必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): San Jose

省份(region): California

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       38.0.0.0 - 38.255.255.255
CIDR:           38.0.0.0/8
NetName:        COGENT-A
NetHandle:      NET-38-0-0-0-1
Parent:          ()
NetType:        Direct Allocation
OriginAS:       
Organization:   Cogent Communications, LLC (COGC)
RegDate:        1991-04-16
Updated:        2025-09-23
Ref:            https://rdap.arin.net/registry/ip/38.0.0.0



OrgName:        Cogent Communications, LLC
OrgId:          COGC
Address:        2450 N Street NW
City:           Washington
StateProv:      DC
PostalCode:     20037
Country:        US
RegDate:        2000-05-30
Updated:        2025-09-23
Comment:        Geofeed https://geofeed.cogentco.com/geofeed.csv
Ref:            https://rdap.arin.net/registry/entity/COGC

ReferralServer:  rwhois://rwhois.cogentco.com:4321

OrgTechHandle: IPALL-ARIN
OrgTechName:   IP Allocation
OrgTechPhone:  +1-877-875-4311 
OrgTechEmail:  ipalloc@cogentco.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPALL-ARIN

OrgAbuseHandle: COGEN-ARIN
OrgAbuseName:   Cogent Abuse
OrgAbusePhone:  +1-877-875-4311 
OrgAbuseEmail:  abuse@cogentco.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/COGEN-ARIN

OrgNOCHandle: ZC108-ARIN
OrgNOCName:   Cogent Communications
OrgNOCPhone:  +1-877-875-4311 
OrgNOCEmail:  noc@cogentco.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/ZC108-ARIN

# end


# start

NetRange:       38.60.128.0 - 38.60.255.255
CIDR:           38.60.128.0/17
NetName:        KAOPU-CGNT-NET-2
NetHandle:      NET-38-60-128-0-1
Parent:         COGENT-A (NET-38-0-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   Kaopu Cloud HK Limited (KCHL-3)
RegDate:        2022-12-08
Updated:        2022-12-08
Ref:            https://rdap.arin.net/registry/ip/38.60.128.0


OrgName:        Kaopu Cloud HK Limited
OrgId:          KCHL-3
Address:        LEVEL 54 HOPEWELL CENTRE 183 QUEEN'S ROAD EAST HK
City:           HK
StateProv:      
PostalCode:     
Country:        HK
RegDate:        2022-04-13
Updated:        2023-11-21
Comment:        Geofeed https://www.kaopucloud.com/geofeed.csv
Ref:            https://rdap.arin.net/registry/entity/KCHL-3


OrgTechHandle: MANAG489-ARIN
OrgTechName:   Manager
OrgTechPhone:  +852 94159695 
OrgTechEmail:  whois@kaopucloud.com
OrgTechRef:    https://rdap.arin.net/registry/entity/MANAG489-ARIN

OrgAbuseHandle: MANAG489-ARIN
OrgAbuseName:   Manager
OrgAbusePhone:  +852 94159695 
OrgAbuseEmail:  whois@kaopucloud.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/MANAG489-ARIN

# end


# start

NetRange:       38.60.254.0 - 38.60.254.255
CIDR:           38.60.254.0/24
NetName:        LIGHTNODE-TH
NetHandle:      NET-38-60-254-0-1
Parent:         KAOPU-CGNT-NET-2 (NET-38-60-128-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       LightNode-TH (C09346966)
RegDate:        2023-04-03
Updated:        2023-04-03
Ref:            https://rdap.arin.net/registry/ip/38.60.254.0


CustName:       LightNode-TH
Address:        Thailand,Bangkok
City:           Bangkok
StateProv:      
PostalCode:     
Country:        TH
RegDate:        2023-04-03
Updated:        2023-04-03
Ref:            https://rdap.arin.net/registry/entity/C09346966

OrgTechHandle: MANAG489-ARIN
OrgTechName:   Manager
OrgTechPhone:  +852 94159695 
OrgTechEmail:  whois@kaopucloud.com
OrgTechRef:    https://rdap.arin.net/registry/entity/MANAG489-ARIN

OrgAbuseHandle: MANAG489-ARIN
OrgAbuseName:   Manager
OrgAbusePhone:  +852 94159695 
OrgAbuseEmail:  whois@kaopucloud.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/MANAG489-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.cogentco.com:4321.

