必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Dolbeau-Mistassini

省份(region): Quebec

国家(country): Canada

运营商(isp): Videotron

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b'#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       66.130.0.0 - 66.131.255.255
CIDR:           66.130.0.0/15
NetName:        VL-9BL
NetHandle:      NET-66-130-0-0-1
Parent:         NET66 (NET-66-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Videotron Ltee (VL-421)
RegDate:        2001-06-05
Updated:        2020-10-08
Ref:            https://rdap.arin.net/registry/ip/66.130.0.0



OrgName:        Videotron Ltee
OrgId:          VL-421
Address:        150 Beaubien West
City:           Montreal
StateProv:      QC
PostalCode:     H2V 1C4
Country:        CA
RegDate:        2020-05-15
Updated:        2023-10-25
Comment:        https://www.videotron.com
Ref:            https://rdap.arin.net/registry/entity/VL-421


OrgTechHandle: NOC1226-ARIN
OrgTechName:   Network Operations Center
OrgTechPhone:  +1-514-380-7100 
OrgTechEmail:  SRIP@videotron.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC1226-ARIN

OrgAbuseHandle: ABUSE263-ARIN
OrgAbuseName:   Network Operations Center
OrgAbusePhone:  +1-514-281-8498 
OrgAbuseEmail:  abuse@videotron.ca
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE263-ARIN

# end


# start

NetRange:       66.131.120.0 - 66.131.120.255
CIDR:           66.131.120.0/24
NetName:        VL-DHCPVIDEOTRON-SF-42837800
NetHandle:      NET-66-131-120-0-1
Parent:         VL-9BL (NET-66-130-0-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       Videotron Ltee (C01765482)
RegDate:        2007-10-29
Updated:        2020-12-02
Ref:            https://rdap.arin.net/registry/ip/66.131.120.0


CustName:       Videotron Ltee
Address:        150 rue Beaubien Ouest
City:           Montreal
StateProv:      QC
PostalCode:     H2V 1C4
Country:        CA
RegDate:        2007-10-29
Updated:        2011-12-20
Ref:            https://rdap.arin.net/registry/entity/C01765482

OrgTechHandle: NOC1226-ARIN
OrgTechName:   Network Operations Center
OrgTechPhone:  +1-514-380-7100 
OrgTechEmail:  SRIP@videotron.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC1226-ARIN

OrgAbuseHandle: ABUSE263-ARIN
OrgAbuseName:   Network Operations Center
OrgAbusePhone:  +1-514-281-8498 
OrgAbuseEmail:  abuse@videotron.ca
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE263-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#'
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.131.120.255
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44389
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.131.120.255.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025101000 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 10 20:42:02 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
255.120.131.66.in-addr.arpa domain name pointer modemcable255.120-131-66.mc.videotron.ca.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
255.120.131.66.in-addr.arpa	name = modemcable255.120-131-66.mc.videotron.ca.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
190.201.207.133 attackbotsspam
Unauthorized connection attempt from IP address 190.201.207.133 on Port 445(SMB)
2020-05-28 08:13:13
82.221.139.190 attack
Tor exit node
2020-05-28 08:01:14
189.47.214.28 attackspam
2020-05-28T09:00:02.085311vivaldi2.tree2.info sshd[18351]: Failed password for invalid user bmike from 189.47.214.28 port 42750 ssh2
2020-05-28T09:04:06.189367vivaldi2.tree2.info sshd[18851]: Invalid user mary from 189.47.214.28
2020-05-28T09:04:06.202171vivaldi2.tree2.info sshd[18851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189-47-214-28.dsl.telesp.net.br
2020-05-28T09:04:06.189367vivaldi2.tree2.info sshd[18851]: Invalid user mary from 189.47.214.28
2020-05-28T09:04:08.135596vivaldi2.tree2.info sshd[18851]: Failed password for invalid user mary from 189.47.214.28 port 46782 ssh2
...
2020-05-28 08:08:53
187.210.165.130 attack
Unauthorized connection attempt from IP address 187.210.165.130 on Port 445(SMB)
2020-05-28 07:55:28
185.143.74.108 attack
May 28 05:55:54 relay postfix/smtpd\[13612\]: warning: unknown\[185.143.74.108\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 28 05:56:11 relay postfix/smtpd\[32515\]: warning: unknown\[185.143.74.108\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 28 05:57:30 relay postfix/smtpd\[30263\]: warning: unknown\[185.143.74.108\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 28 05:57:49 relay postfix/smtpd\[18234\]: warning: unknown\[185.143.74.108\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 28 05:59:05 relay postfix/smtpd\[30225\]: warning: unknown\[185.143.74.108\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-05-28 12:03:45
94.158.244.26 attackspam
Tor exit node
2020-05-28 07:50:20
173.213.86.131 attack
\[May 28 09:37:28\] NOTICE\[2019\] chan_sip.c: Registration from '\' failed for '173.213.86.131:51710' - Wrong password
\[May 28 09:37:29\] NOTICE\[2019\] chan_sip.c: Registration from '\' failed for '173.213.86.131:51950' - Wrong password
\[May 28 09:38:27\] NOTICE\[2019\] chan_sip.c: Registration from '\' failed for '173.213.86.131:64335' - Wrong password
\[May 28 09:38:28\] NOTICE\[2019\] chan_sip.c: Registration from '\' failed for '173.213.86.131:64513' - Wrong password
\[May 28 09:39:23\] NOTICE\[2019\] chan_sip.c: Registration from '\' failed for '173.213.86.131:59681' - Wrong password
\[May 28 09:39:32\] NOTICE\[2019\] chan_sip.c: Registration from '\' failed for '173.213.86.131:61296' - Wrong password
\[May 28 09:40:24\] NOTICE\[2019\] chan_sip.c: Registration from '\' fai
...
2020-05-28 07:54:11
60.251.110.25 attackbotsspam
Unauthorized connection attempt from IP address 60.251.110.25 on Port 445(SMB)
2020-05-28 08:04:09
123.211.196.246 attackspambots
Draytek Vigor Remote Command Execution Vulnerability
2020-05-28 08:06:41
191.241.242.10 attackbotsspam
Unauthorized connection attempt from IP address 191.241.242.10 on Port 445(SMB)
2020-05-28 08:14:34
164.132.42.32 attackspambots
Ssh brute force
2020-05-28 08:14:14
61.180.122.122 attackbotsspam
Web Attack: Zyxel NAS Command Injection CVE-2020-9054
2020-05-28 07:50:47
195.231.69.225 attackbotsspam
Unauthorized connection attempt from IP address 195.231.69.225 on Port 3389(RDP)
2020-05-28 08:00:18
90.143.200.103 attackspam
1590608017 - 05/27/2020 21:33:37 Host: 90.143.200.103/90.143.200.103 Port: 445 TCP Blocked
2020-05-28 08:02:00
37.79.203.244 attack
Unauthorized connection attempt from IP address 37.79.203.244 on Port 445(SMB)
2020-05-28 08:02:29

最近上报的IP列表

106.119.57.69 195.175.254.2 167.94.138.161 180.153.197.104
20.169.108.13 206.42.225.250 58.212.237.216 124.31.104.181
159.0.75.209 159.0.75.81 159.0.75.76 43.199.229.129
54.83.151.136 52.72.114.140 42.236.17.214 27.185.229.20
47.92.132.12 47.92.113.136 47.92.224.96 142.93.107.221