必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Ashburn

省份(region): Virginia

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b'#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       54.224.0.0 - 54.255.255.255
CIDR:           54.224.0.0/11
NetName:        AMAZON-2011L
NetHandle:      NET-54-224-0-0-1
Parent:         NET54 (NET-54-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Amazon Technologies Inc. (AT-88-Z)
RegDate:        2012-03-01
Updated:        2021-02-10
Comment:        -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Ref:            https://rdap.arin.net/registry/ip/54.224.0.0



OrgName:        Amazon Technologies Inc.
OrgId:          AT-88-Z
Address:        410 Terry Ave N.
City:           Seattle
StateProv:      WA
PostalCode:     98109
Country:        US
RegDate:        2011-12-08
Updated:        2024-01-24
Comment:        All abuse reports MUST include:
Comment:        * src IP
Comment:        * dest IP (your IP)
Comment:        * dest port
Comment:        * Accurate date/timestamp and timezone of activity
Comment:        * Intensity/frequency (short log extracts)
Comment:        * Your contact details (phone and email) Without these we will be unable to identify the correct owner of the IP address at that point in time.
Ref:            https://rdap.arin.net/registry/entity/AT-88-Z


OrgNOCHandle: AANO1-ARIN
OrgNOCName:   Amazon AWS Network Operations
OrgNOCPhone:  +1-206-555-0000 
OrgNOCEmail:  amzn-noc-contact@amazon.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/AANO1-ARIN

OrgAbuseHandle: AEA8-ARIN
OrgAbuseName:   Amazon EC2 Abuse
OrgAbusePhone:  +1-206-555-0000 
OrgAbuseEmail:  trustandsafety@support.aws.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AEA8-ARIN

OrgTechHandle: ANO24-ARIN
OrgTechName:   Amazon EC2 Network Operations
OrgTechPhone:  +1-206-555-0000 
OrgTechEmail:  amzn-noc-contact@amazon.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ANO24-ARIN

OrgRoutingHandle: IPROU3-ARIN
OrgRoutingName:   IP Routing
OrgRoutingPhone:  +1-206-555-0000 
OrgRoutingEmail:  aws-routing-poc@amazon.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/IPROU3-ARIN

OrgRoutingHandle: ARMP-ARIN
OrgRoutingName:   AWS RPKI Management POC
OrgRoutingPhone:  +1-206-555-0000 
OrgRoutingEmail:  aws-rpki-routing-poc@amazon.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/ARMP-ARIN

# end


# start

NetRange:       54.234.0.0 - 54.235.255.255
CIDR:           54.234.0.0/15
NetName:        AMAZO-ZIAD2
NetHandle:      NET-54-234-0-0-1
Parent:         AMAZON-2011L (NET-54-224-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   Amazon.com, Inc. (AMAZO-4)
RegDate:        2012-11-30
Updated:        2012-11-30
Ref:            https://rdap.arin.net/registry/ip/54.234.0.0



OrgName:        Amazon.com, Inc.
OrgId:          AMAZO-4
Address:        Amazon Web Services, Inc.
Address:        P.O. Box 81226
City:           Seattle
StateProv:      WA
PostalCode:     98108-1226
Country:        US
RegDate:        2005-09-29
Updated:        2022-09-30
Comment:        For details of this service please see
Comment:        http://ec2.amazonaws.com
Ref:            https://rdap.arin.net/registry/entity/AMAZO-4


OrgRoutingHandle: ARMP-ARIN
OrgRoutingName:   AWS RPKI Management POC
OrgRoutingPhone:  +1-206-555-0000 
OrgRoutingEmail:  aws-rpki-routing-poc@amazon.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/ARMP-ARIN

OrgNOCHandle: AANO1-ARIN
OrgNOCName:   Amazon AWS Network Operations
OrgNOCPhone:  +1-206-555-0000 
OrgNOCEmail:  amzn-noc-contact@amazon.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/AANO1-ARIN

OrgRoutingHandle: IPROU3-ARIN
OrgRoutingName:   IP Routing
OrgRoutingPhone:  +1-206-555-0000 
OrgRoutingEmail:  aws-routing-poc@amazon.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/IPROU3-ARIN

OrgTechHandle: ANO24-ARIN
OrgTechName:   Amazon EC2 Network Operations
OrgTechPhone:  +1-206-555-0000 
OrgTechEmail:  amzn-noc-contact@amazon.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ANO24-ARIN

OrgAbuseHandle: AEA8-ARIN
OrgAbuseName:   Amazon EC2 Abuse
OrgAbusePhone:  +1-206-555-0000 
OrgAbuseEmail:  trustandsafety@support.aws.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AEA8-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#'
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.234.213.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2756
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;54.234.213.3.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025101700 1800 900 604800 86400

