必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Boardman

省份(region): Oregon

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b'#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       44.192.0.0 - 44.255.255.255
CIDR:           44.192.0.0/10
NetName:        AMAZO-4
NetHandle:      NET-44-192-0-0-1
Parent:         NET44 (NET-44-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Amazon.com, Inc. (AMAZO-4)
RegDate:        2019-07-18
Updated:        2019-07-18
Ref:            https://rdap.arin.net/registry/ip/44.192.0.0



OrgName:        Amazon.com, Inc.
OrgId:          AMAZO-4
Address:        Amazon Web Services, Inc.
Address:        P.O. Box 81226
City:           Seattle
StateProv:      WA
PostalCode:     98108-1226
Country:        US
RegDate:        2005-09-29
Updated:        2026-04-17
Comment:        For details of this service please see
Comment:        http://ec2.amazonaws.com
Ref:            https://rdap.arin.net/registry/entity/AMAZO-4


OrgRoutingHandle: IPROU3-ARIN
OrgRoutingName:   IP Routing
OrgRoutingPhone:  +1-206-555-0000 
OrgRoutingEmail:  aws-routing-poc@amazon.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/IPROU3-ARIN

OrgNOCHandle: AANO1-ARIN
OrgNOCName:   Amazon AWS Network Operations
OrgNOCPhone:  +1-206-555-0000 
OrgNOCEmail:  amzn-noc-contact@amazon.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/AANO1-ARIN

OrgRoutingHandle: ARMP-ARIN
OrgRoutingName:   AWS RPKI Management POC
OrgRoutingPhone:  +1-206-555-0000 
OrgRoutingEmail:  aws-rpki-routing-poc@amazon.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/ARMP-ARIN

OrgDNSHandle: DNS1131-ARIN
OrgDNSName:   DNS
OrgDNSPhone:  +1-202-555-0000 
OrgDNSEmail:  ipmanagement+dns@amazon.com
OrgDNSRef:    https://rdap.arin.net/registry/entity/DNS1131-ARIN

OrgAbuseHandle: AEA8-ARIN
OrgAbuseName:   Amazon EC2 Abuse
OrgAbusePhone:  +1-206-555-0000 
OrgAbuseEmail:  trustandsafety@support.aws.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AEA8-ARIN

OrgTechHandle: ANO24-ARIN
OrgTechName:   Amazon EC2 Network Operations
OrgTechPhone:  +1-206-555-0000 
OrgTechEmail:  amzn-noc-contact@amazon.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ANO24-ARIN

# end


# start

NetRange:       44.224.0.0 - 44.255.255.255
CIDR:           44.224.0.0/11
NetName:        AMAZO-ZPDX
NetHandle:      NET-44-224-0-0-1
Parent:         AMAZO-4 (NET-44-192-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   Amazon.com, Inc. (AMAZO-47)
RegDate:        2019-08-01
Updated:        2019-08-01
Ref:            https://rdap.arin.net/registry/ip/44.224.0.0



OrgName:        Amazon.com, Inc.
OrgId:          AMAZO-47
Address:        EC2, EC2 1200 12th Ave South
City:           Seattle
StateProv:      WA
PostalCode:     98144
Country:        US
RegDate:        2011-05-10
Updated:        2021-07-22
Ref:            https://rdap.arin.net/registry/entity/AMAZO-47


OrgTechHandle: ANO24-ARIN
OrgTechName:   Amazon EC2 Network Operations
OrgTechPhone:  +1-206-555-0000 
OrgTechEmail:  amzn-noc-contact@amazon.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ANO24-ARIN

OrgAbuseHandle: AEA8-ARIN
OrgAbuseName:   Amazon EC2 Abuse
OrgAbusePhone:  +1-206-555-0000 
OrgAbuseEmail:  trustandsafety@support.aws.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AEA8-ARIN

OrgRoutingHandle: IPROU3-ARIN
OrgRoutingName:   IP Routing
OrgRoutingPhone:  +1-206-555-0000 
OrgRoutingEmail:  aws-routing-poc@amazon.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/IPROU3-ARIN

OrgNOCHandle: AANO1-ARIN
OrgNOCName:   Amazon AWS Network Operations
OrgNOCPhone:  +1-206-555-0000 
OrgNOCEmail:  amzn-noc-contact@amazon.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/AANO1-ARIN

