必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): New York City

省份(region): New York

国家(country): United States

运营商(isp): Softcom Internet Communications, Inc

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       72.13.224.0 - 72.13.255.255
CIDR:           72.13.224.0/19
NetName:        TRANSBEAM
NetHandle:      NET-72-13-224-0-1
Parent:         NET72 (NET-72-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   GTT Americas, LLC (GAL-104)
RegDate:        2004-11-16
Updated:        2025-05-07
Ref:            https://rdap.arin.net/registry/ip/72.13.224.0


OrgName:        GTT Americas, LLC
OrgId:          GAL-104
Address:        4201 Wilson Blvd -Suite 504
City:           Arlington
StateProv:      VA
PostalCode:     22203
Country:        US
RegDate:        2025-02-11
Updated:        2025-07-08
Ref:            https://rdap.arin.net/registry/entity/GAL-104


OrgTechHandle: AS3251-ARIN
OrgTechName:   AS3257 Netguard
OrgTechPhone:  +49 69 48007422 
OrgTechEmail:  netguard@gtt.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AS3251-ARIN

OrgTechHandle: GLD5-ARIN
OrgTechName:   GTT Legal Departement
OrgTechPhone:  +359886606 
OrgTechEmail:  alexander.mutafchiyski@gtt.net
OrgTechRef:    https://rdap.arin.net/registry/entity/GLD5-ARIN

OrgTechHandle: GIT5-ARIN
OrgTechName:   GTT IPAM Team
OrgTechPhone:  +1-703-442-5500 
OrgTechEmail:  netguard@gtt.net
OrgTechRef:    https://rdap.arin.net/registry/entity/GIT5-ARIN

OrgAbuseHandle: GAD46-ARIN
OrgAbuseName:   GTT Abuse Department
OrgAbusePhone:  +1-703-442-5500 
OrgAbuseEmail:  abuse@gtt.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/GAD46-ARIN

OrgNOCHandle: GNOC16-ARIN
OrgNOCName:   GTT Network Operations Center
OrgNOCPhone:  +1-703-442-5500 
OrgNOCEmail:  noc@gtt.net
OrgNOCRef:    https://rdap.arin.net/registry/entity/GNOC16-ARIN

# end


# start

NetRange:       72.13.224.0 - 72.13.224.255
CIDR:           72.13.224.0/24
NetName:        GTT-ARISK-NET
NetHandle:      NET-72-13-224-0-2
Parent:         TRANSBEAM (NET-72-13-224-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   Arisk Communications inc. (AC-5396)
RegDate:        2025-04-30
Updated:        2025-04-30
Ref:            https://rdap.arin.net/registry/ip/72.13.224.0


OrgName:        Arisk Communications inc.
OrgId:          AC-5396
Address:        350 NORTHERN BLVD STE 324 -1331 ALBANY NY 12204-1000
City:           ALBANY
StateProv:      NY
PostalCode:     12204
Country:        US
RegDate:        2024-06-28
Updated:        2024-07-03
Ref:            https://rdap.arin.net/registry/entity/AC-5396

ReferralServer:  rwhois://rwhois.ariskisp.com:4321

OrgTechHandle: WILSO1903-ARIN
OrgTechName:   Wilson
OrgTechPhone:  +1-518-512-9230 
OrgTechEmail:  support@ariskisp.com
OrgTechRef:    https://rdap.arin.net/registry/entity/WILSO1903-ARIN

OrgAbuseHandle: WILSO1903-ARIN
OrgAbuseName:   Wilson
OrgAbusePhone:  +1-518-512-9230 
OrgAbuseEmail:  support@ariskisp.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/WILSO1903-ARIN

# end


# start

NetRange:       72.13.224.0 - 72.13.224.255
CIDR:           72.13.224.0/24
NetName:        GTT
NetHandle:      NET-72-13-224-0-3
Parent:         GTT-ARISK-NET (NET-72-13-224-0-2)
NetType:        Reassigned
OriginAS:       
Customer:       GTT Communications Inc. (C11472766)
RegDate:        2026-01-12
Updated:        2026-01-12
Comment:        Geofeed https://ariskisp.com/rfc8805.csv
Ref:            https://rdap.arin.net/registry/ip/72.13.224.0


CustName:       GTT Communications Inc.
Address:        350 NORTHERN BLVD STE 324 -1331
City:           ALBANY
StateProv:      NY
PostalCode:     12204
Country:        US
RegDate:        2026-01-12
Updated:        2026-01-12
Ref:            https://rdap.arin.net/registry/entity/C11472766

OrgTechHandle: WILSO1903-ARIN
OrgTechName:   Wilson
OrgTechPhone:  +1-518-512-9230 
OrgTechEmail:  support@ariskisp.com
OrgTechRef:    https://rdap.arin.net/registry/entity/WILSO1903-ARIN

