必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       44.0.0.0 - 44.191.255.255
CIDR:           44.0.0.0/9, 44.128.0.0/10
NetName:        AMPRNET
NetHandle:      NET-44-0-0-0-1
Parent:         NET44 (NET-44-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Amateur Radio Digital Communications (ARDC)
RegDate:        1992-07-01
Updated:        2024-11-07
Comment:        Geofeed https://portal.ampr.org/storage/geofeed.csv
Ref:            https://rdap.arin.net/registry/ip/44.0.0.0


OrgName:        Amateur Radio Digital Communications
OrgId:          ARDC
Address:        5663 Balboa Ave Suite 432
City:           San Diego
StateProv:      CA
PostalCode:     92111-2705
Country:        US
RegDate:        
Updated:        2025-01-17
Ref:            https://rdap.arin.net/registry/entity/ARDC


OrgTechHandle: LEWIS1112-ARIN
OrgTechName:   Lewis, Adam 
OrgTechPhone:  +1-858-477-9908 
OrgTechEmail:  adam@ardc.net
OrgTechRef:    https://rdap.arin.net/registry/entity/LEWIS1112-ARIN

OrgAbuseHandle: BURWE9-ARIN
OrgAbuseName:   Burwell, John 
OrgAbusePhone:  +1-858-477-9900 
OrgAbuseEmail:  john@ardc.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/BURWE9-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 44.89.166.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24324
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;44.89.166.75.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026012401 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 25 06:59:56 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
Host 75.166.89.44.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 75.166.89.44.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.176.27.254 attackspam
10/25/2019-02:09:23.873401 185.176.27.254 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-25 14:17:29
118.70.126.160 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 25-10-2019 04:55:15.
2019-10-25 13:52:52
5.135.185.27 attackbots
$f2bV_matches
2019-10-25 13:25:45
123.16.137.207 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 25-10-2019 04:55:16.
2019-10-25 13:52:31
36.92.68.193 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 25-10-2019 04:55:20.
2019-10-25 13:45:56
88.255.251.93 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 25-10-2019 04:55:21.
2019-10-25 13:43:34
185.31.163.237 attackspambots
Honeypot hit, critical abuseConfidenceScore, incoming Traffic from this IP
2019-10-25 13:58:41
14.244.2.88 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 25-10-2019 04:55:18.
2019-10-25 13:47:51
103.45.172.40 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-25 14:01:08
27.71.253.10 attack
445/tcp 445/tcp
[2019-10-02/25]2pkt
2019-10-25 13:42:30
58.69.101.228 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 25-10-2019 04:55:20.
2019-10-25 13:45:00
45.95.168.130 attackbots
port scan and connect, tcp 23 (telnet)
2019-10-25 14:03:06
221.143.48.143 attackspam
Oct 25 02:02:44 Tower sshd[8813]: Connection from 221.143.48.143 port 63704 on 192.168.10.220 port 22
Oct 25 02:02:46 Tower sshd[8813]: Invalid user endrill from 221.143.48.143 port 63704
Oct 25 02:02:46 Tower sshd[8813]: error: Could not get shadow information for NOUSER
Oct 25 02:02:46 Tower sshd[8813]: Failed password for invalid user endrill from 221.143.48.143 port 63704 ssh2
Oct 25 02:02:46 Tower sshd[8813]: Received disconnect from 221.143.48.143 port 63704:11: Bye Bye [preauth]
Oct 25 02:02:46 Tower sshd[8813]: Disconnected from invalid user endrill 221.143.48.143 port 63704 [preauth]
2019-10-25 14:16:16
117.27.154.20 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-25 13:28:41
110.139.28.59 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 25-10-2019 04:55:14.
2019-10-25 13:55:48

最近上报的IP列表

39.98.55.206 154.219.7.1 194.187.178.41 74.48.136.168
20.65.193.155 47.251.142.10 3.80.228.212 109.236.61.69
31.56.146.236 111.90.120.22 44.89.166.12 44.89.166.53
99.108.141.40 192.142.25.95 44.89.166.90 88.250.255.76
88.250.255.194 74.137.24.199 42.48.38.43 14.212.94.201