必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): La Puente

省份(region): California

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       47.136.0.0 - 47.181.255.255
CIDR:           47.180.0.0/15, 47.136.0.0/13, 47.160.0.0/12, 47.144.0.0/12, 47.176.0.0/14
NetName:        FCC-212
NetHandle:      NET-47-136-0-0-1
Parent:         NET47 (NET-47-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Frontier Communications Corporation (FCC-212)
RegDate:        2015-08-28
Updated:        2015-08-28
Ref:            https://rdap.arin.net/registry/ip/47.136.0.0



OrgName:        Frontier Communications Corporation
OrgId:          FCC-212
Address:        1400 E PHILLIPS BLVD
City:           POMONA
StateProv:      CA
PostalCode:     91766
Country:        US
RegDate:        2015-04-02
Updated:        2023-06-01
Comment:        Abuse complaints will only be responded to by the use of the abuse contact
Ref:            https://rdap.arin.net/registry/entity/FCC-212

ReferralServer:  rwhois://rwhois.frontiernet.net:4321

OrgTechHandle: ZF47-ARIN
OrgTechName:   Frontier Communications
OrgTechPhone:  +1-585-623-4519 
OrgTechEmail:  abuse@support.ftr.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ZF47-ARIN

OrgAbuseHandle: ABUSE223-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-877-474-7876 
OrgAbuseEmail:  abuse@support.ftr.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE223-ARIN

OrgRoutingHandle: HOSTM2146-ARIN
OrgRoutingName:   Hostmaster
OrgRoutingPhone:  +1-585-777-0949 
OrgRoutingEmail:  hostmaster@support.ftr.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/HOSTM2146-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.frontiernet.net:4321.

%rwhois V-1.5:002090:00 whois.frontiernet.net (by Network Solutions, Inc. V-1.5.9.6)
network:Auth-Area:47.144.0.0/13
network:ID:NET-47-147-0-0-19
network:Network-Name:47-147-0-0-19
network:IP-Network:47.147.0.0/19
network:Org-Name;I:FTR3 FiberOptic-D La Puente CA
network:Street-Address:15884 E Workman St
network:City:LA PUENTE
network:State:CA
network:Postal-Code:91744
network:Country-Code:US
network:Tech-Contact;I:AR259-FRTR
network:Updated:20160714
network:Updated-By:ipadmin@support.ftr.com
network:Class-Name:network

network:Auth-Area:47.144.0.0/13
network:ID:NET-47-144-0-0-13
network:Network-Name:47-144-0-0-13
network:IP-Network:47.144.0.0/13
network:Org-Name;I:Frontier Communications Solutions
network:Street-Address:120 North Plymouth Ave
network:City:Rochester
network:State:NY
network:Postal-Code:14608
network:Country-Code:US
network:Tech-Contact;I:ABUSE-FRTR
network:Admin-Contact;I:IPADMIN-FRTR
network:Updated:20160520
network:Updated-By:ipadmin@support.ftr.com
network:Class-Name:network

%ok
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 47.147.0.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11810
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;47.147.0.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026050500 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 06 00:53:40 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
242.0.147.47.in-addr.arpa domain name pointer 47-147-0-242.lsan.ca.frontiernet.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.0.147.47.in-addr.arpa	name = 47-147-0-242.lsan.ca.frontiernet.net.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
134.73.129.127 attackbots
Brute force SMTP login attempted.
...
2019-08-10 05:00:06
37.79.151.99 attack
Lines containing failures of 37.79.151.99
Aug  9 19:12:45 install sshd[25574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.79.151.99  user=r.r
Aug  9 19:12:47 install sshd[25574]: Failed password for r.r from 37.79.151.99 port 55658 ssh2
Aug  9 19:12:48 install sshd[25574]: Failed password for r.r from 37.79.151.99 port 55658 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=37.79.151.99
2019-08-10 04:53:35
173.164.173.36 attack
Invalid user ssh-user from 173.164.173.36 port 40374
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.164.173.36
Failed password for invalid user ssh-user from 173.164.173.36 port 40374 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.164.173.36  user=root
Failed password for root from 173.164.173.36 port 34082 ssh2
2019-08-10 05:08:10
134.209.84.42 attackbotsspam
Brute force SMTP login attempted.
...
2019-08-10 05:09:24
187.167.192.12 attackspambots
Automatic report - Port Scan Attack
2019-08-10 05:25:20
178.62.108.111 attackspam
Automatic report - Banned IP Access
2019-08-10 05:13:14
118.34.12.35 attack
Automatic report - Banned IP Access
2019-08-10 05:25:04
134.209.90.139 attackspam
Brute force SMTP login attempted.
...
2019-08-10 05:08:37
134.73.129.208 attack
Brute force SMTP login attempted.
...
2019-08-10 04:46:29
210.219.151.187 attackspam
vps1:sshd-InvalidUser
2019-08-10 05:21:00
159.65.3.197 attackbotsspam
Aug  9 19:17:59 shared05 sshd[2578]: Invalid user tranz from 159.65.3.197
Aug  9 19:17:59 shared05 sshd[2578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.3.197
Aug  9 19:18:01 shared05 sshd[2578]: Failed password for invalid user tranz from 159.65.3.197 port 44122 ssh2
Aug  9 19:18:01 shared05 sshd[2578]: Received disconnect from 159.65.3.197 port 44122:11: Bye Bye [preauth]
Aug  9 19:18:01 shared05 sshd[2578]: Disconnected from 159.65.3.197 port 44122 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=159.65.3.197
2019-08-10 05:20:37
134.73.129.196 attack
Brute force SMTP login attempted.
...
2019-08-10 04:47:33
84.72.10.172 attackspambots
Aug  9 17:06:52 raspberrypi sshd\[8725\]: Invalid user ariane from 84.72.10.172Aug  9 17:06:54 raspberrypi sshd\[8725\]: Failed password for invalid user ariane from 84.72.10.172 port 58214 ssh2Aug  9 17:32:27 raspberrypi sshd\[9204\]: Invalid user jerald from 84.72.10.172
...
2019-08-10 05:12:54
134.209.74.77 attackspam
Brute force SMTP login attempted.
...
2019-08-10 05:13:35
162.144.84.235 attackbots
xmlrpc attack
2019-08-10 04:59:26

最近上报的IP列表

2606:4700:10::6814:4700 2606:4700:10::6814:7645 66.132.172.40 218.144.97.95
90.188.248.249 107.172.252.228 122.192.203.11 2606:4700:10::6814:7679
2606:4700:10::6814:5149 2606:4700:10::6816:2749 109.162.246.177 2606:4700:10::6816:3124
47.129.124.119 34.38.211.183 87.121.84.147 147.93.132.140
2606:4700:10::6814:9140 2606:4700:10::ac43:2597 2606:4700:10::6816:63 110.78.158.124