必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Lubbock

省份(region): Texas

国家(country): United States

运营商(isp): RTC Communications LLC

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       40.128.0.0 - 40.133.31.255
CIDR:           40.128.0.0/14, 40.132.0.0/16, 40.133.0.0/19
NetName:        WINDSTREAM-COMM
NetHandle:      NET-40-128-0-0-1
Parent:         NET40 (NET-40-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Windstream Communications LLC (WINDS-6)
RegDate:        2012-11-13
Updated:        2025-07-07
Comment:        Geofeed https://geofeed.windstream.com/GEO_Data.csv
Ref:            https://rdap.arin.net/registry/ip/40.128.0.0



OrgName:        Windstream Communications LLC
OrgId:          WINDS-6
Address:        4005 North Rodney Parham Rd
City:           Little Rock
StateProv:      AR
PostalCode:     72212
Country:        US
RegDate:        2006-08-10
Updated:        2025-07-08
Comment:        Geofeed https://geofeed.windstream.com/GEO_Data.csv
Ref:            https://rdap.arin.net/registry/entity/WINDS-6


OrgRoutingHandle: WINDS-ARIN
OrgRoutingName:   Windstream Communications Inc
OrgRoutingPhone:  +1-888-292-3827 
OrgRoutingEmail:  Windstream.IP.Admin@windstream.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/WINDS-ARIN

OrgAbuseHandle: WINDS1-ARIN
OrgAbuseName:   Windstream Abuse
OrgAbusePhone:  +1-800-347-1991 
OrgAbuseEmail:  abuse@windstream.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/WINDS1-ARIN

OrgTechHandle: WINDS-ARIN
OrgTechName:   Windstream Communications Inc
OrgTechPhone:  +1-888-292-3827 
OrgTechEmail:  Windstream.IP.Admin@windstream.com
OrgTechRef:    https://rdap.arin.net/registry/entity/WINDS-ARIN

# end


# start

NetRange:       40.131.160.0 - 40.131.175.255
CIDR:           40.131.160.0/20
NetName:        40-131-160-0
NetHandle:      NET-40-131-160-0-1
Parent:         WINDSTREAM-COMM (NET-40-128-0-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       WINDSTREAM COMMUNICATIONS LLC (C10900641)
RegDate:        2024-07-16
Updated:        2024-10-31
Comment:        Geofeed https://geofeed.windstream.com/GEO_Data.csv
Ref:            https://rdap.arin.net/registry/ip/40.131.160.0


CustName:       WINDSTREAM COMMUNICATIONS LLC
Address:        WINDSTREAM CONSUMER
City:           LUBBOCK
StateProv:      TX
PostalCode:     79401
Country:        US
RegDate:        2024-07-16
Updated:        2024-07-16
Ref:            https://rdap.arin.net/registry/entity/C10900641

OrgRoutingHandle: WINDS-ARIN
OrgRoutingName:   Windstream Communications Inc
OrgRoutingPhone:  +1-888-292-3827 
OrgRoutingEmail:  Windstream.IP.Admin@windstream.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/WINDS-ARIN

OrgAbuseHandle: WINDS1-ARIN
OrgAbuseName:   Windstream Abuse
OrgAbusePhone:  +1-800-347-1991 
OrgAbuseEmail:  abuse@windstream.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/WINDS1-ARIN

