必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       33.0.0.0 - 33.255.255.255
CIDR:           33.0.0.0/8
NetName:        DISN-IP-LEGACY
NetHandle:      NET-33-0-0-0-1
Parent:          ()
NetType:        Direct Allocation
OriginAS:       
Organization:   United States Department of Defense (DoD) (USDDD)
RegDate:        1991-01-01
Updated:        2025-09-05
Ref:            https://rdap.arin.net/registry/ip/33.0.0.0



OrgName:        United States Department of Defense (DoD)
OrgId:          USDDD
Address:        3990 E. Broad Street
City:           Columbus
StateProv:      OH
PostalCode:     43218
Country:        US
RegDate:        2007-01-12
Updated:        2025-03-13
Ref:            https://rdap.arin.net/registry/entity/USDDD


OrgAbuseHandle: MIL-HSTMST-ARIN
OrgAbuseName:   Network DoD
OrgAbusePhone:  +1-844-347-2457 
OrgAbuseEmail:  disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgAbuseRef:    https://rdap.arin.net/registry/entity/MIL-HSTMST-ARIN

OrgTechHandle: MIL-HSTMST-ARIN
OrgTechName:   Network DoD
OrgTechPhone:  +1-844-347-2457 
OrgTechEmail:  disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgTechRef:    https://rdap.arin.net/registry/entity/MIL-HSTMST-ARIN

OrgTechHandle: REGIS10-ARIN
OrgTechName:   Registration
OrgTechPhone:  +1-844-347-2457 
OrgTechEmail:  disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgTechRef:    https://rdap.arin.net/registry/entity/REGIS10-ARIN

OrgNOCHandle: MIL-HSTMST-ARIN
OrgNOCName:   Network DoD
OrgNOCPhone:  +1-844-347-2457 
OrgNOCEmail:  disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgNOCRef:    https://rdap.arin.net/registry/entity/MIL-HSTMST-ARIN

# end


# start

NetRange:       33.0.0.0 - 33.255.255.255
CIDR:           33.0.0.0/8
NetName:        DISN-IP-LEGACY
NetHandle:      NET-33-0-0-0-2
Parent:         DISN-IP-LEGACY (NET-33-0-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   DoD Network Information Center (DNIC)
RegDate:        2025-09-05
Updated:        2025-09-05
Ref:            https://rdap.arin.net/registry/ip/33.0.0.0



OrgName:        DoD Network Information Center
OrgId:          DNIC
Address:        3990 E. Broad Street
City:           Columbus
StateProv:      OH
PostalCode:     43218
Country:        US
RegDate:        
Updated:        2025-03-13
Ref:            https://rdap.arin.net/registry/entity/DNIC


OrgAbuseHandle: REGIS10-ARIN
OrgAbuseName:   Registration
OrgAbusePhone:  +1-844-347-2457 
OrgAbuseEmail:  disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgAbuseRef:    https://rdap.arin.net/registry/entity/REGIS10-ARIN

OrgTechHandle: MIL-HSTMST-ARIN
OrgTechName:   Network DoD
OrgTechPhone:  +1-844-347-2457 
OrgTechEmail:  disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgTechRef:    https://rdap.arin.net/registry/entity/MIL-HSTMST-ARIN

