必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Singapore

省份(region): unknown

国家(country): Singapore

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       52.192.0.0 - 52.223.191.255
CIDR:           52.192.0.0/12, 52.220.0.0/15, 52.208.0.0/13, 52.223.128.0/18, 52.216.0.0/14, 52.222.0.0/16, 52.223.0.0/17
NetName:        AT-88-Z
NetHandle:      NET-52-192-0-0-1
Parent:         NET52 (NET-52-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Amazon Technologies Inc. (AT-88-Z)
RegDate:        2015-09-02
Updated:        2020-09-24
Ref:            https://rdap.arin.net/registry/ip/52.192.0.0



OrgName:        Amazon Technologies Inc.
OrgId:          AT-88-Z
Address:        410 Terry Ave N.
City:           Seattle
StateProv:      WA
PostalCode:     98109
Country:        US
RegDate:        2011-12-08
Updated:        2024-01-24
Comment:        All abuse reports MUST include:
Comment:        * src IP
Comment:        * dest IP (your IP)
Comment:        * dest port
Comment:        * Accurate date/timestamp and timezone of activity
Comment:        * Intensity/frequency (short log extracts)
Comment:        * Your contact details (phone and email) Without these we will be unable to identify the correct owner of the IP address at that point in time.
Ref:            https://rdap.arin.net/registry/entity/AT-88-Z


OrgRoutingHandle: IPROU3-ARIN
OrgRoutingName:   IP Routing
OrgRoutingPhone:  +1-206-555-0000 
OrgRoutingEmail:  aws-routing-poc@amazon.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/IPROU3-ARIN

OrgRoutingHandle: ARMP-ARIN
OrgRoutingName:   AWS RPKI Management POC
OrgRoutingPhone:  +1-206-555-0000 
OrgRoutingEmail:  aws-rpki-routing-poc@amazon.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/ARMP-ARIN

OrgNOCHandle: AANO1-ARIN
OrgNOCName:   Amazon AWS Network Operations
OrgNOCPhone:  +1-206-555-0000 
OrgNOCEmail:  amzn-noc-contact@amazon.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/AANO1-ARIN

OrgAbuseHandle: AEA8-ARIN
OrgAbuseName:   Amazon EC2 Abuse
OrgAbusePhone:  +1-206-555-0000 
OrgAbuseEmail:  trustandsafety@support.aws.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AEA8-ARIN

OrgTechHandle: ANO24-ARIN
OrgTechName:   Amazon EC2 Network Operations
OrgTechPhone:  +1-206-555-0000 
OrgTechEmail:  amzn-noc-contact@amazon.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ANO24-ARIN

# end


# start

NetRange:       52.220.0.0 - 52.221.255.255
CIDR:           52.220.0.0/15
NetName:        AMAZON-SIN
NetHandle:      NET-52-220-0-0-1
Parent:         AT-88-Z (NET-52-192-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   Amazon Data Services Singapore (ADSS-3)
RegDate:        2015-12-10
Updated:        2015-12-10
Ref:            https://rdap.arin.net/registry/ip/52.220.0.0



OrgName:        Amazon Data Services Singapore
OrgId:          ADSS-3
Address:        Bedok Central Post Office
Address:        PO Box 482
City:           Singapore
StateProv:      
PostalCode:     049481
Country:        SG
RegDate:        2015-12-09
Updated:        2019-08-02
Ref:            https://rdap.arin.net/registry/entity/ADSS-3


OrgAbuseHandle: AEA8-ARIN
OrgAbuseName:   Amazon EC2 Abuse
OrgAbusePhone:  +1-206-555-0000 
OrgAbuseEmail:  trustandsafety@support.aws.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AEA8-ARIN

OrgTechHandle: ANO24-ARIN
OrgTechName:   Amazon EC2 Network Operations
OrgTechPhone:  +1-206-555-0000 
OrgTechEmail:  amzn-noc-contact@amazon.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ANO24-ARIN

