必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Los Angeles

省份(region): California

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       38.0.0.0 - 38.255.255.255
CIDR:           38.0.0.0/8
NetName:        COGENT-A
NetHandle:      NET-38-0-0-0-1
Parent:          ()
NetType:        Direct Allocation
OriginAS:       
Organization:   Cogent Communications, LLC (COGC)
RegDate:        1991-04-16
Updated:        2025-09-23
Ref:            https://rdap.arin.net/registry/ip/38.0.0.0



OrgName:        Cogent Communications, LLC
OrgId:          COGC
Address:        2450 N Street NW
City:           Washington
StateProv:      DC
PostalCode:     20037
Country:        US
RegDate:        2000-05-30
Updated:        2025-09-23
Comment:        Geofeed https://geofeed.cogentco.com/geofeed.csv
Ref:            https://rdap.arin.net/registry/entity/COGC

ReferralServer:  rwhois://rwhois.cogentco.com:4321

OrgNOCHandle: ZC108-ARIN
OrgNOCName:   Cogent Communications
OrgNOCPhone:  +1-877-875-4311 
OrgNOCEmail:  noc@cogentco.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/ZC108-ARIN

OrgAbuseHandle: COGEN-ARIN
OrgAbuseName:   Cogent Abuse
OrgAbusePhone:  +1-877-875-4311 
OrgAbuseEmail:  abuse@cogentco.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/COGEN-ARIN

OrgTechHandle: IPALL-ARIN
OrgTechName:   IP Allocation
OrgTechPhone:  +1-877-875-4311 
OrgTechEmail:  ipalloc@cogentco.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPALL-ARIN

# end


# start

NetRange:       38.85.192.0 - 38.85.255.255
CIDR:           38.85.192.0/18
NetName:        KURUN-CGNT-NET-2
NetHandle:      NET-38-85-192-0-1
Parent:         COGENT-A (NET-38-0-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   KURUN CLOUD INC (KC-2074)
RegDate:        2023-08-23
Updated:        2023-08-23
Ref:            https://rdap.arin.net/registry/ip/38.85.192.0


OrgName:        KURUN CLOUD INC
OrgId:          KC-2074
Address:        6550 Meadow Lane PL, Rancho Cucamonga, CA 91701
City:           LA
StateProv:      CA
PostalCode:     91701
Country:        US
RegDate:        2020-11-19
Updated:        2024-11-25
Ref:            https://rdap.arin.net/registry/entity/KC-2074


OrgAbuseHandle: ABUSE8033-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-909-279-1111 
OrgAbuseEmail:  abuse@kurun.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE8033-ARIN

OrgNOCHandle: NOC33228-ARIN
OrgNOCName:   NOC
OrgNOCPhone:  +1-909-279-1111 
OrgNOCEmail:  noc@kurun.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/NOC33228-ARIN

OrgTechHandle: TECH1232-ARIN
OrgTechName:   Tech
OrgTechPhone:  +1-909-279-1111 
OrgTechEmail:  noc@kurun.com
OrgTechRef:    https://rdap.arin.net/registry/entity/TECH1232-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.cogentco.com:4321.

