必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Melbourne

省份(region): Victoria

国家(country): Australia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       52.224.0.0 - 52.255.255.255
CIDR:           52.224.0.0/11
NetName:        MSFT
NetHandle:      NET-52-224-0-0-1
Parent:         NET52 (NET-52-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Microsoft Corporation (MSFT)
RegDate:        2015-11-24
Updated:        2021-12-14
Ref:            https://rdap.arin.net/registry/ip/52.224.0.0



OrgName:        Microsoft Corporation
OrgId:          MSFT
Address:        One Microsoft Way
City:           Redmond
StateProv:      WA
PostalCode:     98052
Country:        US
RegDate:        1998-07-10
Updated:        2025-06-10
Comment:        To report suspected security issues specific to traffic emanating from Microsoft online services, including the distribution of malicious content or other illicit or illegal material through a Microsoft online service, please submit reports to:
Comment:        * https://cert.microsoft.com.  
Comment:        
Comment:        For SPAM and other abuse issues, such as Microsoft Accounts, please contact:
Comment:        * abuse@microsoft.com.  
Comment:        
Comment:        To report security vulnerabilities in Microsoft products and services, please contact:
Comment:        * secure@microsoft.com.  
Comment:        
Comment:        For legal and law enforcement-related requests, please contact:
Comment:        * msndcc@microsoft.com
Comment:        
Comment:        For routing, peering or DNS issues, please 
Comment:        contact:
Comment:        * IOC@microsoft.com
Ref:            https://rdap.arin.net/registry/entity/MSFT


OrgTechHandle: IPHOS5-ARIN
OrgTechName:   IPHostmaster, IPHostmaster 
OrgTechPhone:  +1-425-538-6637 
OrgTechEmail:  iphostmaster@microsoft.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPHOS5-ARIN

OrgTechHandle: BEDAR6-ARIN
OrgTechName:   Bedard, Dawn 
OrgTechPhone:  +1-425-538-6637 
OrgTechEmail:  dabedard@microsoft.com
OrgTechRef:    https://rdap.arin.net/registry/entity/BEDAR6-ARIN

OrgAbuseHandle: MAC74-ARIN
OrgAbuseName:   Microsoft Abuse Contact
OrgAbusePhone:  +1-425-882-8080 
OrgAbuseEmail:  abuse@microsoft.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/MAC74-ARIN

OrgRoutingHandle: CHATU3-ARIN
OrgRoutingName:   Chaturmohta, Somesh 
OrgRoutingPhone:  +1-425-882-8080 
OrgRoutingEmail:  someshch@microsoft.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/CHATU3-ARIN

OrgTechHandle: MRPD-ARIN
OrgTechName:   Microsoft Routing, Peering, and DNS
OrgTechPhone:  +1-425-882-8080 
OrgTechEmail:  IOC@microsoft.com
OrgTechRef:    https://rdap.arin.net/registry/entity/MRPD-ARIN

OrgTechHandle: SINGH683-ARIN
OrgTechName:   Singh, Prachi 
OrgTechPhone:  +1-425-707-5601 
OrgTechEmail:  pracsin@microsoft.com
OrgTechRef:    https://rdap.arin.net/registry/entity/SINGH683-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.255.41.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6710
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;52.255.41.213.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031602 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 17 13:00:59 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 213.41.255.52.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 213.41.255.52.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.132.1.52 attackspambots
Invalid user domingo from 185.132.1.52 port 45126
2020-06-20 15:02:24
213.230.73.193 attackspambots
Email rejected due to spam filtering
2020-06-20 15:29:53
72.221.232.144 attackspam
Dovecot Invalid User Login Attempt.
2020-06-20 14:57:39
187.188.90.141 attack
Jun 20 08:42:06 vps639187 sshd\[7424\]: Invalid user nagios from 187.188.90.141 port 43602
Jun 20 08:42:06 vps639187 sshd\[7424\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.188.90.141
Jun 20 08:42:08 vps639187 sshd\[7424\]: Failed password for invalid user nagios from 187.188.90.141 port 43602 ssh2
...
2020-06-20 15:09:33
173.196.146.66 attack
Jun 20 06:47:24 scw-focused-cartwright sshd[7293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.196.146.66
Jun 20 06:47:26 scw-focused-cartwright sshd[7293]: Failed password for invalid user santhosh from 173.196.146.66 port 45710 ssh2
2020-06-20 14:59:07
120.193.235.101 attack
Email rejected due to spam filtering
2020-06-20 15:10:53
140.143.196.66 attackspambots
Invalid user log from 140.143.196.66 port 47874
2020-06-20 15:27:20
51.79.42.128 attackbotsspam
" "
2020-06-20 15:31:47
93.126.33.89 attackbotsspam
Email rejected due to spam filtering
2020-06-20 15:22:29
188.213.173.52 attack
Invalid user ada from 188.213.173.52 port 50222
2020-06-20 14:55:58
46.105.31.249 attackspam
Jun 20 09:04:11 minden010 sshd[27942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.31.249
Jun 20 09:04:13 minden010 sshd[27942]: Failed password for invalid user git from 46.105.31.249 port 45870 ssh2
Jun 20 09:06:56 minden010 sshd[28907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.31.249
...
2020-06-20 15:24:58
125.161.116.126 attack
1592625130 - 06/20/2020 05:52:10 Host: 125.161.116.126/125.161.116.126 Port: 445 TCP Blocked
2020-06-20 15:16:04
182.61.130.51 attack
Jun 20 07:27:21 [host] sshd[11466]: Invalid user t
Jun 20 07:27:21 [host] sshd[11466]: pam_unix(sshd:
Jun 20 07:27:22 [host] sshd[11466]: Failed passwor
2020-06-20 15:02:52
73.211.224.178 attackbots
HTTP/80/443/8080 Probe, Hack -
2020-06-20 15:23:49
94.102.51.28 attack
Jun 20 09:04:26 debian-2gb-nbg1-2 kernel: \[14895351.576111\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=94.102.51.28 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=40569 PROTO=TCP SPT=42124 DPT=6457 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-20 15:16:57

最近上报的IP列表

198.18.0.14 34.116.184.202 35.166.75.253 20.253.66.3
101.67.49.39 62.60.131.176 81.20.32.84 159.223.155.62
60.16.197.79 34.61.82.184 182.119.229.226 10.90.31.73
20.14.73.168 103.214.5.133 41.110.4.106 69.10.48.159
177.10.64.192 115.214.90.185 171.35.235.209 56.246.19.182