必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): Virginia

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       47.250.0.0 - 47.254.255.255
CIDR:           47.250.0.0/15, 47.252.0.0/15, 47.254.0.0/16
NetName:        AL-3
NetHandle:      NET-47-250-0-0-1
Parent:         NET47 (NET-47-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Alibaba Cloud LLC (AL-3)
RegDate:        2016-04-15
Updated:        2017-04-26
Ref:            https://rdap.arin.net/registry/ip/47.250.0.0



OrgName:        Alibaba Cloud LLC
OrgId:          AL-3
Address:        400 S El Camino Real, Suite 400
City:           San Mateo
StateProv:      CA
PostalCode:     94402
Country:        US
RegDate:        2010-10-29
Updated:        2024-11-25
Comment:        1.For AliCloud IPR Infringement and Abuse Claim, please use below link with browser to report: https://intl.aliyun.com/report
Comment:        
Comment:        2.For Alibaba.com and Aliexpress.com's IPR Infringement , please use below link with browser to report: https://ipp.alibabagroup.com
Comment:        
Comment:        3.For Alibaba.com and Aliexpress.com's Abuse, please send email to those two mail lists to report: intl-abuse@list.alibaba-inc.com and abuse@alibaba-inc.com
Comment:        
Comment:        4. For network issue, please send email to this mail list: aliops-goc@list.alibaba-inc.com
Ref:            https://rdap.arin.net/registry/entity/AL-3


OrgAbuseHandle: NETWO4028-ARIN
OrgAbuseName:   Network Abuse
OrgAbusePhone:  +1-408-785-5580 
OrgAbuseEmail:  abuse@alibaba-inc.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/NETWO4028-ARIN

OrgTechHandle: ALIBA-ARIN
OrgTechName:   Alibaba NOC
OrgTechPhone:  +1-408-748-1200 
OrgTechEmail:  abuse@alibaba-inc.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ALIBA-ARIN

OrgNOCHandle: ALIBA-ARIN
OrgNOCName:   Alibaba NOC
OrgNOCPhone:  +1-408-748-1200 
OrgNOCEmail:  abuse@alibaba-inc.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/ALIBA-ARIN

# end


# start

NetRange:       47.252.0.0 - 47.252.127.255
CIDR:           47.252.0.0/17
NetName:        ALIBABA CLOUD - US
NetHandle:      NET-47-252-0-0-1
Parent:         AL-3 (NET-47-250-0-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       Alibaba Cloud - US (C06961510)
RegDate:        2018-04-20
Updated:        2024-09-03
Comment:        1.For AliCloud IPR Infringement and Abuse Claim, please use below link with browser to report: https://intl.aliyun.com/report
Comment:        
Comment:        2.For Alibaba.com and Aliexpress.com's IPR Infringement , please use below link with browser to report: https://ipp.alibabagroup.com
Comment:        
Comment:        3.For Alibaba.com and Aliexpress.com's Abuse, please send email to those two mail lists to report: intl-abuse@list.alibaba-inc.com and abuse@alibaba-inc.com
Comment:        
Comment:        4. For network issue, please send email to this mail list: aliops-goc@list.alibaba-inc.com
Ref:            https://rdap.arin.net/registry/ip/47.252.0.0


CustName:       Alibaba Cloud - US
Address:        525 Almanor Ave, 4th Floor, Sunnyvale, California, 94085, USA
City:           San Mateo
StateProv:      CA
PostalCode:     94402
Country:        US
RegDate:        2018-04-20
Updated:        2024-09-03
Ref:            https://rdap.arin.net/registry/entity/C06961510

OrgAbuseHandle: NETWO4028-ARIN
OrgAbuseName:   Network Abuse
OrgAbusePhone:  +1-408-785-5580 
OrgAbuseEmail:  abuse@alibaba-inc.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/NETWO4028-ARIN

OrgTechHandle: ALIBA-ARIN
OrgTechName:   Alibaba NOC
OrgTechPhone:  +1-408-748-1200 
OrgTechEmail:  abuse@alibaba-inc.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ALIBA-ARIN

