必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Luxembourg

省份(region): Canton de Luxembourg

国家(country): Luxembourg

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       64.89.160.0 - 64.89.163.255
CIDR:           64.89.160.0/22
NetName:        NETIFACE-NA1
NetHandle:      NET-64-89-160-0-1
Parent:         NET64 (NET-64-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Netiface America, Inc. (NA-520)
RegDate:        2026-01-13
Updated:        2026-01-13
Ref:            https://rdap.arin.net/registry/ip/64.89.160.0


OrgName:        Netiface America, Inc.
OrgId:          NA-520
Address:        124 City Road
City:           London
StateProv:      
PostalCode:     EC1V 2NX
Country:        GB
RegDate:        2024-12-29
Updated:        2026-03-23
Ref:            https://rdap.arin.net/registry/entity/NA-520


OrgAbuseHandle: ABUSE9563-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +447404814404 
OrgAbuseEmail:  abuse@miteflux.co.uk
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE9563-ARIN

OrgTechHandle: ADMIN8922-ARIN
OrgTechName:   Administrator
OrgTechPhone:  +447872339334 
OrgTechEmail:  noc@miteflux.co.uk
OrgTechRef:    https://rdap.arin.net/registry/entity/ADMIN8922-ARIN

# end


# start

NetRange:       64.89.160.0 - 64.89.161.255
CIDR:           64.89.160.0/23
NetName:        GHOSTY-NETWORKS-LU
NetHandle:      NET-64-89-160-0-2
Parent:         NETIFACE-NA1 (NET-64-89-160-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       Ghosty Networks LLC (C11486629)
RegDate:        2026-01-25
Updated:        2026-02-07
Comment:        Abuse: abuse@ghostynetworks.com
Comment:        Geofeed https://api.geofeed.space/a7283d0a-24e8-4744-8d7b-b5087cf20755/geofeed.csv
Ref:            https://rdap.arin.net/registry/ip/64.89.160.0


CustName:       Ghosty Networks LLC
Address:        12D Impasse Drosbach
City:           Luxembourg
StateProv:      Luxembourg
PostalCode:     L-1882
Country:        LU
RegDate:        2026-01-25
Updated:        2026-02-07
Ref:            https://rdap.arin.net/registry/entity/C11486629

OrgAbuseHandle: ABUSE9563-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +447404814404 
OrgAbuseEmail:  abuse@miteflux.co.uk
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE9563-ARIN