OrgTechHandle: REGIS10-ARIN
OrgTechName:   Registration
OrgTechPhone:  +1-844-347-2457 
OrgTechEmail:  disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgTechRef:    https://rdap.arin.net/registry/entity/REGIS10-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 33.93.15.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6455
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;33.93.15.248.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041200 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 13 00:53:38 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
b'Host 248.15.93.33.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 33.93.15.248.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
187.57.246.177 attack
2020-07-25T14:23:08.779740afi-git.jinr.ru sshd[14727]: Invalid user zxb from 187.57.246.177 port 56798
2020-07-25T14:23:08.782938afi-git.jinr.ru sshd[14727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.57.246.177
2020-07-25T14:23:08.779740afi-git.jinr.ru sshd[14727]: Invalid user zxb from 187.57.246.177 port 56798
2020-07-25T14:23:11.028556afi-git.jinr.ru sshd[14727]: Failed password for invalid user zxb from 187.57.246.177 port 56798 ssh2
2020-07-25T14:27:06.216522afi-git.jinr.ru sshd[15877]: Invalid user wangdi from 187.57.246.177 port 40930
...
2020-07-25 19:54:18
209.85.166.194 attackspambots
B2B list seller spam from jennifer@onedatasonline.com
2020-07-25 19:33:03
150.109.230.219 attack
Unauthorized connection attempt detected from IP address 150.109.230.219 to port 8129
2020-07-25 20:09:28
156.209.4.148 attack
Unauthorized connection attempt detected from IP address 156.209.4.148 to port 23
2020-07-25 20:08:57
46.253.95.33 attackspambots
07/24/2020-23:46:43.746372 46.253.95.33 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-07-25 20:04:38
49.234.205.32 attackspambots
Invalid user radio from 49.234.205.32 port 48962
2020-07-25 19:39:55
108.60.41.104 attack
SSH/22 MH Probe, BF, Hack -
2020-07-25 19:51:04
213.123.74.120 attackspam
2020-07-25T11:07:25.265409abusebot-4.cloudsearch.cf sshd[27302]: Invalid user aee from 213.123.74.120 port 49736
2020-07-25T11:07:25.271150abusebot-4.cloudsearch.cf sshd[27302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.123.74.120
2020-07-25T11:07:25.265409abusebot-4.cloudsearch.cf sshd[27302]: Invalid user aee from 213.123.74.120 port 49736
2020-07-25T11:07:27.726090abusebot-4.cloudsearch.cf sshd[27302]: Failed password for invalid user aee from 213.123.74.120 port 49736 ssh2
2020-07-25T11:16:23.562440abusebot-4.cloudsearch.cf sshd[27430]: Invalid user extension from 213.123.74.120 port 42444
2020-07-25T11:16:23.569049abusebot-4.cloudsearch.cf sshd[27430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.123.74.120
2020-07-25T11:16:23.562440abusebot-4.cloudsearch.cf sshd[27430]: Invalid user extension from 213.123.74.120 port 42444
2020-07-25T11:16:25.548713abusebot-4.cloudsearch.cf sshd[27430
...
2020-07-25 19:51:27
222.186.169.194 attackspambots
Jul 25 13:47:25 vmd17057 sshd[27707]: Failed password for root from 222.186.169.194 port 14126 ssh2
Jul 25 13:47:30 vmd17057 sshd[27707]: Failed password for root from 222.186.169.194 port 14126 ssh2
...
2020-07-25 19:51:56
104.248.246.4 attackspambots
Invalid user waf from 104.248.246.4 port 60346
2020-07-25 19:36:16
45.115.62.131 attack
Jul 25 13:39:45 prod4 sshd\[23984\]: Invalid user zihang from 45.115.62.131
Jul 25 13:39:46 prod4 sshd\[23984\]: Failed password for invalid user zihang from 45.115.62.131 port 58830 ssh2
Jul 25 13:41:39 prod4 sshd\[25505\]: Invalid user sysadm from 45.115.62.131
...
2020-07-25 19:48:50
109.186.58.179 attackbots
Automatic report - Port Scan Attack
2020-07-25 19:54:34
196.52.43.118 attack
Unauthorized connection attempt detected from IP address 196.52.43.118 to port 5800
2020-07-25 20:06:43
192.241.210.45 attackbots
UDP port : 5632
2020-07-25 19:33:17
108.70.116.153 attack
prod6
...
2020-07-25 20:01:57

最近上报的IP列表

251.240.66.246 23.44.178.220 121.134.176.117 2606:4700:10::6814:7034
182.204.147.77 159.154.160.212 2606:4700:10::6814:6822 2606:4700:10::6816:515
193.176.211.239 193.176.211.230 193.176.211.207 193.176.211.219
193.176.211.202 193.176.211.206 193.176.211.223 193.176.211.59
193.176.211.228 193.176.211.150 193.176.211.216 193.176.211.222