OrgTechHandle: WINDS-ARIN
OrgTechName:   Windstream Communications Inc
OrgTechPhone:  +1-888-292-3827 
OrgTechEmail:  Windstream.IP.Admin@windstream.com
OrgTechRef:    https://rdap.arin.net/registry/entity/WINDS-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 40.131.164.226
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20159
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;40.131.164.226.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032401 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 25 11:51:45 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
226.164.131.40.in-addr.arpa domain name pointer h226.164.131.40.dynamic.ip.windstream.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
226.164.131.40.in-addr.arpa	name = h226.164.131.40.dynamic.ip.windstream.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
189.130.210.124 attack
Honeypot attack, port: 445, PTR: dsl-189-130-210-124-dyn.prod-infinitum.com.mx.
2019-10-23 03:33:38
217.69.168.232 attackspam
Unauthorised access (Oct 22) SRC=217.69.168.232 LEN=40 TTL=247 ID=708 TCP DPT=445 WINDOW=1024 SYN
2019-10-23 03:22:42
176.215.112.82 attackbotsspam
Chat Spam
2019-10-23 03:18:26
131.100.213.174 attack
Unauthorised access (Oct 22) SRC=131.100.213.174 LEN=52 TOS=0x10 PREC=0x40 TTL=112 ID=30206 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-23 03:07:47
84.19.26.93 attackbotsspam
Honeypot attack, port: 445, PTR: casperjs.tldserver.de.
2019-10-23 03:06:43
58.254.132.156 attackbots
Oct 22 21:44:12 server sshd\[16110\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.254.132.156  user=root
Oct 22 21:44:14 server sshd\[16110\]: Failed password for root from 58.254.132.156 port 55154 ssh2
Oct 22 21:51:03 server sshd\[18025\]: Invalid user volmer from 58.254.132.156
Oct 22 21:51:03 server sshd\[18025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.254.132.156 
Oct 22 21:51:05 server sshd\[18025\]: Failed password for invalid user volmer from 58.254.132.156 port 55159 ssh2
...
2019-10-23 03:27:08
198.143.179.155 attack
Invalid user applmgr from 198.143.179.155 port 58522
2019-10-23 03:20:15
23.129.64.161 attack
Oct 22 21:02:37 vpn01 sshd[18451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.161
Oct 22 21:02:39 vpn01 sshd[18451]: Failed password for invalid user aerodynamik from 23.129.64.161 port 29188 ssh2
...
2019-10-23 03:25:26
92.119.160.80 attackbotsspam
Multiport scan : 20 ports scanned 5943 5953 5959 5961 5976 5981 5984 5994 5997 6003 6005 6006 6008 6018 8370 8378 8384 8390 8392 8394
2019-10-23 02:56:23
45.243.53.111 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2019-10-23 03:25:07
83.171.107.216 attackspam
2019-10-22T12:38:55.8112501495-001 sshd\[8459\]: Failed password for invalid user serv_fun from 83.171.107.216 port 55930 ssh2
2019-10-22T13:41:59.0593311495-001 sshd\[11216\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ppp.83-171-107-216.pppoe.avangarddsl.ru  user=root
2019-10-22T13:42:01.0781361495-001 sshd\[11216\]: Failed password for root from 83.171.107.216 port 27844 ssh2
2019-10-22T13:46:03.0317161495-001 sshd\[11370\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ppp.83-171-107-216.pppoe.avangarddsl.ru  user=root
2019-10-22T13:46:04.7355141495-001 sshd\[11370\]: Failed password for root from 83.171.107.216 port 46252 ssh2
2019-10-22T13:49:58.2409631495-001 sshd\[11581\]: Invalid user Administrator from 83.171.107.216 port 64655
2019-10-22T13:49:58.2493731495-001 sshd\[11581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ppp.83-171-107-216
...
2019-10-23 03:14:45
125.161.105.116 attackbots
Unauthorized IMAP connection attempt
2019-10-23 03:15:16
36.80.10.189 attackbotsspam
Oct 22 11:11:34 xtremcommunity sshd\[781650\]: Invalid user cn from 36.80.10.189 port 44072
Oct 22 11:11:34 xtremcommunity sshd\[781650\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.80.10.189
Oct 22 11:11:36 xtremcommunity sshd\[781650\]: Failed password for invalid user cn from 36.80.10.189 port 44072 ssh2
Oct 22 11:16:59 xtremcommunity sshd\[781803\]: Invalid user 1233 from 36.80.10.189 port 50476
Oct 22 11:16:59 xtremcommunity sshd\[781803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.80.10.189
...
2019-10-23 02:57:33
45.33.14.194 attackspambots
Oct 22 14:05:41 nxxxxxxx sshd[11517]: refused connect from 45.33.14.194 (45.=
33.14.194)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=45.33.14.194
2019-10-23 03:09:02
113.251.61.61 attack
Automatic report - FTP Brute Force
2019-10-23 02:59:20

最近上报的IP列表

10.226.18.172 196.106.101.75 122.192.203.74 121.234.219.155
2606:4700:10::ac43:99e 2606:4700:10::6814:6845 2606:4700:10::6814:8481 2606:4700:10::6816:4835
2606:4700:20::681a:300 2606:4700:10::6816:969 2606:4700:10::6814:4376 2606:4700:10::6816:347d
2606:4700:10::6816:1020 2606:4700:10::6816:4857 170.143.163.103 13.235.72.67
121.133.137.61 107.192.136.33 10.115.168.25 10.216.48.185