必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Rockford

省份(region): Illinois

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       64.13.0.0 - 64.13.127.255
CIDR:           64.13.0.0/17
NetName:        T-FIBER
NetHandle:      NET-64-13-0-0-1
Parent:         NET64 (NET-64-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   T-Mobile USA, Inc. (TMOBI)
RegDate:        2005-05-03
Updated:        2024-06-18
Comment:        Geofeed https://raw.githubusercontent.com/tmobile/tmus-geofeed/main/tmus-geo-ip.txt
Ref:            https://rdap.arin.net/registry/ip/64.13.0.0



OrgName:        T-Mobile USA, Inc.
OrgId:          TMOBI
Address:        12920 SE 38th Street
City:           Bellevue
StateProv:      WA
PostalCode:     98006
Country:        US
RegDate:        2003-01-02
Updated:        2017-01-28
Ref:            https://rdap.arin.net/registry/entity/TMOBI


OrgTechHandle: DNSAD11-ARIN
OrgTechName:   DNS Administrators
OrgTechPhone:  +1-888-662-4662 
OrgTechEmail:  ARINtechcontact@t-mobile.com
OrgTechRef:    https://rdap.arin.net/registry/entity/DNSAD11-ARIN

OrgAbuseHandle: ABUSE4857-ARIN
OrgAbuseName:   abuse
OrgAbusePhone:  +1-888-662-4662 
OrgAbuseEmail:  abuse@t-mobile.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE4857-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.13.13.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12696
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;64.13.13.154.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040303 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 04 11:59:29 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
Host 154.13.13.64.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 64.13.13.154.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
134.209.211.184 attackspambots
WordPress login Brute force / Web App Attack on client site.
2019-06-26 18:59:28
68.183.50.149 attack
Jun 26 04:34:20 srv10 sshd[9974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.50.149
Jun 26 04:48:46 srv10 sshd[13583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.50.149
2019-06-26 19:10:24
107.170.202.101 attackbots
[portscan] tcp/119 [NNTP]
*(RWIN=65535)(06261032)
2019-06-26 18:39:51
223.71.139.97 attackspam
Jun 26 04:53:47 db sshd\[32286\]: Invalid user GardenUser from 223.71.139.97
Jun 26 04:53:47 db sshd\[32286\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.71.139.97 
Jun 26 04:53:49 db sshd\[32286\]: Failed password for invalid user GardenUser from 223.71.139.97 port 37438 ssh2
Jun 26 05:00:23 db sshd\[32359\]: Invalid user rao from 223.71.139.97
Jun 26 05:00:23 db sshd\[32359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.71.139.97 
...
2019-06-26 18:50:47
171.227.106.220 attackbotsspam
Unauthorized connection attempt from IP address 171.227.106.220 on Port 445(SMB)
2019-06-26 18:33:21
115.186.60.130 attackbotsspam
3389/tcp 3389/tcp 3389/tcp
[2019-06-26]3pkt
2019-06-26 19:06:21
14.181.254.206 attackbotsspam
445/tcp
[2019-06-26]1pkt
2019-06-26 19:04:34
184.105.247.206 attackspambots
firewall-block, port(s): 389/tcp
2019-06-26 18:31:58
192.95.22.240 attackspambots
WordPress login Brute force / Web App Attack on client site.
2019-06-26 19:08:00
89.68.160.211 attackbots
Jun 26 12:42:54 srv-4 sshd\[2755\]: Invalid user avis from 89.68.160.211
Jun 26 12:42:54 srv-4 sshd\[2755\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.68.160.211
Jun 26 12:42:56 srv-4 sshd\[2755\]: Failed password for invalid user avis from 89.68.160.211 port 37150 ssh2
...
2019-06-26 18:33:47
191.53.221.158 attackspambots
smtp auth brute force
2019-06-26 18:48:43
182.100.69.116 attack
2019-06-26T05:44:52.316355mail01 postfix/smtpd[25629]: warning: unknown[182.100.69.116]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-26T05:45:01.396055mail01 postfix/smtpd[9523]: warning: unknown[182.100.69.116]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-26T05:45:28.253476mail01 postfix/smtpd[31007]: warning: unknown[182.100.69.116]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-26 18:37:45
216.218.206.107 attackbots
3389BruteforceFW21
2019-06-26 18:45:40
198.245.50.81 attackbots
Jun 25 23:05:03 cac1d2 sshd\[20728\]: Invalid user bie from 198.245.50.81 port 48152
Jun 25 23:05:03 cac1d2 sshd\[20728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.50.81
Jun 25 23:05:05 cac1d2 sshd\[20728\]: Failed password for invalid user bie from 198.245.50.81 port 48152 ssh2
...
2019-06-26 18:31:08
113.116.224.204 attackbots
Jun 25 01:59:20 mail1 sshd[22808]: Invalid user durand from 113.116.224.204 port 54671
Jun 25 01:59:20 mail1 sshd[22808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.116.224.204
Jun 25 01:59:22 mail1 sshd[22808]: Failed password for invalid user durand from 113.116.224.204 port 54671 ssh2
Jun 25 01:59:22 mail1 sshd[22808]: Received disconnect from 113.116.224.204 port 54671:11: Bye Bye [preauth]
Jun 25 01:59:22 mail1 sshd[22808]: Disconnected from 113.116.224.204 port 54671 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.116.224.204
2019-06-26 19:02:14

最近上报的IP列表

128.210.47.106 156.225.19.35 238.2.75.140 109.162.246.158
2606:4700:10::ac43:1175 2606:4700:10::6814:7025 2606:4700:10::ac43:1117 2606:4700:10::ac43:2911
2606:4700:10::ac43:2548 2606:4700:10::6814:5739 2606:4700:10::6814:9278 2606:4700:10::6816:4633
2606:4700:10::6814:6922 2606:4700:10::6816:1940 2606:4700:10::ac43:775 2606:4700:10::6814:6700
2606:4700:10::6814:5322 2606:4700:10::6816:1142 188.222.91.7 128.199.8.140