%rwhois V-1.5:0010b0:00 rwhois.cogentco.com (CGNT rwhoisd 1.2.2)
network:ID:NET4-2655C00012
network:Network-Name:NET4-2655C00012
network:IP-Network:38.85.192.0/18
network:Org-Name:KURUN CLOUD INC
network:Street-Address:624 SOUTH GRAND AVENUE
network:City:LOS ANGELES
network:State:CA
network:Country:US
network:Postal-Code:90017
network:Tech-Contact:ZC108-ARIN
network:Updated:2025-05-06 15:53:10
%ok
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 38.85.249.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61706
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;38.85.249.49.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026030800 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 09 00:58:37 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
Host 49.249.85.38.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 49.249.85.38.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
58.40.213.189 attack
445/tcp
[2019-06-21]1pkt
2019-06-21 22:26:31
180.179.241.66 attackspambots
Jun 21 14:00:38 srv206 sshd[8347]: Invalid user testtest from 180.179.241.66
Jun 21 14:00:38 srv206 sshd[8347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.179.241.66
Jun 21 14:00:38 srv206 sshd[8347]: Invalid user testtest from 180.179.241.66
Jun 21 14:00:40 srv206 sshd[8347]: Failed password for invalid user testtest from 180.179.241.66 port 19974 ssh2
...
2019-06-21 22:34:47
185.244.25.91 attackbotsspam
Invalid user admin from 185.244.25.91 port 40914
2019-06-21 22:58:04
49.83.241.215 attackspambots
Jun 21 11:01:51 extapp sshd[23166]: Failed password for r.r from 49.83.241.215 port 36172 ssh2
Jun 21 11:01:53 extapp sshd[23166]: Failed password for r.r from 49.83.241.215 port 36172 ssh2
Jun 21 11:01:55 extapp sshd[23166]: Failed password for r.r from 49.83.241.215 port 36172 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.83.241.215
2019-06-21 23:10:57
62.219.128.221 attackspam
23/tcp
[2019-06-21]1pkt
2019-06-21 22:31:57
109.245.159.186 attackbotsspam
Autoban   109.245.159.186 AUTH/CONNECT
2019-06-21 22:37:32
222.175.51.162 attackspambots
Telnet Server BruteForce Attack
2019-06-21 22:12:15
145.239.214.124 attackbotsspam
Jun 21 16:59:28 lnxmail61 postfix/smtpd[18478]: warning: [munged]:[145.239.214.124]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 21 16:59:28 lnxmail61 postfix/smtpd[18478]: lost connection after AUTH from [munged]:[145.239.214.124]
Jun 21 16:59:34 lnxmail61 postfix/smtpd[17244]: warning: [munged]:[145.239.214.124]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 21 16:59:34 lnxmail61 postfix/smtpd[17244]: lost connection after AUTH from [munged]:[145.239.214.124]
Jun 21 16:59:44 lnxmail61 postfix/smtpd[17845]: warning: [munged]:[145.239.214.124]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 21 16:59:44 lnxmail61 postfix/smtpd[17845]: lost connection after AUTH from [munged]:[145.239.214.124]
2019-06-21 23:15:12
5.101.181.41 attack
3432/tcp 3432/tcp
[2019-06-21]2pkt
2019-06-21 23:09:24
113.20.99.193 attackspam
445/tcp
[2019-06-21]1pkt
2019-06-21 22:14:50
165.22.54.62 attackbots
SSH-Brute-Force-165.22.54.62
2019-06-21 22:06:00
115.165.0.224 attack
Brute-Force attack detected (85) and blocked by Fail2Ban.
2019-06-21 23:13:46
218.92.0.203 attackbots
Jun 21 13:11:00 dev sshd\[30929\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.203  user=root
Jun 21 13:11:02 dev sshd\[30929\]: Failed password for root from 218.92.0.203 port 45794 ssh2
...
2019-06-21 23:18:33
42.179.178.151 attackbotsspam
5500/tcp
[2019-06-21]1pkt
2019-06-21 22:22:22
117.121.214.50 attack
Jun 21 13:55:35 sshgateway sshd\[3368\]: Invalid user nang from 117.121.214.50
Jun 21 13:55:35 sshgateway sshd\[3368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.121.214.50
Jun 21 13:55:38 sshgateway sshd\[3368\]: Failed password for invalid user nang from 117.121.214.50 port 39940 ssh2
2019-06-21 23:15:36

最近上报的IP列表

109.205.183.226 165.232.123.192 139.59.146.174 209.38.226.223
159.89.103.19 152.42.218.194 45.156.87.205 199.244.88.227
138.197.188.4 98.93.104.117 31.7.42.115 117.232.85.78
14.212.68.238 123.168.139.25 172.245.21.30 112.124.66.28
178.128.250.218 147.45.60.22 47.92.242.192 38.76.203.231