必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Tokyo

省份(region): Tokyo

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#


NetRange:       45.114.244.0 - 45.115.59.255
CIDR:           45.114.248.0/21, 45.115.32.0/20, 45.115.0.0/19, 45.115.48.0/21, 45.115.56.0/22, 45.114.244.0/22
NetName:        APNIC
NetHandle:      NET-45-114-244-0-1
Parent:         NET45 (NET-45-0-0-0-0)
NetType:        Early Registrations, Transferred to APNIC
OriginAS:       
Organization:   Asia Pacific Network Information Centre (APNIC)
RegDate:        2014-09-05
Updated:        2021-10-25
Ref:            https://rdap.arin.net/registry/ip/45.114.244.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois.apnic.net


OrgName:        Asia Pacific Network Information Centre
OrgId:          APNIC
Address:        PO Box 3646
City:           South Brisbane
StateProv:      QLD
PostalCode:     4101
Country:        AU
RegDate:        
Updated:        2012-01-24
Ref:            https://rdap.arin.net/registry/entity/APNIC

ReferralServer:  whois://whois.apnic.net
ResourceLink:  https://apps.db.ripe.net/db-web-ui/query

OrgAbuseHandle: AWC12-ARIN
OrgAbuseName:   APNIC Whois Contact
OrgAbusePhone:  +61 7 3858 3188 
OrgAbuseEmail:  search-apnic-not-arin@apnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN

OrgTechHandle: AWC12-ARIN
OrgTechName:   APNIC Whois Contact
OrgTechPhone:  +61 7 3858 3188 
OrgTechEmail:  search-apnic-not-arin@apnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.apnic.net.

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '45.115.32.0 - 45.115.32.255'

% Abuse contact for '45.115.32.0 - 45.115.32.255' is 'support@dreaminfo-lab.info'

inetnum:        45.115.32.0 - 45.115.32.255
netname:        AriskCommunications
descr:          Arisk Communications inc.
country:        JP
admin-c:        PF238-AP
tech-c:         PF238-AP
abuse-c:        PF238-AP
status:         ASSIGNED NON-PORTABLE
remarks:        For SPAM/ABUSE Issue:support@ariskisp.com
remarks:        geofeed: https://ariskisp.com/rfc8805.csv
mnt-by:         MAINT-DIL-JP
mnt-irt:        IRT-DIL-JP
last-modified:  2025-05-27T10:02:19Z
source:         APNIC

irt:            IRT-DIL-JP
address:        Spring-tech Tsukuba building 401, Umezono 2-1-15, Tsukuba-shi Ibaragi-ken 305-0045
e-mail:         support@dreaminfo-lab.info
abuse-mailbox:  support@dreaminfo-lab.info
admin-c:        DILA3-AP
tech-c:         DILA3-AP
auth:           # Filtered
remarks:        support@dreaminfo-lab.info was validated on 2025-09-30
mnt-by:         MAINT-DIL-JP
last-modified:  2025-11-18T00:32:54Z
source:         APNIC

person:         Pax Fussell
address:        350 NORTHERN BLVD STE 324 -1331 ALBANY NY 12204-1000
country:        US
phone:          +1-518-512-9230
e-mail:         support@ariskisp.com
nic-hdl:        PF238-AP
mnt-by:         MAINT-DIL-JP
last-modified:  2025-04-02T06:07:59Z
source:         APNIC

% Information related to '45.115.32.0/24AS395793'

