必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): San Jose

省份(region): California

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       38.0.0.0 - 38.255.255.255
CIDR:           38.0.0.0/8
NetName:        COGENT-A
NetHandle:      NET-38-0-0-0-1
Parent:          ()
NetType:        Direct Allocation
OriginAS:       
Organization:   Cogent Communications, LLC (COGC)
RegDate:        1991-04-16
Updated:        2025-09-23
Ref:            https://rdap.arin.net/registry/ip/38.0.0.0



OrgName:        Cogent Communications, LLC
OrgId:          COGC
Address:        2450 N Street NW
City:           Washington
StateProv:      DC
PostalCode:     20037
Country:        US
RegDate:        2000-05-30
Updated:        2025-09-23
Comment:        Geofeed https://geofeed.cogentco.com/geofeed.csv
Ref:            https://rdap.arin.net/registry/entity/COGC

ReferralServer:  rwhois://rwhois.cogentco.com:4321

OrgTechHandle: IPALL-ARIN
OrgTechName:   IP Allocation
OrgTechPhone:  +1-877-875-4311 
OrgTechEmail:  ipalloc@cogentco.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPALL-ARIN

OrgAbuseHandle: COGEN-ARIN
OrgAbuseName:   Cogent Abuse
OrgAbusePhone:  +1-877-875-4311 
OrgAbuseEmail:  abuse@cogentco.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/COGEN-ARIN

OrgNOCHandle: ZC108-ARIN
OrgNOCName:   Cogent Communications
OrgNOCPhone:  +1-877-875-4311 
OrgNOCEmail:  noc@cogentco.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/ZC108-ARIN

# end


# start

NetRange:       38.54.0.0 - 38.54.127.255
CIDR:           38.54.0.0/17
NetName:        KAOPU-CGNT-NET-1
NetHandle:      NET-38-54-0-0-1
Parent:         COGENT-A (NET-38-0-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   Kaopu Cloud HK Limited (KCHL-3)
RegDate:        2022-05-04
Updated:        2022-05-04
Ref:            https://rdap.arin.net/registry/ip/38.54.0.0


OrgName:        Kaopu Cloud HK Limited
OrgId:          KCHL-3
Address:        LEVEL 54 HOPEWELL CENTRE 183 QUEEN'S ROAD EAST HK
City:           HK
StateProv:      
PostalCode:     
Country:        HK
RegDate:        2022-04-13
Updated:        2023-11-21
Comment:        Geofeed https://www.kaopucloud.com/geofeed.csv
Ref:            https://rdap.arin.net/registry/entity/KCHL-3


OrgTechHandle: MANAG489-ARIN
OrgTechName:   Manager
OrgTechPhone:  +852 94159695 
OrgTechEmail:  whois@kaopucloud.com
OrgTechRef:    https://rdap.arin.net/registry/entity/MANAG489-ARIN

OrgAbuseHandle: MANAG489-ARIN
OrgAbuseName:   Manager
OrgAbusePhone:  +852 94159695 
OrgAbuseEmail:  whois@kaopucloud.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/MANAG489-ARIN

# end


# start

NetRange:       38.54.110.0 - 38.54.110.255
CIDR:           38.54.110.0/24
NetName:        LIGHTNODE-US
NetHandle:      NET-38-54-110-0-1
Parent:         KAOPU-CGNT-NET-1 (NET-38-54-0-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       LightNode-US (C08900035)
RegDate:        2022-09-21
Updated:        2022-09-21
Ref:            https://rdap.arin.net/registry/ip/38.54.110.0


CustName:       LightNode-US
Address:        US,Washington
City:           Washington
StateProv:      DC
PostalCode:     20237
Country:        US
RegDate:        2022-09-21
Updated:        2022-09-21
Ref:            https://rdap.arin.net/registry/entity/C08900035

OrgTechHandle: MANAG489-ARIN
OrgTechName:   Manager
OrgTechPhone:  +852 94159695 
OrgTechEmail:  whois@kaopucloud.com
OrgTechRef:    https://rdap.arin.net/registry/entity/MANAG489-ARIN

OrgAbuseHandle: MANAG489-ARIN
OrgAbuseName:   Manager
OrgAbusePhone:  +852 94159695 
OrgAbuseEmail:  whois@kaopucloud.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/MANAG489-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.cogentco.com:4321.