OrgTechHandle: ADMIN8922-ARIN
OrgTechName:   Administrator
OrgTechPhone:  +447872339334 
OrgTechEmail:  noc@miteflux.co.uk
OrgTechRef:    https://rdap.arin.net/registry/entity/ADMIN8922-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.89.160.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7104
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;64.89.160.132.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042600 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 27 00:30:02 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 132.160.89.64.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 132.160.89.64.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.88.100.17 attackspambots
Chat Spam
2020-05-25 12:55:15
117.91.186.55 attackspam
DATE:2020-05-25 05:55:37, IP:117.91.186.55, PORT:ssh SSH brute force auth (docker-dc)
2020-05-25 12:41:20
198.108.66.155 attackspambots
Port Scan detected!
...
2020-05-25 12:32:21
87.251.74.48 attack
IP blocked
2020-05-25 12:24:39
223.240.80.31 attackbots
2020-05-25T10:52:17.518174billing sshd[27645]: Failed password for invalid user admin from 223.240.80.31 port 34763 ssh2
2020-05-25T10:55:39.310220billing sshd[2948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.240.80.31  user=root
2020-05-25T10:55:41.196271billing sshd[2948]: Failed password for root from 223.240.80.31 port 60230 ssh2
...
2020-05-25 12:36:14
140.143.244.31 attackbotsspam
k+ssh-bruteforce
2020-05-25 13:02:04
121.229.2.136 attack
$f2bV_matches
2020-05-25 12:42:18
159.65.41.159 attackspam
2020-05-25T03:48:36.325041abusebot-5.cloudsearch.cf sshd[18747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.41.159  user=root
2020-05-25T03:48:38.472500abusebot-5.cloudsearch.cf sshd[18747]: Failed password for root from 159.65.41.159 port 38860 ssh2
2020-05-25T03:52:36.920751abusebot-5.cloudsearch.cf sshd[18805]: Invalid user sir from 159.65.41.159 port 51858
2020-05-25T03:52:36.926840abusebot-5.cloudsearch.cf sshd[18805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.41.159
2020-05-25T03:52:36.920751abusebot-5.cloudsearch.cf sshd[18805]: Invalid user sir from 159.65.41.159 port 51858
2020-05-25T03:52:39.023680abusebot-5.cloudsearch.cf sshd[18805]: Failed password for invalid user sir from 159.65.41.159 port 51858 ssh2
2020-05-25T03:55:51.713978abusebot-5.cloudsearch.cf sshd[18816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.41.159  u
...
2020-05-25 12:28:52
49.232.4.147 attackbotsspam
2020-05-25T06:53:22.092918afi-git.jinr.ru sshd[4050]: Failed password for root from 49.232.4.147 port 38030 ssh2
2020-05-25T06:55:49.801068afi-git.jinr.ru sshd[4611]: Invalid user geremk from 49.232.4.147 port 40016
2020-05-25T06:55:49.804331afi-git.jinr.ru sshd[4611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.4.147
2020-05-25T06:55:49.801068afi-git.jinr.ru sshd[4611]: Invalid user geremk from 49.232.4.147 port 40016
2020-05-25T06:55:52.061892afi-git.jinr.ru sshd[4611]: Failed password for invalid user geremk from 49.232.4.147 port 40016 ssh2
...
2020-05-25 12:30:11
188.172.120.122 attackbots
May 25 10:02:06 our-server-hostname sshd[23510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.172.120.122  user=r.r
May 25 10:02:09 our-server-hostname sshd[23510]: Failed password for r.r from 188.172.120.122 port 52934 ssh2
May 25 10:16:53 our-server-hostname sshd[27689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.172.120.122  user=r.r
May 25 10:16:56 our-server-hostname sshd[27689]: Failed password for r.r from 188.172.120.122 port 51534 ssh2
May 25 10:20:28 our-server-hostname sshd[28755]: Invalid user syslog from 188.172.120.122
May 25 10:20:28 our-server-hostname sshd[28755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.172.120.122 
May 25 10:20:30 our-server-hostname sshd[28755]: Failed password for invalid user syslog from 188.172.120.122 port 36178 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=188.172.
2020-05-25 12:56:55
106.12.222.60 attackspam
May 25 05:52:42 vps647732 sshd[11376]: Failed password for root from 106.12.222.60 port 39002 ssh2
...
2020-05-25 12:35:49
125.47.55.21 attack
Brute forcing RDP port 3389
2020-05-25 12:47:29
139.5.154.61 attackspam
05/24/2020-23:55:42.742000 139.5.154.61 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-25 12:37:03
206.174.214.90 attackbots
May 25 06:42:19 OPSO sshd\[7025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.174.214.90  user=root
May 25 06:42:21 OPSO sshd\[7025\]: Failed password for root from 206.174.214.90 port 39528 ssh2
May 25 06:46:04 OPSO sshd\[7731\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.174.214.90  user=root
May 25 06:46:06 OPSO sshd\[7731\]: Failed password for root from 206.174.214.90 port 45208 ssh2
May 25 06:49:46 OPSO sshd\[8094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.174.214.90  user=root
2020-05-25 12:52:40
211.213.198.139 attackbotsspam
May 25 06:33:38 abendstille sshd\[18949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.213.198.139  user=root
May 25 06:33:41 abendstille sshd\[18949\]: Failed password for root from 211.213.198.139 port 44742 ssh2
May 25 06:35:28 abendstille sshd\[20990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.213.198.139  user=root
May 25 06:35:29 abendstille sshd\[20990\]: Failed password for root from 211.213.198.139 port 40134 ssh2
May 25 06:37:20 abendstille sshd\[23080\]: Invalid user owen from 211.213.198.139
May 25 06:37:20 abendstille sshd\[23080\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.213.198.139
...
2020-05-25 12:40:59

最近上报的IP列表

103.25.103.252 175.150.7.80 20.111.57.15 203.88.204.212
38.248.95.254 104.236.111.168 2606:4700:10::6814:7181 66.132.172.34
66.132.195.32 2606:4700:10::6816:4323 165.227.34.92 64.83.37.245
158.97.29.115 49.128.204.83 2606:4700:10::6814:7134 211.63.128.185
147.185.132.110 2606:4700:10::6814:9191 107.120.35.147 142.181.200.48