%rwhois V-1.5:0010b0:00 rwhois.cogentco.com (CGNT rwhoisd 1.2.2)
network:ID:NET4-263C800011
network:Network-Name:NET4-263C800011
network:IP-Network:38.60.128.0/17
network:Org-Name:KAOPU CLOUD HK LIMITED
network:Street-Address:11 GREAT OAKS BLVD
network:City:SAN JOSE
network:State:CA
network:Country:US
network:Postal-Code:95119
network:Tech-Contact:ZC108-ARIN
network:Updated:2025-05-06 14:18:08
%ok
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 38.60.254.174
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56863
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;38.60.254.174.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042002 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 21 13:48:23 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 174.254.60.38.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 174.254.60.38.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
113.125.25.73 attackspam
detected by Fail2Ban
2020-03-17 16:10:59
151.80.144.255 attack
SSH bruteforce (Triggered fail2ban)
2020-03-17 16:02:31
222.135.77.101 attackbots
2020-03-17T02:14:14.889391  sshd[23614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.135.77.101  user=root
2020-03-17T02:14:16.679408  sshd[23614]: Failed password for root from 222.135.77.101 port 39555 ssh2
2020-03-17T02:26:56.464228  sshd[23822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.135.77.101  user=root
2020-03-17T02:26:58.530088  sshd[23822]: Failed password for root from 222.135.77.101 port 41161 ssh2
...
2020-03-17 16:29:31
138.197.158.118 attackspam
Mar 17 06:44:43 ncomp sshd[9495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.158.118  user=root
Mar 17 06:44:45 ncomp sshd[9495]: Failed password for root from 138.197.158.118 port 48322 ssh2
Mar 17 07:30:14 ncomp sshd[10225]: Invalid user musikbot from 138.197.158.118
2020-03-17 16:05:22
190.193.181.151 attackspam
Lines containing failures of 190.193.181.151
Mar 16 11:51:04 shared06 sshd[16705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.193.181.151  user=r.r
Mar 16 11:51:07 shared06 sshd[16705]: Failed password for r.r from 190.193.181.151 port 41361 ssh2
Mar 16 11:51:07 shared06 sshd[16705]: Received disconnect from 190.193.181.151 port 41361:11: Bye Bye [preauth]
Mar 16 11:51:07 shared06 sshd[16705]: Disconnected from authenticating user r.r 190.193.181.151 port 41361 [preauth]
Mar 16 12:08:19 shared06 sshd[21913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.193.181.151  user=r.r
Mar 16 12:08:21 shared06 sshd[21913]: Failed password for r.r from 190.193.181.151 port 38161 ssh2
Mar 16 12:08:21 shared06 sshd[21913]: Received disconnect from 190.193.181.151 port 38161:11: Bye Bye [preauth]
Mar 16 12:08:21 shared06 sshd[21913]: Disconnected from authenticating user r.r 190.193.181.151 p........
------------------------------
2020-03-17 16:03:48
179.232.13.179 attackspam
SSH bruteforce
2020-03-17 16:24:56
177.93.252.18 attack
firewall-block, port(s): 23/tcp
2020-03-17 16:20:28
211.219.114.39 attackspambots
Mar 15 23:23:10 josie sshd[21013]: Invalid user wftuser from 211.219.114.39
Mar 15 23:23:10 josie sshd[21013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.219.114.39 
Mar 15 23:23:12 josie sshd[21013]: Failed password for invalid user wftuser from 211.219.114.39 port 48610 ssh2
Mar 15 23:23:12 josie sshd[21014]: Received disconnect from 211.219.114.39: 11: Bye Bye
Mar 15 23:26:37 josie sshd[21535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.219.114.39  user=r.r
Mar 15 23:26:39 josie sshd[21535]: Failed password for r.r from 211.219.114.39 port 44992 ssh2
Mar 15 23:26:39 josie sshd[21536]: Received disconnect from 211.219.114.39: 11: Bye Bye
Mar 15 23:28:33 josie sshd[21858]: Invalid user liuzuozhen from 211.219.114.39
Mar 15 23:28:33 josie sshd[21858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.219.114.39 
Mar 15 23:28:34 josi........
-------------------------------
2020-03-17 16:13:07
82.102.12.136 attackbots
03/16/2020-19:26:22.499846 82.102.12.136 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-03-17 16:08:18
95.84.146.201 attackspam
Invalid user admins from 95.84.146.201 port 43078
2020-03-17 15:57:35
116.51.40.205 attackspambots
" "
2020-03-17 16:26:54
103.129.221.62 attackspam
Mar 16 23:31:17 ws26vmsma01 sshd[61266]: Failed password for root from 103.129.221.62 port 47134 ssh2
Mar 16 23:57:31 ws26vmsma01 sshd[194354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.221.62
...
2020-03-17 16:12:31
222.186.170.77 attack
Mar 17 07:06:11 lnxmysql61 sshd[20480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.170.77
2020-03-17 16:25:59
61.167.99.163 attackbotsspam
Mar 17 07:56:45 pornomens sshd\[4994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.167.99.163  user=root
Mar 17 07:56:47 pornomens sshd\[4994\]: Failed password for root from 61.167.99.163 port 53810 ssh2
Mar 17 07:56:54 pornomens sshd\[4996\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.167.99.163  user=root
...
2020-03-17 16:18:24
220.134.17.41 attackspambots
Mar 17 00:25:54 debian-2gb-nbg1-2 kernel: \[6660272.305897\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=220.134.17.41 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=50 ID=11900 PROTO=TCP SPT=15555 DPT=8080 WINDOW=64314 RES=0x00 SYN URGP=0
2020-03-17 16:17:48

最近上报的IP列表

143.58.223.1 220.167.233.234 182.119.228.76 110.78.154.184
2606:4700:10::6814:5105 2606:4700:10::6816:2114 110.78.150.124 2606:4700:10::6814:5513
2606:4700:10::6814:9016 164.155.74.88 2606:4700:10::6814:8095 2606:4700:10::6814:6906
107.175.229.91 135.82.153.98 125.37.162.218 45.157.112.98
45.157.112.68 2606:4700:10::6816:2590 110.77.187.69 2606:4700:10::6816:4135