必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Ashburn

省份(region): Virginia

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       54.144.0.0 - 54.221.255.255
CIDR:           54.208.0.0/13, 54.192.0.0/12, 54.160.0.0/11, 54.220.0.0/15, 54.216.0.0/14, 54.144.0.0/12
NetName:        AMAZON
NetHandle:      NET-54-144-0-0-1
Parent:         NET54 (NET-54-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Amazon Technologies Inc. (AT-88-Z)
RegDate:        2014-10-23
Updated:        2021-02-10
Ref:            https://rdap.arin.net/registry/ip/54.144.0.0



OrgName:        Amazon Technologies Inc.
OrgId:          AT-88-Z
Address:        410 Terry Ave N.
City:           Seattle
StateProv:      WA
PostalCode:     98109
Country:        US
RegDate:        2011-12-08
Updated:        2024-01-24
Comment:        All abuse reports MUST include:
Comment:        * src IP
Comment:        * dest IP (your IP)
Comment:        * dest port
Comment:        * Accurate date/timestamp and timezone of activity
Comment:        * Intensity/frequency (short log extracts)
Comment:        * Your contact details (phone and email) Without these we will be unable to identify the correct owner of the IP address at that point in time.
Ref:            https://rdap.arin.net/registry/entity/AT-88-Z


OrgNOCHandle: AANO1-ARIN
OrgNOCName:   Amazon AWS Network Operations
OrgNOCPhone:  +1-206-555-0000 
OrgNOCEmail:  amzn-noc-contact@amazon.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/AANO1-ARIN

OrgAbuseHandle: AEA8-ARIN
OrgAbuseName:   Amazon EC2 Abuse
OrgAbusePhone:  +1-206-555-0000 
OrgAbuseEmail:  trustandsafety@support.aws.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AEA8-ARIN

OrgRoutingHandle: IPROU3-ARIN
OrgRoutingName:   IP Routing
OrgRoutingPhone:  +1-206-555-0000 
OrgRoutingEmail:  aws-routing-poc@amazon.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/IPROU3-ARIN

OrgRoutingHandle: ARMP-ARIN
OrgRoutingName:   AWS RPKI Management POC
OrgRoutingPhone:  +1-206-555-0000 
OrgRoutingEmail:  aws-rpki-routing-poc@amazon.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/ARMP-ARIN

OrgTechHandle: ANO24-ARIN
OrgTechName:   Amazon EC2 Network Operations
OrgTechPhone:  +1-206-555-0000 
OrgTechEmail:  amzn-noc-contact@amazon.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ANO24-ARIN

# end


# start

NetRange:       54.196.0.0 - 54.197.255.255
CIDR:           54.196.0.0/15
NetName:        AMAZO-ZIAD7
NetHandle:      NET-54-196-0-0-1
Parent:         AMAZON (NET-54-144-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   Amazon.com, Inc. (AMAZO-4)
RegDate:        2013-11-11
Updated:        2021-02-10
Ref:            https://rdap.arin.net/registry/ip/54.196.0.0



OrgName:        Amazon.com, Inc.
OrgId:          AMAZO-4
Address:        Amazon Web Services, Inc.
Address:        P.O. Box 81226
City:           Seattle
StateProv:      WA
PostalCode:     98108-1226
Country:        US
RegDate:        2005-09-29
Updated:        2022-09-30
Comment:        For details of this service please see
Comment:        http://ec2.amazonaws.com
Ref:            https://rdap.arin.net/registry/entity/AMAZO-4


OrgRoutingHandle: ARMP-ARIN
OrgRoutingName:   AWS RPKI Management POC
OrgRoutingPhone:  +1-206-555-0000 
OrgRoutingEmail:  aws-rpki-routing-poc@amazon.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/ARMP-ARIN

OrgNOCHandle: AANO1-ARIN
OrgNOCName:   Amazon AWS Network Operations
OrgNOCPhone:  +1-206-555-0000 
OrgNOCEmail:  amzn-noc-contact@amazon.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/AANO1-ARIN

OrgRoutingHandle: IPROU3-ARIN
OrgRoutingName:   IP Routing
OrgRoutingPhone:  +1-206-555-0000 
OrgRoutingEmail:  aws-routing-poc@amazon.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/IPROU3-ARIN

OrgAbuseHandle: AEA8-ARIN
OrgAbuseName:   Amazon EC2 Abuse
OrgAbusePhone:  +1-206-555-0000 
OrgAbuseEmail:  trustandsafety@support.aws.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AEA8-ARIN