OrgNOCHandle: AANO1-ARIN
OrgNOCName:   Amazon AWS Network Operations
OrgNOCPhone:  +1-206-555-0000 
OrgNOCEmail:  amzn-noc-contact@amazon.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/AANO1-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.221.198.51
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12362
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;52.221.198.51.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040802 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 09 10:36:36 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
51.198.221.52.in-addr.arpa domain name pointer ec2-52-221-198-51.ap-southeast-1.compute.amazonaws.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
51.198.221.52.in-addr.arpa	name = ec2-52-221-198-51.ap-southeast-1.compute.amazonaws.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
192.241.221.89 attackbots
firewall-block, port(s): 465/tcp
2020-02-22 04:56:48
81.175.247.212 attackbots
2020-02-20 20:25:51 server sshd[75087]: Failed password for invalid user HTTP from 81.175.247.212 port 44460 ssh2
2020-02-22 04:36:18
212.34.158.133 attack
---- Yambo Financials Fake Pharmacy ----
title: Canadian Pharmacy
category: fake pharmacy
owner: "Yambo Financials" Group
URL: http://newremedyeshop.ru
domain: newremedyeshop.ru
hosting: (IP address change frequently)
case 1: 
__ IP address: 212.34.158.133
__ IP location: Spain
__ hosting: Ran Networks S.l
__ web: https://ran.es/
__ abuse e-mail: alvaro@ran.es, info@ran.es, soporte@ran.es, lopd@ran.es
case 2: 
__ IP address: 159.148.186.238
__ IP location: Latvia
__ hosting: SIA Bighost.lv
__ web: http://www.latnet.eu
__ abuse e-mail: abuse@latnet.eu, iproute@latnet.eu, helpdesk@latnet.eu
case 3: 
__ IP address: 45.125.65.59
__ IP location: HongKong
__ hosting: Tele Asia Limited
__ web: https://www.tele-asia.net/
__ abuse e-mail: abuse@tele-asia.net, abusedept@tele-asia.net, supportdept@tele-asia.net
2020-02-22 04:41:09
14.160.119.210 attack
Lines containing failures of 14.160.119.210
Feb 21 14:05:46 ks3370873 sshd[24964]: Invalid user admin from 14.160.119.210 port 49400
Feb 21 14:05:46 ks3370873 sshd[24964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.160.119.210 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.160.119.210
2020-02-22 04:34:00
192.241.222.116 attackspam
GPL DNS named version attempt - port: 53 proto: UDP cat: Attempted Information Leak
2020-02-22 04:53:18
134.175.18.23 attack
Invalid user teamcity from 134.175.18.23 port 48148
2020-02-22 04:38:39
37.152.188.197 attack
Feb 21 18:20:25 mout sshd[30791]: Invalid user testftp from 37.152.188.197 port 45658
2020-02-22 04:24:15
101.37.244.107 attackbotsspam
Forbidden directory scan :: 2020/02/21 13:10:47 [error] 983#983: *1445370 access forbidden by rule, client: 101.37.244.107, server: [censored_2], request: "GET /license.txt HTTP/1.1", host: "[censored_2]", referrer: "http://[censored_2]/license.txt"
2020-02-22 04:45:58
192.241.218.22 attackspambots
TCP 3389 (RDP)
2020-02-22 04:57:09
80.89.75.209 attackbotsspam
20/2/21@08:10:41: FAIL: Alarm-Network address from=80.89.75.209
...
2020-02-22 04:48:27
156.96.157.101 attackbotsspam
Feb 20 13:22:51 epri-online auth: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=test@x
Feb 20 13:22:53 epri-online auth: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=test@x
Feb 20 13:23:01 epri-online auth: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=test@x
Feb 20 13:23:03 epri-online auth: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=test@x
Feb 20 13:23:15 epri-online auth: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=test@x
Feb 20 13:23:17 epri-online auth: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=test@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=156.96.157.101
2020-02-22 04:44:05
176.114.228.40 attackspambots
TCP src-port=47231   dst-port=25   Listed on   dnsbl-sorbs abuseat-org barracuda       (Project Honey Pot rated Suspicious)   (234)
2020-02-22 04:28:22
107.175.128.132 attack
20/2/21@09:01:23: FAIL: Alarm-Network address from=107.175.128.132
20/2/21@09:01:23: FAIL: Alarm-Network address from=107.175.128.132
...
2020-02-22 04:52:11
14.152.106.131 attack
ssh brute force
2020-02-22 04:33:04
112.166.3.98 attackspambots
suspicious action Fri, 21 Feb 2020 15:11:01 -0300
2020-02-22 04:52:59

最近上报的IP列表

98.99.252.254 60.102.192.49 35.98.193.42 161.192.39.209
143.43.126.85 2606:4700:10::6814:6170 121.230.89.148 2606:4700:10::6816:3382
2606:4700:10::ac43:1871 110.78.158.145 2606:4700:10::6814:7953 2606:4700:10::6814:4704
121.230.89.66 2606:4700:10::6816:288 245.110.253.73 149.90.87.141
183.36.35.205 178.104.79.68 54.197.196.44 6.113.106.237