必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       48.0.0.0 - 48.43.255.255
CIDR:           48.32.0.0/13, 48.40.0.0/14, 48.0.0.0/11
NetName:        PRU48
NetHandle:      NET-48-0-0-0-1
Parent:         NET48 (NET-48-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   The Prudential Insurance Company of America (PICA-3-Z)
RegDate:        1990-12-07
Updated:        2025-12-10
Ref:            https://rdap.arin.net/registry/ip/48.0.0.0


OrgName:        The Prudential Insurance Company of America
OrgId:          PICA-3-Z
Address:        751 Broad Street
City:           Newark
StateProv:      NJ
PostalCode:     07102-3777
Country:        US
RegDate:        2008-02-29
Updated:        2008-05-23
Ref:            https://rdap.arin.net/registry/entity/PICA-3-Z


OrgTechHandle: NETWO2262-ARIN
OrgTechName:   Network Administrator
OrgTechPhone:  +1-973-716-5051 
OrgTechEmail:  net48admin@prudential.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NETWO2262-ARIN

OrgAbuseHandle: NETWO2262-ARIN
OrgAbuseName:   Network Administrator
OrgAbusePhone:  +1-973-716-5051 
OrgAbuseEmail:  net48admin@prudential.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/NETWO2262-ARIN

OrgNOCHandle: NETWO2262-ARIN
OrgNOCName:   Network Administrator
OrgNOCPhone:  +1-973-716-5051 
OrgNOCEmail:  net48admin@prudential.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/NETWO2262-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.31.92.98
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35601
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.31.92.98.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026033002 1800 900 604800 86400

;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 31 06:59:46 CST 2026
;; MSG SIZE  rcvd: 104
HOST信息:
Host 98.92.31.48.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 98.92.31.48.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
212.129.24.77 attackbots
firewall-block, port(s): 5060/udp
2019-10-22 00:50:54
196.171.148.54 attackspam
PHI,WP GET /wp-login.php
2019-10-22 00:36:24
61.170.178.17 attack
SSH Scan
2019-10-22 00:32:09
162.241.178.219 attackspam
(sshd) Failed SSH login from 162.241.178.219 (server.multixservices.net): 5 in the last 3600 secs
2019-10-22 00:10:39
139.162.120.98 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-22 00:27:17
185.156.73.11 attackspam
Port scan on 10 port(s): 41455 41456 41457 41845 46465 46466 46467 57676 57677 57678
2019-10-22 00:23:06
51.68.189.69 attackbotsspam
Oct 21 11:40:36 *** sshd[12295]: User root from 51.68.189.69 not allowed because not listed in AllowUsers
2019-10-22 00:33:10
146.88.240.2 attackbots
firewall-block, port(s): 88/udp, 443/udp, 17185/udp, 27016/udp, 45211/udp
2019-10-22 00:25:13
91.121.183.61 attackbots
Oct 21 18:44:20 mail sshd[5090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.183.61  user=root
Oct 21 18:44:22 mail sshd[5090]: Failed password for root from 91.121.183.61 port 46318 ssh2
Oct 21 18:45:21 mail sshd[6645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.183.61  user=root
Oct 21 18:45:24 mail sshd[6645]: Failed password for root from 91.121.183.61 port 44512 ssh2
Oct 21 18:46:57 mail sshd[8650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.183.61  user=root
Oct 21 18:46:59 mail sshd[8650]: Failed password for root from 91.121.183.61 port 57275 ssh2
...
2019-10-22 00:48:44
77.247.110.173 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 67 - port: 14774 proto: TCP cat: Misc Attack
2019-10-22 00:48:15
37.59.110.165 attack
Oct 21 15:44:23 SilenceServices sshd[27555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.110.165
Oct 21 15:44:25 SilenceServices sshd[27555]: Failed password for invalid user jhksdfsdg from 37.59.110.165 port 46140 ssh2
Oct 21 15:48:09 SilenceServices sshd[28537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.110.165
2019-10-22 00:40:48
118.89.62.112 attackspambots
2019-10-21T15:35:30.111925abusebot-5.cloudsearch.cf sshd\[6289\]: Invalid user grandpa from 118.89.62.112 port 45532
2019-10-21T15:35:30.115846abusebot-5.cloudsearch.cf sshd\[6289\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.62.112
2019-10-22 00:10:09
50.239.143.100 attackbots
Oct 21 17:30:35 cvbnet sshd[7250]: Failed password for root from 50.239.143.100 port 40350 ssh2
...
2019-10-22 00:29:56
200.209.174.76 attackbotsspam
Oct 21 18:06:30 legacy sshd[23750]: Failed password for root from 200.209.174.76 port 45438 ssh2
Oct 21 18:11:14 legacy sshd[23863]: Failed password for root from 200.209.174.76 port 34288 ssh2
...
2019-10-22 00:21:37
139.59.56.121 attackbots
$f2bV_matches
2019-10-22 00:14:55

最近上报的IP列表

64.91.248.158 109.162.246.96 2606:4700:10::6814:6812 2606:4700:10::6816:1102
2606:4700:10::ac43:247e 2606:4700:10::6816:3189 2606:4700:10::6814:4495 2606:4700:10::6816:1762
121.237.149.177 97.183.135.47 74.235.238.88 217.104.148.89
134.35.157.154 2606:4700:10::6814:5152 2606:4700:10::6816:429d 2606:4700:10::ac43:1289
2606:4700:10::6814:7940 2606:4700:10::6816:3606 2606:4700:10::ac43:2919 121.230.89.50