必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Frankfurt am Main

省份(region): Hessen

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       64.89.160.0 - 64.89.163.255
CIDR:           64.89.160.0/22
NetName:        NETIFACE-NA1
NetHandle:      NET-64-89-160-0-1
Parent:         NET64 (NET-64-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Netiface America, Inc. (NA-520)
RegDate:        2026-01-13
Updated:        2026-01-13
Ref:            https://rdap.arin.net/registry/ip/64.89.160.0


OrgName:        Netiface America, Inc.
OrgId:          NA-520
Address:        124 City Road
City:           London
StateProv:      
PostalCode:     EC1V 2NX
Country:        GB
RegDate:        2024-12-29
Updated:        2026-03-23
Ref:            https://rdap.arin.net/registry/entity/NA-520


OrgAbuseHandle: ABUSE9563-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +447404814404 
OrgAbuseEmail:  abuse@miteflux.co.uk
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE9563-ARIN

OrgTechHandle: ADMIN8922-ARIN
OrgTechName:   Administrator
OrgTechPhone:  +447872339334 
OrgTechEmail:  noc@miteflux.co.uk
OrgTechRef:    https://rdap.arin.net/registry/entity/ADMIN8922-ARIN

# end


# start

NetRange:       64.89.163.0 - 64.89.163.255
CIDR:           64.89.163.0/24
NetName:        MEOWCORE
NetHandle:      NET-64-89-163-0-1
Parent:         NETIFACE-NA1 (NET-64-89-160-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       Meowcore Softworks LLC (C11476912)
RegDate:        2026-01-14
Updated:        2026-02-07
Comment:        Geofeed https://api.geofeed.space/5dc8415b-82d7-4883-9570-6927f213a76e/geofeed.csv
Ref:            https://rdap.arin.net/registry/ip/64.89.163.0


CustName:       Meowcore Softworks LLC
Address:        Robert-Bosch-Strasse 25
City:           Langen
StateProv:      
PostalCode:     
Country:        DE
RegDate:        2026-01-14
Updated:        2026-02-07
Ref:            https://rdap.arin.net/registry/entity/C11476912

OrgAbuseHandle: ABUSE9563-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +447404814404 
OrgAbuseEmail:  abuse@miteflux.co.uk
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE9563-ARIN

OrgTechHandle: ADMIN8922-ARIN
OrgTechName:   Administrator
OrgTechPhone:  +447872339334 
OrgTechEmail:  noc@miteflux.co.uk
OrgTechRef:    https://rdap.arin.net/registry/entity/ADMIN8922-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.89.163.73
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57559
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;64.89.163.73.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041200 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 12 23:30:17 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
Host 73.163.89.64.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 73.163.89.64.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.12.47.216 attack
Jan  3 23:44:20 legacy sshd[16355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.47.216
Jan  3 23:44:23 legacy sshd[16355]: Failed password for invalid user mqm from 106.12.47.216 port 43470 ssh2
Jan  3 23:47:58 legacy sshd[16500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.47.216
...
2020-01-04 07:18:14
111.175.57.27 attack
Unauthorized connection attempt detected from IP address 111.175.57.27 to port 8899
2020-01-04 07:45:59
5.239.14.233 attack
Jan  3 22:12:13 vbuntu sshd[18471]: refused connect from 5.239.14.233 (5.239.14.233)
Jan  3 22:16:44 vbuntu sshd[18541]: refused connect from 5.239.14.233 (5.239.14.233)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=5.239.14.233
2020-01-04 07:37:16
185.209.0.32 attackspambots
01/03/2020-17:37:11.152189 185.209.0.32 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-01-04 07:25:24
179.104.42.21 attack
Brute force SMTP login attempts.
2020-01-04 07:39:24
42.237.24.216 attackspambots
23/tcp
[2020-01-03]1pkt
2020-01-04 07:47:38
172.105.89.161 attackbotsspam
firewall-block, port(s): 2137/tcp
2020-01-04 07:17:22
66.249.79.174 attack
66.249.79.174 - - \[04/Jan/2020:05:22:21 +0800\] "GET /admin_UploadDataHandler.ashx HTTP/1.1" 404 38266 "-" "Mozilla/5.0 \(Linux\; Android 6.0.1\; Nexus 5X Build/MMB29P\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/41.0.2272.96 Mobile Safari/537.36 \(compatible\; Googlebot/2.1\; +http://www.google.com/bot.html\)"
2020-01-04 07:10:19
222.186.175.215 attackbots
Jan  4 00:14:55 amit sshd\[8097\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215  user=root
Jan  4 00:14:57 amit sshd\[8097\]: Failed password for root from 222.186.175.215 port 42862 ssh2
Jan  4 00:15:01 amit sshd\[8097\]: Failed password for root from 222.186.175.215 port 42862 ssh2
...
2020-01-04 07:15:28
197.47.198.126 attack
Trying ports that it shouldn't be.
2020-01-04 07:21:33
190.41.192.92 attackspam
SSH/22 MH Probe, BF, Hack -
2020-01-04 07:24:39
31.222.195.30 attack
2020-01-04T00:21:10.184922scmdmz1 sshd[30989]: Invalid user sqw from 31.222.195.30 port 8490
2020-01-04T00:21:10.187484scmdmz1 sshd[30989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.222.195.30
2020-01-04T00:21:10.184922scmdmz1 sshd[30989]: Invalid user sqw from 31.222.195.30 port 8490
2020-01-04T00:21:12.274462scmdmz1 sshd[30989]: Failed password for invalid user sqw from 31.222.195.30 port 8490 ssh2
2020-01-04T00:22:32.524467scmdmz1 sshd[31093]: Invalid user demo from 31.222.195.30 port 50327
...
2020-01-04 07:32:56
223.149.4.244 attackspam
Unauthorized connection attempt detected from IP address 223.149.4.244 to port 8080
2020-01-04 07:40:13
121.200.60.28 attack
failed_logins
2020-01-04 07:31:38
80.82.78.100 attack
80.82.78.100 was recorded 14 times by 7 hosts attempting to connect to the following ports: 1055,1060,1067. Incident counter (4h, 24h, all-time): 14, 85, 14693
2020-01-04 07:18:46

最近上报的IP列表

119.144.188.219 39.98.52.90 179.60.56.43 255.156.172.116
35.157.159.246 45.140.222.140 106.120.4.114 2606:4700:10::6816:4648
110.77.187.164 14.207.194.19 2606:4700:10::6814:6903 2606:4700:10::6816:2489
2606:4700:10::6816:2676 143.9.198.228 3.216.51.244 77.147.136.67
53.101.224.204 41.85.217.172 44.39.60.21 33.93.15.248