route:          45.115.32.0/24
origin:         AS395793
descr:          Dream Information Laboratory
                Spring-tech Tsukuba building 401, Umezono 2-1-15
mnt-by:         MAINT-DIL-JP
last-modified:  2025-05-27T09:54:43Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.115.32.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55012
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.115.32.108.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025120701 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 08 04:35:34 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 108.32.115.45.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 108.32.115.45.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
148.63.53.51 attackspambots
Jan 16 19:18:59 v22018076622670303 sshd\[7717\]: Invalid user tgu from 148.63.53.51 port 55576
Jan 16 19:18:59 v22018076622670303 sshd\[7717\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.63.53.51
Jan 16 19:19:01 v22018076622670303 sshd\[7717\]: Failed password for invalid user tgu from 148.63.53.51 port 55576 ssh2
...
2020-01-17 02:34:09
104.168.104.41 attack
Unauthorized connection attempt detected from IP address 104.168.104.41 to port 2220 [J]
2020-01-17 02:38:54
112.85.42.173 attackspam
Jan 16 13:12:05 plusreed sshd[11804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.173  user=root
Jan 16 13:12:08 plusreed sshd[11804]: Failed password for root from 112.85.42.173 port 24562 ssh2
...
2020-01-17 02:14:24
222.186.175.216 attack
Jan 16 19:26:35 eventyay sshd[6182]: Failed password for root from 222.186.175.216 port 35776 ssh2
Jan 16 19:26:48 eventyay sshd[6182]: error: maximum authentication attempts exceeded for root from 222.186.175.216 port 35776 ssh2 [preauth]
Jan 16 19:26:53 eventyay sshd[6190]: Failed password for root from 222.186.175.216 port 55828 ssh2
...
2020-01-17 02:27:12
42.114.162.21 attackspam
Unauthorised access (Jan 16) SRC=42.114.162.21 LEN=52 TTL=109 ID=3403 DF TCP DPT=445 WINDOW=8192 SYN
2020-01-17 02:15:10
129.204.181.48 attackbots
Jan 16 13:59:19 lnxded63 sshd[5732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.181.48
2020-01-17 02:34:56
118.24.95.153 attack
Jan 16 19:23:22 tuxlinux sshd[26953]: Invalid user kafka from 118.24.95.153 port 36406
Jan 16 19:23:22 tuxlinux sshd[26953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.95.153 
Jan 16 19:23:22 tuxlinux sshd[26953]: Invalid user kafka from 118.24.95.153 port 36406
Jan 16 19:23:22 tuxlinux sshd[26953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.95.153 
Jan 16 19:23:22 tuxlinux sshd[26953]: Invalid user kafka from 118.24.95.153 port 36406
Jan 16 19:23:22 tuxlinux sshd[26953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.95.153 
Jan 16 19:23:24 tuxlinux sshd[26953]: Failed password for invalid user kafka from 118.24.95.153 port 36406 ssh2
...
2020-01-17 02:52:45
222.186.175.163 attackbots
Jan 16 19:10:56 amit sshd\[11808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.163  user=root
Jan 16 19:10:59 amit sshd\[11808\]: Failed password for root from 222.186.175.163 port 27738 ssh2
Jan 16 19:11:17 amit sshd\[11815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.163  user=root
...
2020-01-17 02:23:38
193.112.220.76 attack
Unauthorized connection attempt detected from IP address 193.112.220.76 to port 2220 [J]
2020-01-17 02:43:56
89.108.65.184 attackbots
SSH Brute Force
2020-01-17 02:40:40
202.117.111.133 attackspam
Unauthorized connection attempt detected from IP address 202.117.111.133 to port 2220 [J]
2020-01-17 02:29:47
45.55.233.213 attack
SSH Brute Force
2020-01-17 02:41:34
193.112.1.26 attackspambots
Jan 16 16:43:33 srv1 sshd[23116]: Invalid user nexus from 193.112.1.26
Jan 16 16:43:35 srv1 sshd[23116]: Failed password for invalid user nexus from 193.112.1.26 port 60208 ssh2
Jan 16 16:49:57 srv1 sshd[28432]: Invalid user factorio from 193.112.1.26
Jan 16 16:49:59 srv1 sshd[28432]: Failed password for invalid user factorio from 193.112.1.26 port 35908 ssh2
Jan 16 16:54:12 srv1 sshd[32239]: Invalid user tg from 193.112.1.26


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=193.112.1.26
2020-01-17 02:31:24
193.112.191.228 attackspambots
SSH Brute Force
2020-01-17 02:17:30
178.217.169.247 attack
Unauthorized connection attempt detected from IP address 178.217.169.247 to port 2220 [J]
2020-01-17 02:21:56

最近上报的IP列表

123.158.36.139 12.23.129.117 183.7.147.47 40.124.175.234
45.197.36.203 147.185.132.95 122.193.198.143 20.127.244.253
192.34.56.227 5.183.209.196 62.84.182.114 148.113.214.99
10.26.64.27 192.168.10.156 183.207.45.112 74.7.241.190
34.72.200.204 76.132.227.45 152.207.57.74 101.36.122.183