必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Luxembourg

省份(region): Canton de Luxembourg

国家(country): Luxembourg

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       64.89.160.0 - 64.89.163.255
CIDR:           64.89.160.0/22
NetName:        NETIFACE-NA1
NetHandle:      NET-64-89-160-0-1
Parent:         NET64 (NET-64-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Netiface America, Inc. (NA-520)
RegDate:        2026-01-13
Updated:        2026-01-13
Ref:            https://rdap.arin.net/registry/ip/64.89.160.0


OrgName:        Netiface America, Inc.
OrgId:          NA-520
Address:        124 City Road
City:           London
StateProv:      
PostalCode:     EC1V 2NX
Country:        GB
RegDate:        2024-12-29
Updated:        2026-03-23
Ref:            https://rdap.arin.net/registry/entity/NA-520


OrgTechHandle: ADMIN8922-ARIN
OrgTechName:   Administrator
OrgTechPhone:  +447872339334 
OrgTechEmail:  noc@miteflux.co.uk
OrgTechRef:    https://rdap.arin.net/registry/entity/ADMIN8922-ARIN

OrgAbuseHandle: ABUSE9563-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +447404814404 
OrgAbuseEmail:  abuse@miteflux.co.uk
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE9563-ARIN

# end


# start

NetRange:       64.89.160.0 - 64.89.161.255
CIDR:           64.89.160.0/23
NetName:        GHOSTY-NETWORKS-LU
NetHandle:      NET-64-89-160-0-2
Parent:         NETIFACE-NA1 (NET-64-89-160-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       Ghosty Networks LLC (C11486629)
RegDate:        2026-01-25
Updated:        2026-02-07
Comment:        Abuse: abuse@ghostynetworks.com
Comment:        Geofeed https://api.geofeed.space/a7283d0a-24e8-4744-8d7b-b5087cf20755/geofeed.csv
Ref:            https://rdap.arin.net/registry/ip/64.89.160.0


CustName:       Ghosty Networks LLC
Address:        12D Impasse Drosbach
City:           Luxembourg
StateProv:      Luxembourg
PostalCode:     L-1882
Country:        LU
RegDate:        2026-01-25
Updated:        2026-02-07
Ref:            https://rdap.arin.net/registry/entity/C11486629

OrgTechHandle: ADMIN8922-ARIN
OrgTechName:   Administrator
OrgTechPhone:  +447872339334 
OrgTechEmail:  noc@miteflux.co.uk
OrgTechRef:    https://rdap.arin.net/registry/entity/ADMIN8922-ARIN

OrgAbuseHandle: ABUSE9563-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +447404814404 
OrgAbuseEmail:  abuse@miteflux.co.uk
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE9563-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.89.160.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51442
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;64.89.160.82.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040600 1800 900 604800 86400

;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 07 01:00:04 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
Host 82.160.89.64.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 82.160.89.64.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
178.92.188.183 attack
Telnet/23 MH Probe, BF, Hack -
2020-01-09 21:40:44
188.166.68.8 attack
SSH bruteforce (Triggered fail2ban)
2020-01-09 21:15:29
156.219.54.233 attack
20/1/9@08:10:47: FAIL: Alarm-Intrusion address from=156.219.54.233
...
2020-01-09 21:41:07
222.186.180.142 attack
Jan  9 13:13:57 marvibiene sshd[18532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.142  user=root
Jan  9 13:13:59 marvibiene sshd[18532]: Failed password for root from 222.186.180.142 port 40313 ssh2
Jan  9 13:14:00 marvibiene sshd[18532]: Failed password for root from 222.186.180.142 port 40313 ssh2
Jan  9 13:13:57 marvibiene sshd[18532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.142  user=root
Jan  9 13:13:59 marvibiene sshd[18532]: Failed password for root from 222.186.180.142 port 40313 ssh2
Jan  9 13:14:00 marvibiene sshd[18532]: Failed password for root from 222.186.180.142 port 40313 ssh2
...
2020-01-09 21:15:03
134.48.5.250 attack
Jan  9 14:11:33 lakhesis sshd[31144]: Invalid user mlsmhostnameh from 134.48.5.250 port 52842
Jan  9 14:11:33 lakhesis sshd[31144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.48.5.250
Jan  9 14:11:35 lakhesis sshd[31144]: Failed password for invalid user mlsmhostnameh from 134.48.5.250 port 52842 ssh2
Jan  9 14:14:35 lakhesis sshd[32198]: Invalid user hta from 134.48.5.250 port 57002
Jan  9 14:14:35 lakhesis sshd[32198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.48.5.250