OrgNOCHandle: ALIBA-ARIN
OrgNOCName:   Alibaba NOC
OrgNOCPhone:  +1-408-748-1200 
OrgNOCEmail:  abuse@alibaba-inc.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/ALIBA-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 47.252.79.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5794
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;47.252.79.144.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025110700 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 07 14:55:43 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 144.79.252.47.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 144.79.252.47.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
107.173.145.168 attackspambots
Dec 10 10:33:29 MK-Soft-VM3 sshd[21298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.173.145.168 
Dec 10 10:33:32 MK-Soft-VM3 sshd[21298]: Failed password for invalid user mysql from 107.173.145.168 port 53146 ssh2
...
2019-12-10 20:07:22
106.12.73.236 attack
Dec 10 02:06:40 web1 sshd\[17672\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.73.236  user=root
Dec 10 02:06:42 web1 sshd\[17672\]: Failed password for root from 106.12.73.236 port 59090 ssh2
Dec 10 02:14:39 web1 sshd\[18629\]: Invalid user peirson from 106.12.73.236
Dec 10 02:14:39 web1 sshd\[18629\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.73.236
Dec 10 02:14:41 web1 sshd\[18629\]: Failed password for invalid user peirson from 106.12.73.236 port 60454 ssh2
2019-12-10 20:15:29
113.134.211.42 attack
Dec 10 11:31:40 ns381471 sshd[25672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.134.211.42
Dec 10 11:31:43 ns381471 sshd[25672]: Failed password for invalid user ex from 113.134.211.42 port 46028 ssh2
2019-12-10 20:01:07
185.209.0.89 attack
12/10/2019-07:06:20.297948 185.209.0.89 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-12-10 20:06:54
193.70.36.161 attackbots
$f2bV_matches
2019-12-10 20:27:46
202.129.29.135 attackbots
Dec 10 10:55:12 srv206 sshd[11410]: Invalid user wetsel from 202.129.29.135
...
2019-12-10 20:12:52
115.20.161.145 attackspam
2019-12-10T08:27:10.838759abusebot-5.cloudsearch.cf sshd\[2593\]: Invalid user roch from 115.20.161.145 port 37644
2019-12-10 20:06:37
134.175.191.248 attackspambots
$f2bV_matches
2019-12-10 20:02:30
183.245.210.182 attackbotsspam
Dec 10 11:44:01 microserver sshd[4141]: Invalid user jerry from 183.245.210.182 port 24354
Dec 10 11:44:01 microserver sshd[4141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.245.210.182
Dec 10 11:44:03 microserver sshd[4141]: Failed password for invalid user jerry from 183.245.210.182 port 24354 ssh2
Dec 10 11:44:22 microserver sshd[4191]: Invalid user kouki from 183.245.210.182 port 25273
Dec 10 11:44:23 microserver sshd[4191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.245.210.182
Dec 10 11:57:07 microserver sshd[6983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.245.210.182  user=backup
Dec 10 11:57:09 microserver sshd[6983]: Failed password for backup from 183.245.210.182 port 59826 ssh2
Dec 10 11:57:27 microserver sshd[7024]: Invalid user logan from 183.245.210.182 port 60708
Dec 10 11:57:27 microserver sshd[7024]: pam_unix(sshd:auth): authentication failure; l
2019-12-10 20:10:10
117.0.139.47 attackbotsspam
Brute force attempt
2019-12-10 20:32:21
216.99.112.252 attack
Host Scan
2019-12-10 19:59:43
171.103.59.90 attackbotsspam
Brute force attempt
2019-12-10 20:25:33
178.128.72.80 attackspambots
Dec  9 23:21:02 hanapaa sshd\[686\]: Invalid user vighneswar from 178.128.72.80
Dec  9 23:21:02 hanapaa sshd\[686\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.72.80
Dec  9 23:21:05 hanapaa sshd\[686\]: Failed password for invalid user vighneswar from 178.128.72.80 port 56818 ssh2
Dec  9 23:26:45 hanapaa sshd\[1344\]: Invalid user kimmerle from 178.128.72.80
Dec  9 23:26:45 hanapaa sshd\[1344\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.72.80
2019-12-10 20:19:43
185.175.93.102 attackbots
Unauthorized connection attempt detected from IP address 185.175.93.102 to port 3396
2019-12-10 20:05:29
104.168.44.143 attackbotsspam
Dec 10 01:53:55 hpm sshd\[17064\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.44.143  user=root
Dec 10 01:53:58 hpm sshd\[17064\]: Failed password for root from 104.168.44.143 port 34136 ssh2
Dec 10 02:01:01 hpm sshd\[17755\]: Invalid user Administrator from 104.168.44.143
Dec 10 02:01:01 hpm sshd\[17755\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.44.143
Dec 10 02:01:03 hpm sshd\[17755\]: Failed password for invalid user Administrator from 104.168.44.143 port 54488 ssh2
2019-12-10 20:05:03

最近上报的IP列表

45.132.29.180 172.237.103.201 125.122.33.106 113.141.84.48
121.199.174.53 164.90.181.221 185.226.197.75 164.92.160.210
157.230.30.169 165.154.245.177 113.95.141.80 158.172.26.137
138.99.215.140 39.170.51.205 14.212.107.156 45.194.70.25
110.177.183.119 220.167.180.19 20.64.105.127 10.4.229.66