OrgTechHandle: ANO24-ARIN
OrgTechName:   Amazon EC2 Network Operations
OrgTechPhone:  +1-206-555-0000 
OrgTechEmail:  amzn-noc-contact@amazon.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ANO24-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.196.33.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50869
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;54.196.33.20.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026012501 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 26 05:00:21 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
20.33.196.54.in-addr.arpa domain name pointer ec2-54-196-33-20.compute-1.amazonaws.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
20.33.196.54.in-addr.arpa	name = ec2-54-196-33-20.compute-1.amazonaws.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
37.252.188.130 attackspambots
$f2bV_matches
2020-09-11 00:05:18
198.98.60.164 attack
Sep 10 18:14:43 vm0 sshd[30825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.98.60.164
Sep 10 18:14:45 vm0 sshd[30825]: Failed password for invalid user ubnt from 198.98.60.164 port 63169 ssh2
...
2020-09-11 00:41:21
178.62.0.215 attackbotsspam
Sep 10 14:27:39 *** sshd[28162]: Invalid user pandavpnuser from 178.62.0.215
2020-09-11 00:05:32
123.207.19.105 attackspambots
$f2bV_matches
2020-09-11 00:30:20
45.14.150.86 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 24 - port: 1722 proto: tcp cat: Misc Attackbytes: 60
2020-09-11 00:44:59
106.13.165.247 attackbots
Failed password for root from 106.13.165.247 port 58012 ssh2
2020-09-11 00:48:32
91.103.248.23 attackbotsspam
(sshd) Failed SSH login from 91.103.248.23 (AM/Armenia/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 10 18:45:41 s1 sshd[22693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.103.248.23  user=root
Sep 10 18:45:43 s1 sshd[22693]: Failed password for root from 91.103.248.23 port 40038 ssh2
Sep 10 18:51:50 s1 sshd[23137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.103.248.23  user=root
Sep 10 18:51:52 s1 sshd[23137]: Failed password for root from 91.103.248.23 port 37800 ssh2
Sep 10 18:55:38 s1 sshd[23397]: Invalid user solr from 91.103.248.23 port 41228
2020-09-11 00:18:28
170.83.230.2 attackspam
...
2020-09-11 00:35:21
188.124.245.52 attack
445
2020-09-11 00:46:11
189.150.58.135 attackspambots
1599670356 - 09/09/2020 18:52:36 Host: 189.150.58.135/189.150.58.135 Port: 445 TCP Blocked
2020-09-11 00:26:10
49.235.215.147 attackbots
(sshd) Failed SSH login from 49.235.215.147 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  9 12:43:28 jbs1 sshd[15399]: Invalid user shop from 49.235.215.147
Sep  9 12:43:28 jbs1 sshd[15399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.215.147 
Sep  9 12:43:30 jbs1 sshd[15399]: Failed password for invalid user shop from 49.235.215.147 port 40544 ssh2
Sep  9 12:52:27 jbs1 sshd[18281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.215.147  user=root
Sep  9 12:52:29 jbs1 sshd[18281]: Failed password for root from 49.235.215.147 port 36210 ssh2
2020-09-11 00:23:20
68.170.67.122 attack
invalid user
2020-09-11 00:19:27
5.188.86.156 attackbotsspam
20 attempts against mh-misbehave-ban on ice
2020-09-11 00:24:07
51.254.205.6 attackbots
(sshd) Failed SSH login from 51.254.205.6 (FR/France/6.ip-51-254-205.eu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 10 10:29:46 server sshd[16617]: Failed password for root from 51.254.205.6 port 55246 ssh2
Sep 10 10:38:39 server sshd[18892]: Failed password for root from 51.254.205.6 port 53128 ssh2
Sep 10 10:43:19 server sshd[20094]: Failed password for root from 51.254.205.6 port 58742 ssh2
Sep 10 10:47:58 server sshd[21076]: Failed password for root from 51.254.205.6 port 36122 ssh2
Sep 10 10:52:19 server sshd[22233]: Failed password for root from 51.254.205.6 port 41736 ssh2
2020-09-11 00:51:24
191.217.170.33 attack
(sshd) Failed SSH login from 191.217.170.33 (BR/Brazil/191-217-170-33.user3p.brasiltelecom.net.br): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  9 17:53:08 optimus sshd[8353]: Invalid user jag from 191.217.170.33
Sep  9 17:53:11 optimus sshd[8353]: Failed password for invalid user jag from 191.217.170.33 port 33093 ssh2
Sep  9 17:58:01 optimus sshd[9859]: Failed password for root from 191.217.170.33 port 58016 ssh2
Sep  9 17:59:45 optimus sshd[10196]: Invalid user delmo from 191.217.170.33
Sep  9 17:59:47 optimus sshd[10196]: Failed password for invalid user delmo from 191.217.170.33 port 39469 ssh2
2020-09-11 00:49:56

最近上报的IP列表

223.244.8.41 172.208.24.40 150.255.109.232 204.12.215.54
77.83.39.69 39.108.149.232 223.104.42.140 111.201.247.66
54.224.229.32 162.216.149.66 180.153.236.156 180.153.236.134
87.152.151.129 65.2.19.185 3.85.125.1 18.215.232.158
3.249.187.155 61.228.229.69 91.196.152.231 91.196.152.225