必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Russia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '62.69.0.0 - 62.69.31.255'

% Abuse contact for '62.69.0.0 - 62.69.31.255' is 'abuse@kraft-s.ru'

inetnum:        62.69.0.0 - 62.69.31.255
org:            ORG-KjCs1-RIPE
netname:        RU-KRAFTS-20000706
admin-c:        KR5688-RIPE
tech-c:         KR5688-RIPE
country:        RU
status:         ALLOCATED PA
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         KRAFT-S-NOC
mnt-routes:     KRAFT-S-NOC
created:        2006-12-19T13:53:16Z
last-modified:  2016-10-05T09:06:44Z
source:         RIPE # Filtered

organisation:   ORG-KjCs1-RIPE
org-name:       Kraft-S LLC
country:        RU
org-type:       LIR
address:        room 2, Sadovaya str 156
address:        443041
address:        Samara
address:        RUSSIAN FEDERATION
phone:          +7 846 2427427
fax-no:         +7 846 2427427
admin-c:        AS13450-RIPE
admin-c:        VPA1-RIPE
mnt-ref:        KRAFT-S-NOC
mnt-ref:        RIPE-NCC-HM-MNT
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         KRAFT-S-NOC
abuse-c:        KR5688-RIPE
created:        2004-04-17T11:54:13Z
last-modified:  2020-12-16T13:03:39Z
source:         RIPE # Filtered

role:           Kraft-S LLC Contacts
address:        Kraft-S LLC
address:        156, Sadovaya str., 443041, Samara, Russia
phone:          +7 846 2427427
fax-no:         +7 846 2427427
remarks:        The fax works in an automatic mode only in a non working hours.
remarks:        In working hours it is necessary to ask operator to get a fax.
remarks:        -------------------------------------------------------------
remarks:        NOC working hours:
remarks:        10:00 - 18:00 SAMT (UTC+4) Mon Tue Wed Thu Fri
remarks:        +7 846 2427427 (business day; Russian language only)
remarks:        techsupport: +7 846 2476003 (24/7/365; Russian language only)
remarks:        Please use E-Mail if your need English language
remarks:        -------------------------------------------------------------
remarks:        Contact addresses by category:
remarks:        SPAM/UCE: abuse@kraft-s.ru
remarks:        Scans/Hacking attempts: security@kraft-s.ru
remarks:        Mail: postmaster@kraft-s.ru
remarks:        OTHER: noc@kraft-s.ru
remarks:        -------------------------------------------------------------
abuse-mailbox:  abuse@kraft-s.ru
admin-c:        VPA1-RIPE
admin-c:        AS13450-RIPE
tech-c:         AS13450-RIPE
nic-hdl:        KR5688-RIPE
mnt-by:         KRAFT-S-NOC
created:        1970-01-01T00:00:00Z
last-modified:  2016-10-05T09:40:32Z
source:         RIPE # Filtered

% Information related to '62.69.0.0/19AS13227'

route:          62.69.0.0/19
descr:          KRAFTSNET2
descr:          Commerce Network in Samara
descr:          Supported by Kraft-S LLC
origin:         AS13227
holes:          62.69.28.0/22
mnt-by:         KRAFT-S-NOC
created:        2007-03-02T06:23:31Z
last-modified:  2016-10-11T06:04:03Z
source:         RIPE # Filtered

% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 62.69.14.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31665
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;62.69.14.189.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041300 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 13 18:50:46 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
Host 189.14.69.62.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 189.14.69.62.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
27.128.229.22 attackbotsspam
Dec 25 17:25:15 srv-ubuntu-dev3 sshd[126809]: Invalid user steam from 27.128.229.22
Dec 25 17:25:15 srv-ubuntu-dev3 sshd[126809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.229.22
Dec 25 17:25:15 srv-ubuntu-dev3 sshd[126809]: Invalid user steam from 27.128.229.22
Dec 25 17:25:17 srv-ubuntu-dev3 sshd[126809]: Failed password for invalid user steam from 27.128.229.22 port 35096 ssh2
Dec 25 17:28:43 srv-ubuntu-dev3 sshd[127104]: Invalid user riaz from 27.128.229.22
Dec 25 17:28:43 srv-ubuntu-dev3 sshd[127104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.229.22
Dec 25 17:28:43 srv-ubuntu-dev3 sshd[127104]: Invalid user riaz from 27.128.229.22
Dec 25 17:28:45 srv-ubuntu-dev3 sshd[127104]: Failed password for invalid user riaz from 27.128.229.22 port 53804 ssh2
...
2019-12-26 04:39:50
222.127.97.91 attackspambots
Dec 25 14:37:35 plusreed sshd[25649]: Invalid user hilaga from 222.127.97.91
...
2019-12-26 04:57:47
94.153.175.14 attackspambots
SSH/22 MH Probe, BF, Hack -
2019-12-26 04:28:15
120.79.23.95 attack
HTTP/80/443 Probe, BF, WP, Hack -
2019-12-26 04:41:49
129.211.147.123 attackbotsspam
SSH Brute-Force reported by Fail2Ban
2019-12-26 04:49:14
148.215.18.103 attack
25.12.2019 19:52:44 SSH access blocked by firewall
2019-12-26 04:19:44
5.135.78.49 attackbots
SSH bruteforce (Triggered fail2ban)
2019-12-26 04:20:36
103.218.2.238 attackbots
Dec 25 13:03:44 *** sshd[1922]: Failed password for invalid user http from 103.218.2.238 port 35307 ssh2
Dec 25 13:15:44 *** sshd[2063]: Failed password for invalid user nfs from 103.218.2.238 port 50145 ssh2
Dec 25 13:18:54 *** sshd[2091]: Failed password for invalid user ching from 103.218.2.238 port 39910 ssh2
Dec 25 13:22:09 *** sshd[2119]: Failed password for invalid user sam from 103.218.2.238 port 57903 ssh2
Dec 25 13:23:44 *** sshd[2132]: Failed password for invalid user ftp from 103.218.2.238 port 38666 ssh2
Dec 25 13:25:20 *** sshd[2143]: Failed password for invalid user gierschick from 103.218.2.238 port 47665 ssh2
Dec 25 13:27:01 *** sshd[2162]: Failed password for invalid user pizzanelli from 103.218.2.238 port 56662 ssh2
Dec 25 13:28:46 *** sshd[2176]: Failed password for invalid user sinpn from 103.218.2.238 port 37428 ssh2
Dec 25 13:30:23 *** sshd[2186]: Failed password for invalid user massera from 103.218.2.238 port 46427 ssh2
Dec 25 13:32:00 *** sshd[2202]: Failed password for invalid user
2019-12-26 04:36:36
195.70.59.121 attack
Invalid user sefira from 195.70.59.121 port 57394
2019-12-26 04:29:45
180.107.54.27 attack
$f2bV_matches
2019-12-26 04:51:06
113.167.113.211 attackbots
1577285358 - 12/25/2019 15:49:18 Host: 113.167.113.211/113.167.113.211 Port: 445 TCP Blocked
2019-12-26 04:30:31
123.126.133.239 attack
" "
2019-12-26 04:22:11
92.23.94.93 attack
SSH/22 MH Probe, BF, Hack -
2019-12-26 04:56:36
159.65.9.28 attackbots
Invalid user xd from 159.65.9.28 port 50332
2019-12-26 04:38:59
222.185.235.186 attackbots
$f2bV_matches
2019-12-26 04:19:31

最近上报的IP列表

27.46.125.233 91.79.200.119 2606:4700:10::6816:3570 2606:4700:10::6814:9441
2606:4700:10::6814:6136 2606:4700:10::6816:3769 2606:4700:10::6814:7203 2606:4700:10::6814:9197
2606:4700:10::ac43:2034 2606:4700:10::6814:5073 2606:4700:10::6814:8100 2606:4700:10::6814:6510
2606:4700:10::6816:4405 23.94.144.250 149.235.247.67 66.132.186.166
2606:4700:10::6816:1513 2606:4700:10::6816:323 2606:4700:10::6814:6531 2606:4700:10::6814:5168