必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Atlanta

省份(region): Georgia

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       38.0.0.0 - 38.255.255.255
CIDR:           38.0.0.0/8
NetName:        COGENT-A
NetHandle:      NET-38-0-0-0-1
Parent:          ()
NetType:        Direct Allocation
OriginAS:       
Organization:   Cogent Communications, LLC (COGC)
RegDate:        1991-04-16
Updated:        2025-09-23
Ref:            https://rdap.arin.net/registry/ip/38.0.0.0



OrgName:        Cogent Communications, LLC
OrgId:          COGC
Address:        2450 N Street NW
City:           Washington
StateProv:      DC
PostalCode:     20037
Country:        US
RegDate:        2000-05-30
Updated:        2025-09-23
Comment:        Geofeed https://geofeed.cogentco.com/geofeed.csv
Ref:            https://rdap.arin.net/registry/entity/COGC

ReferralServer:  rwhois://rwhois.cogentco.com:4321

OrgNOCHandle: ZC108-ARIN
OrgNOCName:   Cogent Communications
OrgNOCPhone:  +1-877-875-4311 
OrgNOCEmail:  noc@cogentco.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/ZC108-ARIN

OrgTechHandle: IPALL-ARIN
OrgTechName:   IP Allocation
OrgTechPhone:  +1-877-875-4311 
OrgTechEmail:  ipalloc@cogentco.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPALL-ARIN

OrgAbuseHandle: COGEN-ARIN
OrgAbuseName:   Cogent Abuse
OrgAbusePhone:  +1-877-875-4311 
OrgAbuseEmail:  abuse@cogentco.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/COGEN-ARIN

# end


# start

NetRange:       38.66.200.0 - 38.66.201.255
CIDR:           38.66.200.0/23
NetName:        BRIX-CGNT-NET-65
NetHandle:      NET-38-66-200-0-1
Parent:         COGENT-A (NET-38-0-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   BasicBrix Cloud Pte Ltd (BCPL-16)
RegDate:        2024-11-11
Updated:        2024-11-11
Comment:        Geofeed https://basicbrix.com/geofeed
Ref:            https://rdap.arin.net/registry/ip/38.66.200.0


OrgName:        BasicBrix Cloud Pte Ltd
OrgId:          BCPL-16
Address:        300 Tampines Avenue 5, #09-02 Tampines Junction
City:           Singapore
StateProv:      
PostalCode:     529653
Country:        SG
RegDate:        2024-04-23
Updated:        2024-04-26
Ref:            https://rdap.arin.net/registry/entity/BCPL-16


OrgAbuseHandle: ABUSE9004-ARIN
OrgAbuseName:   Abuse Team
OrgAbusePhone:  +6569577757 
OrgAbuseEmail:  abuse@basicbrix.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE9004-ARIN

OrgRoutingHandle: NETWO10094-ARIN
OrgRoutingName:   Network Administrator
OrgRoutingPhone:  +6569577757 
OrgRoutingEmail:  network@basicbrix.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/NETWO10094-ARIN

OrgTechHandle: NETWO10094-ARIN
OrgTechName:   Network Administrator
OrgTechPhone:  +6569577757 
OrgTechEmail:  network@basicbrix.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NETWO10094-ARIN

OrgNOCHandle: NETWO10094-ARIN
OrgNOCName:   Network Administrator
OrgNOCPhone:  +6569577757 
OrgNOCEmail:  network@basicbrix.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/NETWO10094-ARIN

OrgDNSHandle: NETWO10094-ARIN
OrgDNSName:   Network Administrator
OrgDNSPhone:  +6569577757 
OrgDNSEmail:  network@basicbrix.com
OrgDNSRef:    https://rdap.arin.net/registry/entity/NETWO10094-ARIN

# end


# start

NetRange:       38.66.201.0 - 38.66.201.255
CIDR:           38.66.201.0/24
NetName:        BX-CGNT-E10-04
NetHandle:      NET-38-66-201-0-1
Parent:         BRIX-CGNT-NET-65 (NET-38-66-200-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       Cogent Communications (C11015622)
RegDate:        2024-11-14
Updated:        2024-11-14
Ref:            https://rdap.arin.net/registry/ip/38.66.201.0


CustName:       Cogent Communications
Address:        2947 Bradley Street
City:           Pasadena
StateProv:      CA
PostalCode:     91107
Country:        US
RegDate:        2024-11-14
Updated:        2024-11-14
Ref:            https://rdap.arin.net/registry/entity/C11015622

OrgAbuseHandle: ABUSE9004-ARIN
OrgAbuseName:   Abuse Team
OrgAbusePhone:  +6569577757 
OrgAbuseEmail:  abuse@basicbrix.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE9004-ARIN

OrgRoutingHandle: NETWO10094-ARIN
OrgRoutingName:   Network Administrator
OrgRoutingPhone:  +6569577757 
OrgRoutingEmail:  network@basicbrix.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/NETWO10094-ARIN

OrgTechHandle: NETWO10094-ARIN
OrgTechName:   Network Administrator
OrgTechPhone:  +6569577757 
OrgTechEmail:  network@basicbrix.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NETWO10094-ARIN

OrgNOCHandle: NETWO10094-ARIN
OrgNOCName:   Network Administrator
OrgNOCPhone:  +6569577757 
OrgNOCEmail:  network@basicbrix.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/NETWO10094-ARIN

OrgDNSHandle: NETWO10094-ARIN
OrgDNSName:   Network Administrator
OrgDNSPhone:  +6569577757 
OrgDNSEmail:  network@basicbrix.com
OrgDNSRef:    https://rdap.arin.net/registry/entity/NETWO10094-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.cogentco.com:4321.

