必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       64.139.0.0 - 64.139.63.255
CIDR:           64.139.0.0/18
NetName:        MEGAPATH-BLK-7
NetHandle:      NET-64-139-0-0-1
Parent:         NET64 (NET-64-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   GTT Americas, LLC (GAL-104)
RegDate:        2000-08-03
Updated:        2025-05-07
Ref:            https://rdap.arin.net/registry/ip/64.139.0.0


OrgName:        GTT Americas, LLC
OrgId:          GAL-104
Address:        4201 Wilson Blvd -Suite 504
City:           Arlington
StateProv:      VA
PostalCode:     22203
Country:        US
RegDate:        2025-02-11
Updated:        2025-07-08
Ref:            https://rdap.arin.net/registry/entity/GAL-104


OrgAbuseHandle: GAD46-ARIN
OrgAbuseName:   GTT Abuse Department
OrgAbusePhone:  +1-703-442-5500 
OrgAbuseEmail:  abuse@gtt.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/GAD46-ARIN

OrgTechHandle: GLD5-ARIN
OrgTechName:   GTT Legal Departement
OrgTechPhone:  +359886606 
OrgTechEmail:  alexander.mutafchiyski@gtt.net
OrgTechRef:    https://rdap.arin.net/registry/entity/GLD5-ARIN

OrgNOCHandle: GNOC16-ARIN
OrgNOCName:   GTT Network Operations Center
OrgNOCPhone:  +1-703-442-5500 
OrgNOCEmail:  noc@gtt.net
OrgNOCRef:    https://rdap.arin.net/registry/entity/GNOC16-ARIN

OrgTechHandle: GIT5-ARIN
OrgTechName:   GTT IPAM Team
OrgTechPhone:  +1-703-442-5500 
OrgTechEmail:  netguard@gtt.net
OrgTechRef:    https://rdap.arin.net/registry/entity/GIT5-ARIN

OrgTechHandle: AS3251-ARIN
OrgTechName:   AS3257 Netguard
OrgTechPhone:  +49 69 48007422 
OrgTechEmail:  netguard@gtt.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AS3251-ARIN

# end


# start

NetRange:       64.139.13.0 - 64.139.13.255
CIDR:           64.139.13.0/24
NetName:        GTT-ARISK-NET
NetHandle:      NET-64-139-13-0-1
Parent:         MEGAPATH-BLK-7 (NET-64-139-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   Arisk Communications inc. (AC-5396)
RegDate:        2025-10-27
Updated:        2025-10-27
Ref:            https://rdap.arin.net/registry/ip/64.139.13.0


OrgName:        Arisk Communications inc.
OrgId:          AC-5396
Address:        350 NORTHERN BLVD STE 324 -1331 ALBANY NY 12204-1000
City:           ALBANY
StateProv:      NY
PostalCode:     12204
Country:        US
RegDate:        2024-06-28
Updated:        2024-07-03
Ref:            https://rdap.arin.net/registry/entity/AC-5396

ReferralServer:  rwhois://rwhois.ariskisp.com:4321

OrgAbuseHandle: WILSO1903-ARIN
OrgAbuseName:   Wilson
OrgAbusePhone:  +1-518-512-9230 
OrgAbuseEmail:  support@ariskisp.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/WILSO1903-ARIN

OrgTechHandle: WILSO1903-ARIN
OrgTechName:   Wilson
OrgTechPhone:  +1-518-512-9230 
OrgTechEmail:  support@ariskisp.com
OrgTechRef:    https://rdap.arin.net/registry/entity/WILSO1903-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.ariskisp.com:4321.
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.139.13.171
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21804
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;64.139.13.171.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025110500 1800 900 604800 86400

;; Query time: 244 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Nov 05 21:15:15 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
171.13.139.64.in-addr.arpa domain name pointer ip-64-139-13-171.dsl.sca.megapath.net.
NSLOOKUP信息:
b'171.13.139.64.in-addr.arpa	name = ip-64-139-13-171.dsl.sca.megapath.net.