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=134.48.5.250
2020-01-09 21:44:17
159.192.98.3 attackbotsspam
Invalid user bje from 159.192.98.3 port 38882
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.192.98.3
Failed password for invalid user bje from 159.192.98.3 port 38882 ssh2
Invalid user sqlexec from 159.192.98.3 port 37106
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.192.98.3
2020-01-09 21:37:13
122.228.19.79 attack
Unauthorized connection attempt detected from IP address 122.228.19.79 to port 4022 [T]
2020-01-09 21:23:06
201.184.121.162 attack
20/1/9@08:11:12: FAIL: Alarm-Network address from=201.184.121.162
...
2020-01-09 21:18:37
192.228.100.118 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-09 21:31:22
177.73.148.71 attackbotsspam
Jan  9 13:01:41 ip-172-31-62-245 sshd\[12104\]: Invalid user user from 177.73.148.71\
Jan  9 13:01:43 ip-172-31-62-245 sshd\[12104\]: Failed password for invalid user user from 177.73.148.71 port 58372 ssh2\
Jan  9 13:06:10 ip-172-31-62-245 sshd\[12197\]: Failed password for sys from 177.73.148.71 port 34168 ssh2\
Jan  9 13:10:37 ip-172-31-62-245 sshd\[12335\]: Invalid user clouduser from 177.73.148.71\
Jan  9 13:10:39 ip-172-31-62-245 sshd\[12335\]: Failed password for invalid user clouduser from 177.73.148.71 port 38200 ssh2\
2020-01-09 21:46:30
151.80.144.39 attack
01/09/2020-08:34:04.845543 151.80.144.39 Protocol: 6 ET SCAN Potential SSH Scan
2020-01-09 21:34:31
66.143.231.89 attack
Jan  9 14:05:35 km20725 sshd\[11617\]: Invalid user aarstad from 66.143.231.89Jan  9 14:05:37 km20725 sshd\[11617\]: Failed password for invalid user aarstad from 66.143.231.89 port 59943 ssh2Jan  9 14:10:42 km20725 sshd\[12042\]: Invalid user ljv from 66.143.231.89Jan  9 14:10:44 km20725 sshd\[12042\]: Failed password for invalid user ljv from 66.143.231.89 port 45995 ssh2
...
2020-01-09 21:41:53
60.190.114.82 attack
Jan  9 10:10:39 ws24vmsma01 sshd[177417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.190.114.82
Jan  9 10:10:41 ws24vmsma01 sshd[177417]: Failed password for invalid user dyl from 60.190.114.82 port 54633 ssh2
...
2020-01-09 21:45:35
54.37.155.165 attackbotsspam
Jan  9 14:08:36 SilenceServices sshd[25036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.155.165
Jan  9 14:08:38 SilenceServices sshd[25036]: Failed password for invalid user adeliz from 54.37.155.165 port 37268 ssh2
Jan  9 14:10:56 SilenceServices sshd[26225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.155.165
2020-01-09 21:32:47
222.186.175.182 attack
Jan  9 14:11:15 markkoudstaal sshd[22815]: Failed password for root from 222.186.175.182 port 17990 ssh2
Jan  9 14:11:19 markkoudstaal sshd[22815]: Failed password for root from 222.186.175.182 port 17990 ssh2
Jan  9 14:11:22 markkoudstaal sshd[22815]: Failed password for root from 222.186.175.182 port 17990 ssh2
Jan  9 14:11:26 markkoudstaal sshd[22815]: Failed password for root from 222.186.175.182 port 17990 ssh2
2020-01-09 21:25:18

最近上报的IP列表

66.132.172.204 114.145.110.193 0.0.0.155 2606:4700:10::6814:5092
2606:4700:10::6816:4406 2606:4700:10::6814:8463 122.193.247.85 2606:4700:10::6814:7578
2606:4700:10::ac43:2507 2606:4700:10::ac43:1626 2606:4700:10::6814:5520 2606:4700:10::6816:800
35.233.40.58 45.199.224.63 211.188.60.100 122.192.203.142
2606:4700:10::6814:4427 2606:4700:10::6816:3647 2606:4700:10::ac43:2416 2606:4700:10::6814:5873