OrgRoutingHandle: ARMP-ARIN
OrgRoutingName:   AWS RPKI Management POC
OrgRoutingPhone:  +1-206-555-0000 
OrgRoutingEmail:  aws-rpki-routing-poc@amazon.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/ARMP-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#'
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 44.244.175.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49851
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;44.244.175.55.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041900 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 20 00:30:05 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
55.175.244.44.in-addr.arpa domain name pointer ec2-44-244-175-55.us-west-2.compute.amazonaws.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
55.175.244.44.in-addr.arpa	name = ec2-44-244-175-55.us-west-2.compute.amazonaws.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
193.112.74.169 attack
Aug  2 20:29:30 lnxded64 sshd[16955]: Failed password for root from 193.112.74.169 port 40564 ssh2
Aug  2 20:29:30 lnxded64 sshd[16955]: Failed password for root from 193.112.74.169 port 40564 ssh2
2020-08-03 02:42:58
212.113.40.142 attackspam
2020-08-02T18:04:30.733580shield sshd\[25563\]: Invalid user RPM from 212.113.40.142 port 49752
2020-08-02T18:04:30.865477shield sshd\[25563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.113.40.142
2020-08-02T18:04:32.205619shield sshd\[25563\]: Failed password for invalid user RPM from 212.113.40.142 port 49752 ssh2
2020-08-02T18:04:33.305730shield sshd\[25573\]: Invalid user ubnt from 212.113.40.142 port 50457
2020-08-02T18:04:33.431477shield sshd\[25573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.113.40.142
2020-08-03 02:38:28
114.41.183.38 attackbots
1596369926 - 08/02/2020 14:05:26 Host: 114.41.183.38/114.41.183.38 Port: 445 TCP Blocked
2020-08-03 02:44:34
45.145.67.151 attackspam
firewall-block, port(s): 21056/tcp, 21325/tcp, 21370/tcp, 21564/tcp, 21596/tcp, 21834/tcp, 21904/tcp, 21959/tcp
2020-08-03 02:51:53
41.218.194.158 attackbotsspam
Attempted Brute Force (dovecot)
2020-08-03 02:40:08
208.66.193.8 attackbots
Brute-force attempt banned
2020-08-03 02:41:55
178.128.161.250 attackspam
trying to access non-authorized port
2020-08-03 02:30:28
206.189.177.75 attackbots
20 attempts against mh-ssh on cloud
2020-08-03 02:43:45
216.218.206.91 attackbots
 TCP (SYN) 216.218.206.91:35006 -> port 80, len 40
2020-08-03 02:34:03
91.121.101.77 attackspambots
91.121.101.77 - - [02/Aug/2020:17:46:38 +0100] "POST /wp-login.php HTTP/1.1" 200 1885 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
91.121.101.77 - - [02/Aug/2020:17:46:39 +0100] "POST /wp-login.php HTTP/1.1" 200 1868 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
91.121.101.77 - - [02/Aug/2020:17:46:39 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-03 02:25:37
103.89.91.156 attackbots
Icarus honeypot on github
2020-08-03 02:47:16
91.121.143.108 attackspam
Hacking Attempt (Website Honeypot)
2020-08-03 02:15:27
190.145.192.106 attackspam
Aug  2 12:34:32 django-0 sshd[23602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.192.106  user=root
Aug  2 12:34:34 django-0 sshd[23602]: Failed password for root from 190.145.192.106 port 36112 ssh2
...
2020-08-03 02:44:14
14.63.174.149 attackbotsspam
[SID2] Fail2ban detected 5 failed SSH login attempts within 30 minutes. This report was submitted automatically.
2020-08-03 02:16:17
218.241.134.34 attack
Failed password for root from 218.241.134.34 port 13683 ssh2
2020-08-03 02:48:33

最近上报的IP列表

2606:4700:10::ac43:2827 2606:4700:10::ac43:2326 2606:4700:10::6814:6239 2606:4700:10::ac43:2084
109.162.246.175 2606:4700:10::6814:5024 2606:4700:10::6816:2892 2606:4700:10::6814:4875
2606:4700:10::6814:5637 119.81.196.179 119.81.196.137 110.78.158.106
2606:4700:10::6814:8932 2606:4700:10::6814:6628 134.35.157.158 2606:4700:10::6816:414d
2606:4700:10::6814:8242 2606:4700:10::6816:1222 2606:4700:10::6816:1884 2606:4700:10::ac43:1275