Authoritative answers can be found from:

'
相关IP信息:
最新评论:
IP 类型 评论内容 时间
50.255.64.233 attackbots
May 30 14:08:14 vps639187 sshd\[20921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.255.64.233  user=root
May 30 14:08:17 vps639187 sshd\[20921\]: Failed password for root from 50.255.64.233 port 53664 ssh2
May 30 14:12:10 vps639187 sshd\[21008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.255.64.233  user=root
...
2020-05-30 23:16:10
140.246.184.210 attackbotsspam
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-05-30 23:04:36
106.13.39.34 attack
May 30 23:17:03 localhost sshd[3351677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.39.34  user=root
May 30 23:17:05 localhost sshd[3351677]: Failed password for root from 106.13.39.34 port 35520 ssh2
...
2020-05-30 22:41:01
144.217.242.247 attackspambots
SSH Brute-Forcing (server1)
2020-05-30 23:00:36
117.192.110.237 attackspambots
php WP PHPmyadamin ABUSE blocked for 12h
2020-05-30 22:40:48
84.54.85.18 attackbots
Email rejected due to spam filtering
2020-05-30 22:51:52
140.143.226.19 attackspambots
May 30 15:05:38 santamaria sshd\[27975\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.226.19  user=root
May 30 15:05:40 santamaria sshd\[27975\]: Failed password for root from 140.143.226.19 port 37804 ssh2
May 30 15:08:01 santamaria sshd\[28007\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.226.19  user=root
...
2020-05-30 22:45:48
66.249.70.9 attackbots
Automatic report - Banned IP Access
2020-05-30 23:24:50
190.109.170.105 attack
proto=tcp  .  spt=53917  .  dpt=25  .     Listed on    dnsbl-sorbs plus abuseat-org and barracuda     (76)
2020-05-30 23:18:32
185.234.216.206 attackspam
May 30 15:38:35 srv01 postfix/smtpd\[26452\]: warning: unknown\[185.234.216.206\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 30 15:38:42 srv01 postfix/smtpd\[26441\]: warning: unknown\[185.234.216.206\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 30 15:38:53 srv01 postfix/smtpd\[26452\]: warning: unknown\[185.234.216.206\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 30 15:39:08 srv01 postfix/smtpd\[13286\]: warning: unknown\[185.234.216.206\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 30 15:39:15 srv01 postfix/smtpd\[26441\]: warning: unknown\[185.234.216.206\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-05-30 23:19:01
211.252.85.17 attackspambots
2020-05-30T14:08:24.141976randservbullet-proofcloud-66.localdomain sshd[1873]: Invalid user garry from 211.252.85.17 port 39978
2020-05-30T14:08:24.146036randservbullet-proofcloud-66.localdomain sshd[1873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.252.85.17
2020-05-30T14:08:24.141976randservbullet-proofcloud-66.localdomain sshd[1873]: Invalid user garry from 211.252.85.17 port 39978
2020-05-30T14:08:26.300925randservbullet-proofcloud-66.localdomain sshd[1873]: Failed password for invalid user garry from 211.252.85.17 port 39978 ssh2
...
2020-05-30 23:13:33
176.60.70.85 attack
Email rejected due to spam filtering
2020-05-30 23:09:19
218.92.0.165 attack
May 30 16:34:19 amit sshd\[18080\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.165  user=root
May 30 16:34:21 amit sshd\[18080\]: Failed password for root from 218.92.0.165 port 10584 ssh2
May 30 16:34:44 amit sshd\[18082\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.165  user=root
...
2020-05-30 22:45:30
222.186.175.167 attackbotsspam
May 30 17:15:48 eventyay sshd[22230]: Failed password for root from 222.186.175.167 port 1396 ssh2
May 30 17:15:51 eventyay sshd[22230]: Failed password for root from 222.186.175.167 port 1396 ssh2
May 30 17:15:55 eventyay sshd[22230]: Failed password for root from 222.186.175.167 port 1396 ssh2
May 30 17:16:01 eventyay sshd[22230]: error: maximum authentication attempts exceeded for root from 222.186.175.167 port 1396 ssh2 [preauth]
...
2020-05-30 23:23:35
146.164.51.58 attackbotsspam
$f2bV_matches
2020-05-30 22:44:06

最近上报的IP列表

192.168.11.99 102.168.11.99 34.77.191.38 102.129.165.86
49.65.120.13 61.179.178.103 42.239.183.99 42.234.43.72
42.234.196.236 39.190.132.80 36.159.176.39 223.88.63.62
211.156.80.139 183.253.146.200 183.241.182.186 183.198.193.57
175.44.80.169 135.237.126.195 120.243.114.199 120.230.23.102