 ssh2
Failed password for root from 218.92.0.165 port 29641 ssh2
Failed password for root from 218.92.0.165 port 29641 ssh2
2020-02-27 13:42:09
184.82.30.178 attack
Email rejected due to spam filtering
2020-02-27 13:06:03
112.85.42.186 attack
Feb 27 05:58:56 ns381471 sshd[1465]: Failed password for root from 112.85.42.186 port 44887 ssh2
Feb 27 05:58:58 ns381471 sshd[1465]: Failed password for root from 112.85.42.186 port 44887 ssh2
2020-02-27 13:31:11
103.231.94.225 attackspambots
Email rejected due to spam filtering
2020-02-27 13:04:37
222.186.180.223 attackspambots
Feb 27 05:59:23 server sshd[1959837]: Failed none for root from 222.186.180.223 port 22050 ssh2
Feb 27 05:59:26 server sshd[1959837]: Failed password for root from 222.186.180.223 port 22050 ssh2
Feb 27 05:59:31 server sshd[1959837]: Failed password for root from 222.186.180.223 port 22050 ssh2
2020-02-27 13:09:53
176.63.166.4 attack
2020-02-27T04:58:21.329694shield sshd\[25002\]: Invalid user es from 176.63.166.4 port 43018
2020-02-27T04:58:21.334584shield sshd\[25002\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=catv-176-63-166-4.catv.broadband.hu
2020-02-27T04:58:23.080606shield sshd\[25002\]: Failed password for invalid user es from 176.63.166.4 port 43018 ssh2
2020-02-27T04:58:40.594744shield sshd\[25047\]: Invalid user xutao from 176.63.166.4 port 44674
2020-02-27T04:58:40.601503shield sshd\[25047\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=catv-176-63-166-4.catv.broadband.hu
2020-02-27 13:45:17
222.186.175.140 attack
Feb 27 06:12:18 domagoj sshd\[11067\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.140  user=root
Feb 27 06:12:20 domagoj sshd\[11067\]: Failed password for root from 222.186.175.140 port 27882 ssh2
Feb 27 06:12:37 domagoj sshd\[11069\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.140  user=root
Feb 27 06:12:39 domagoj sshd\[11069\]: Failed password for root from 222.186.175.140 port 44566 ssh2
2020-02-27 13:12:49
86.100.174.101 attack
Port probing on unauthorized port 993
2020-02-27 13:24:07
106.59.246.27 attackspam
[portscan] Port scan
2020-02-27 13:24:37
187.39.213.167 attackspambots
Automatic report - Port Scan Attack
2020-02-27 13:25:45
183.82.3.248 attackspam
Feb 27 06:34:02 haigwepa sshd[9741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.3.248 
Feb 27 06:34:04 haigwepa sshd[9741]: Failed password for invalid user csgoserver from 183.82.3.248 port 40424 ssh2
...
2020-02-27 13:39:18

最近上报的IP列表

2606:4700:10::6814:4721 2606:4700:10::6814:8297 2606:4700:10::6816:2612 2606:4700:10::6816:3393
110.77.226.6 2606:4700:10::6814:9100 83.89.180.168 109.162.246.133
2606:4700:10::ac43:1876 2606:4700:10::6814:5083 2606:4700:10::6816:2288 2606:4700:10::6816:2440
2606:4700:10::6814:8471 216.81.245.108 128.121.58.66 139.60.162.211
202.58.242.242 2606:4700:10::6814:8153 2606:4700:10::6816:2904 8.217.251.77