;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 17 21:31:10 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
3.213.234.54.in-addr.arpa domain name pointer ec2-54-234-213-3.compute-1.amazonaws.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
3.213.234.54.in-addr.arpa	name = ec2-54-234-213-3.compute-1.amazonaws.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
62.28.34.125 attackbotsspam
2019-12-16T05:33:00.720804shield sshd\[28332\]: Invalid user guest from 62.28.34.125 port 41670
2019-12-16T05:33:00.724994shield sshd\[28332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.28.34.125
2019-12-16T05:33:02.828630shield sshd\[28332\]: Failed password for invalid user guest from 62.28.34.125 port 41670 ssh2
2019-12-16T05:40:03.675184shield sshd\[30578\]: Invalid user sharai from 62.28.34.125 port 20201
2019-12-16T05:40:03.679931shield sshd\[30578\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.28.34.125
2019-12-16 13:41:51
182.72.124.6 attackbotsspam
2019-12-16T05:59:06.575703abusebot-4.cloudsearch.cf sshd\[29027\]: Invalid user www from 182.72.124.6 port 36928
2019-12-16T05:59:06.586658abusebot-4.cloudsearch.cf sshd\[29027\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.124.6
2019-12-16T05:59:09.012249abusebot-4.cloudsearch.cf sshd\[29027\]: Failed password for invalid user www from 182.72.124.6 port 36928 ssh2
2019-12-16T06:07:54.517358abusebot-4.cloudsearch.cf sshd\[29088\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.124.6  user=root
2019-12-16 14:08:49
78.57.162.165 attack
Dec 16 05:56:59 amit sshd\[28255\]: Invalid user odroid from 78.57.162.165
Dec 16 05:57:04 amit sshd\[28255\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.57.162.165
Dec 16 05:57:05 amit sshd\[28255\]: Failed password for invalid user odroid from 78.57.162.165 port 54476 ssh2
...
2019-12-16 13:45:19
188.36.143.199 attackbotsspam
TCP Port Scanning
2019-12-16 14:04:25
125.167.133.74 attack
1576472216 - 12/16/2019 05:56:56 Host: 125.167.133.74/125.167.133.74 Port: 445 TCP Blocked
2019-12-16 13:51:34
165.227.26.69 attackbotsspam
Dec 15 19:41:17 php1 sshd\[1083\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.26.69  user=root
Dec 15 19:41:20 php1 sshd\[1083\]: Failed password for root from 165.227.26.69 port 40958 ssh2
Dec 15 19:47:36 php1 sshd\[1700\]: Invalid user paulo from 165.227.26.69
Dec 15 19:47:36 php1 sshd\[1700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.26.69
Dec 15 19:47:38 php1 sshd\[1700\]: Failed password for invalid user paulo from 165.227.26.69 port 47618 ssh2
2019-12-16 13:53:26
167.172.120.191 attackspam
DATE:2019-12-16 05:56:29, IP:167.172.120.191, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-12-16 14:18:24
118.25.48.254 attackspambots
Unauthorized connection attempt detected from IP address 118.25.48.254 to port 22
2019-12-16 13:40:54
37.49.227.109 attackspambots
37.49.227.109 was recorded 10 times by 9 hosts attempting to connect to the following ports: 17185,3283. Incident counter (4h, 24h, all-time): 10, 39, 1243
2019-12-16 13:47:11
45.238.232.42 attackspambots
Dec 16 00:41:17 plusreed sshd[6972]: Invalid user audiberti from 45.238.232.42
...
2019-12-16 13:53:01
49.233.155.23 attackbots
Dec 16 05:44:27 ovpn sshd\[23694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.155.23  user=root
Dec 16 05:44:29 ovpn sshd\[23694\]: Failed password for root from 49.233.155.23 port 54334 ssh2
Dec 16 05:50:19 ovpn sshd\[25163\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.155.23  user=root
Dec 16 05:50:22 ovpn sshd\[25163\]: Failed password for root from 49.233.155.23 port 44848 ssh2
Dec 16 05:56:33 ovpn sshd\[26746\]: Invalid user ahile from 49.233.155.23
Dec 16 05:56:33 ovpn sshd\[26746\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.155.23
2019-12-16 14:15:32
181.115.156.59 attackspambots
Dec 16 07:07:35 ArkNodeAT sshd\[4012\]: Invalid user tin from 181.115.156.59
Dec 16 07:07:35 ArkNodeAT sshd\[4012\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.115.156.59
Dec 16 07:07:37 ArkNodeAT sshd\[4012\]: Failed password for invalid user tin from 181.115.156.59 port 43190 ssh2
2019-12-16 14:13:15
134.209.24.143 attack
2019-12-16T05:50:17.449644shield sshd\[2393\]: Invalid user puzman from 134.209.24.143 port 50006
2019-12-16T05:50:17.453599shield sshd\[2393\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.24.143
2019-12-16T05:50:19.588349shield sshd\[2393\]: Failed password for invalid user puzman from 134.209.24.143 port 50006 ssh2
2019-12-16T05:55:19.122233shield sshd\[4297\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.24.143  user=root
2019-12-16T05:55:20.715193shield sshd\[4297\]: Failed password for root from 134.209.24.143 port 55750 ssh2
2019-12-16 14:13:56
40.92.67.68 attack
Dec 16 07:56:45 debian-2gb-vpn-nbg1-1 kernel: [850575.890441] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.67.68 DST=78.46.192.101 LEN=52 TOS=0x02 PREC=0x00 TTL=110 ID=19980 DF PROTO=TCP SPT=19104 DPT=25 WINDOW=8192 RES=0x00 CWR ECE SYN URGP=0
2019-12-16 14:05:18
212.64.162.119 attackbots
Dec 16 04:51:24 web8 sshd\[22421\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.162.119  user=root
Dec 16 04:51:26 web8 sshd\[22421\]: Failed password for root from 212.64.162.119 port 46164 ssh2
Dec 16 04:57:07 web8 sshd\[25156\]: Invalid user submital from 212.64.162.119
Dec 16 04:57:07 web8 sshd\[25156\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.162.119
Dec 16 04:57:10 web8 sshd\[25156\]: Failed password for invalid user submital from 212.64.162.119 port 49938 ssh2
2019-12-16 13:42:25

最近上报的IP列表

50.19.130.104 18.205.163.9 13.222.214.52 61.81.179.225
5.188.167.245 20.46.245.69 38.93.205.89 79.236.177.248
23.106.143.45 162.248.73.168 45.62.103.85 180.94.62.142
180.94.62.243 180.94.62.31 83.166.105.154 154.201.67.72
42.236.17.66 201.26.150.209 216.231.33.123 5.225.207.25