%rwhois V-1.5:0010b0:00 rwhois.cogentco.com (CGNT rwhoisd 1.2.2)
network:ID:NET4-2636000011
network:Network-Name:NET4-2636000011
network:IP-Network:38.54.0.0/17
network:Org-Name:KAOPU CLOUD HK LIMITED
network:Street-Address:11 GREAT OAKS BLVD
network:City:SAN JOSE
network:State:CA
network:Country:US
network:Postal-Code:95119
network:Tech-Contact:ZC108-ARIN
network:Updated:2025-05-06 14:14:32
%ok
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 38.54.110.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43322
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;38.54.110.57.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026051901 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 20 10:48:19 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
Host 57.110.54.38.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 38.54.110.57.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.150.190.103 attack
Port 60001 (Mirai botnet) access denied
2020-02-24 00:51:58
129.226.161.114 attackspam
Total attacks: 2
2020-02-24 00:41:40
103.207.39.183 attackspam
lfd: (smtpauth) Failed SMTP AUTH login from 103.207.39.183 (-): 5 in the last 3600 secs - Thu Jun 21 13:02:08 2018
2020-02-24 00:24:45
141.98.80.139 attack
Feb 23 17:42:00 relay postfix/smtpd\[13659\]: warning: unknown\[141.98.80.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb 23 17:42:07 relay postfix/smtpd\[8265\]: warning: unknown\[141.98.80.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb 23 17:42:26 relay postfix/smtpd\[8265\]: warning: unknown\[141.98.80.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb 23 17:42:33 relay postfix/smtpd\[17848\]: warning: unknown\[141.98.80.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb 23 17:44:10 relay postfix/smtpd\[17848\]: warning: unknown\[141.98.80.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-02-24 00:55:35
92.12.138.190 attackspambots
Honeypot attack, port: 81, PTR: host-92-12-138-190.as43234.net.
2020-02-24 00:26:58
188.36.125.210 attackbots
Feb 23 16:24:25 v22018076622670303 sshd\[2391\]: Invalid user aman from 188.36.125.210 port 41332
Feb 23 16:24:25 v22018076622670303 sshd\[2391\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.36.125.210
Feb 23 16:24:28 v22018076622670303 sshd\[2391\]: Failed password for invalid user aman from 188.36.125.210 port 41332 ssh2
...
2020-02-24 00:40:54
89.235.82.47 attack
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-24 00:45:16
163.172.158.205 attack
Feb 23 16:32:24 MK-Soft-VM3 sshd[22938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.158.205 
Feb 23 16:32:26 MK-Soft-VM3 sshd[22938]: Failed password for invalid user murali from 163.172.158.205 port 58048 ssh2
...
2020-02-24 00:47:17
177.23.108.85 attackspambots
DATE:2020-02-23 14:27:05, IP:177.23.108.85, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-02-24 00:33:31
41.39.97.100 attackspam
Honeypot attack, port: 445, PTR: host-41.39.97.100.tedata.net.
2020-02-24 00:47:50
103.120.224.222 attackspam
2020-02-23T13:26:47.877261randservbullet-proofcloud-66.localdomain sshd[27449]: Invalid user sammy from 103.120.224.222 port 54416
2020-02-23T13:26:47.886206randservbullet-proofcloud-66.localdomain sshd[27449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.120.224.222
2020-02-23T13:26:47.877261randservbullet-proofcloud-66.localdomain sshd[27449]: Invalid user sammy from 103.120.224.222 port 54416
2020-02-23T13:26:50.039984randservbullet-proofcloud-66.localdomain sshd[27449]: Failed password for invalid user sammy from 103.120.224.222 port 54416 ssh2
...
2020-02-24 00:49:09
219.146.118.238 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-24 00:21:54
83.252.11.112 attackspam
Honeypot attack, port: 5555, PTR: c83-252-11-112.bredband.comhem.se.
2020-02-24 00:14:27
180.254.248.75 attackbots
1582464434 - 02/23/2020 14:27:14 Host: 180.254.248.75/180.254.248.75 Port: 445 TCP Blocked
2020-02-24 00:19:46
66.70.189.236 attackbotsspam
Feb 23 14:57:29 legacy sshd[12543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.189.236
Feb 23 14:57:31 legacy sshd[12543]: Failed password for invalid user epiconf from 66.70.189.236 port 33898 ssh2
Feb 23 15:00:22 legacy sshd[12583]: Failed password for root from 66.70.189.236 port 34412 ssh2
...
2020-02-24 00:29:39

最近上报的IP列表

43.134.100.210 192.175.111.237 110.77.187.108 192.204.22.241
66.132.172.36 57.141.2.57 218.245.1.252 129.226.94.18
2606:4700:10::6816:1067 2a01:598:8190:972b:1:1:9621:a023 216.180.246.19 64.118.142.118
213.209.159.246 2606:4700:10::6814:6419 216.167.75.5 154.3.81.251
221.235.68.92 51.79.193.40 2606:4700:10::ac43:1064 2606:4700:10::6814:7276