%rwhois V-1.5:0010b0:00 rwhois.cogentco.com (CGNT rwhoisd 1.2.1)
network:ID:NET4-2642C80017
network:Network-Name:NET4-2642C80017
network:IP-Network:38.66.200.0/23
network:Org-Name:BasicBrix Cloud Pte Ltd
network:Street-Address:2947 BRADLEY STREET
network:City:PASADENA
network:State:CA
network:Country:US
network:Postal-Code:91107
network:Tech-Contact:ZC108-ARIN
network:Updated:2025-07-15 18:06:14
%ok
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 38.66.201.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12144
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;38.66.201.212.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025101701 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 18 13:06:21 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 212.201.66.38.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 38.66.201.212.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
68.183.12.80 attackspam
2020-05-28T16:54:29.644547abusebot-8.cloudsearch.cf sshd[3765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=chbluxury.com.ng  user=root
2020-05-28T16:54:32.064880abusebot-8.cloudsearch.cf sshd[3765]: Failed password for root from 68.183.12.80 port 42408 ssh2
2020-05-28T16:58:13.243990abusebot-8.cloudsearch.cf sshd[3960]: Invalid user asus from 68.183.12.80 port 46844
2020-05-28T16:58:13.253194abusebot-8.cloudsearch.cf sshd[3960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=chbluxury.com.ng
2020-05-28T16:58:13.243990abusebot-8.cloudsearch.cf sshd[3960]: Invalid user asus from 68.183.12.80 port 46844
2020-05-28T16:58:16.089461abusebot-8.cloudsearch.cf sshd[3960]: Failed password for invalid user asus from 68.183.12.80 port 46844 ssh2
2020-05-28T17:01:45.108499abusebot-8.cloudsearch.cf sshd[4149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=chbluxury.com.ng  
...
2020-05-29 01:11:31
80.211.67.90 attack
firewall-block, port(s): 728/tcp
2020-05-29 00:57:18
205.134.182.99 attackspam
Invalid user tomm from 205.134.182.99 port 55812
2020-05-29 01:07:30
106.12.22.208 attack
May 28 07:08:52 propaganda sshd[4006]: Connection from 106.12.22.208 port 33506 on 10.0.0.161 port 22 rdomain ""
May 28 07:08:53 propaganda sshd[4006]: Connection closed by 106.12.22.208 port 33506 [preauth]
2020-05-29 00:32:16
18.162.115.5 attack
Invalid user Admin123 from 18.162.115.5 port 54308
2020-05-29 00:54:40
68.183.187.234 attack
firewall-block, port(s): 27015/tcp
2020-05-29 01:05:01
208.94.176.181 attackspam
Icarus honeypot on github
2020-05-29 01:10:35
206.189.146.27 attack
May 28 15:44:32 ip-172-31-61-156 sshd[29600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.146.27  user=root
May 28 15:44:34 ip-172-31-61-156 sshd[29600]: Failed password for root from 206.189.146.27 port 52522 ssh2
May 28 15:49:02 ip-172-31-61-156 sshd[29816]: Invalid user modelsfan from 206.189.146.27
May 28 15:49:02 ip-172-31-61-156 sshd[29816]: Invalid user modelsfan from 206.189.146.27
...
2020-05-29 00:56:43
186.19.224.152 attackspambots
May 28 09:40:01 server1 sshd\[17733\]: Invalid user heisei from 186.19.224.152
May 28 09:40:01 server1 sshd\[17733\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.19.224.152 
May 28 09:40:03 server1 sshd\[17733\]: Failed password for invalid user heisei from 186.19.224.152 port 35338 ssh2
May 28 09:48:17 server1 sshd\[20423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.19.224.152  user=root
May 28 09:48:19 server1 sshd\[20423\]: Failed password for root from 186.19.224.152 port 32998 ssh2
...
2020-05-29 01:12:36
209.141.59.153 attack
 UDP 209.141.59.153:54747 -> port 1900, len 121
2020-05-29 00:39:14
104.236.142.89 attackspam
Automatic report BANNED IP
2020-05-29 00:49:16
143.208.118.203 attackbots
Zyxel Multiple Products Command Injection Vulnerability
2020-05-29 00:36:33
113.21.96.237 attack
(imapd) Failed IMAP login from 113.21.96.237 (NC/New Caledonia/host-113-21-96-237.canl.nc): 1 in the last 3600 secs
2020-05-29 00:57:03
139.59.0.96 attackspam
May 28 17:28:22 debian-2gb-nbg1-2 kernel: \[12938491.471257\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=139.59.0.96 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=24141 PROTO=TCP SPT=41434 DPT=7013 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-29 00:44:48
51.38.80.173 attackspam
May 28 14:21:40 vps687878 sshd\[23190\]: Invalid user test from 51.38.80.173 port 53882
May 28 14:21:40 vps687878 sshd\[23190\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.80.173
May 28 14:21:42 vps687878 sshd\[23190\]: Failed password for invalid user test from 51.38.80.173 port 53882 ssh2
May 28 14:25:31 vps687878 sshd\[23694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.80.173  user=root
May 28 14:25:32 vps687878 sshd\[23694\]: Failed password for root from 51.38.80.173 port 32904 ssh2
...
2020-05-29 00:40:24

最近上报的IP列表

117.151.37.60 43.188.40.204 43.188.40.209 43.188.40.191
91.202.233.79 188.132.137.114 162.243.73.133 20.171.27.90
107.161.215.242 107.161.215.214 107.161.215.208 107.161.215.61
107.161.215.91 107.161.215.241 147.185.133.68 192.168.1.246
10.55.241.202 117.215.63.188 107.174.51.158 99.67.151.196