OrgAbuseHandle: WILSO1903-ARIN
OrgAbuseName:   Wilson
OrgAbusePhone:  +1-518-512-9230 
OrgAbuseEmail:  support@ariskisp.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/WILSO1903-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.ariskisp.com:4321.
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 72.13.224.31
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14897
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;72.13.224.31.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031900 1800 900 604800 86400

;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 19 20:08:19 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
31.224.13.72.in-addr.arpa domain name pointer 31-224-13-72.static.cosmoweb.net.
NSLOOKUP信息:
b'31.224.13.72.in-addr.arpa	name = 31-224-13-72.static.cosmoweb.net.

Authoritative answers can be found from:

'
相关IP信息:
最新评论:
IP 类型 评论内容 时间
164.132.73.220 attackspam
Apr 10 22:34:13 debian-2gb-nbg1-2 kernel: \[8809859.678968\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=164.132.73.220 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=14771 PROTO=TCP SPT=43198 DPT=24338 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-11 06:53:54
106.12.105.193 attackbots
$f2bV_matches
2020-04-11 06:36:52
118.89.191.145 attack
2020-04-10T22:17:26.945122abusebot-5.cloudsearch.cf sshd[31782]: Invalid user aplusbiz from 118.89.191.145 port 38514
2020-04-10T22:17:26.950967abusebot-5.cloudsearch.cf sshd[31782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.191.145
2020-04-10T22:17:26.945122abusebot-5.cloudsearch.cf sshd[31782]: Invalid user aplusbiz from 118.89.191.145 port 38514
2020-04-10T22:17:28.823950abusebot-5.cloudsearch.cf sshd[31782]: Failed password for invalid user aplusbiz from 118.89.191.145 port 38514 ssh2
2020-04-10T22:21:40.043292abusebot-5.cloudsearch.cf sshd[31792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.191.145  user=root
2020-04-10T22:21:41.454382abusebot-5.cloudsearch.cf sshd[31792]: Failed password for root from 118.89.191.145 port 56676 ssh2
2020-04-10T22:24:25.649199abusebot-5.cloudsearch.cf sshd[31802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= r
...
2020-04-11 06:54:08
85.204.246.240 attackspam
Too many 404s, searching for vulnerabilities
2020-04-11 06:32:15
217.78.0.125 attack
Apr 11 05:04:44 scivo sshd[1152]: Invalid user sedi from 217.78.0.125
Apr 11 05:04:45 scivo sshd[1152]: Failed password for invalid user sedi from 217.78.0.125 port 40446 ssh2
Apr 11 05:04:45 scivo sshd[1152]: Received disconnect from 217.78.0.125: 11: Bye Bye [preauth]
Apr 11 05:18:05 scivo sshd[1869]: Failed password for r.r from 217.78.0.125 port 49228 ssh2
Apr 11 05:18:05 scivo sshd[1869]: Received disconnect from 217.78.0.125: 11: Bye Bye [preauth]
Apr 11 05:23:25 scivo sshd[2125]: Failed password for r.r from 217.78.0.125 port 55596 ssh2
Apr 11 05:23:25 scivo sshd[2125]: Received disconnect from 217.78.0.125: 11: Bye Bye [preauth]
Apr 11 05:28:23 scivo sshd[2368]: Invalid user guest from 217.78.0.125
Apr 11 05:28:24 scivo sshd[2368]: Failed password for invalid user guest from 217.78.0.125 port 33729 ssh2
Apr 11 05:28:24 scivo sshd[2368]: Received disconnect from 217.78.0.125: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=217.78
2020-04-11 06:28:33
103.138.206.41 attack
1433/tcp 1433/tcp 445/tcp
[2020-02-24/04-10]3pkt
2020-04-11 06:52:30
42.247.5.84 attackbotsspam
1433/tcp 1433/tcp
[2020-03-05/04-10]2pkt
2020-04-11 06:35:58
5.178.188.78 attack
23/tcp 8080/tcp
[2020-02-18/04-10]2pkt
2020-04-11 06:49:51
162.210.196.130 attack
Automatic report - Banned IP Access
2020-04-11 06:37:47
182.74.25.246 attack
SSH Invalid Login
2020-04-11 07:05:01
45.125.65.42 attackspam
Apr 10 23:32:09 srv01 postfix/smtpd\[26735\]: warning: unknown\[45.125.65.42\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 10 23:33:54 srv01 postfix/smtpd\[26735\]: warning: unknown\[45.125.65.42\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 10 23:34:29 srv01 postfix/smtpd\[26790\]: warning: unknown\[45.125.65.42\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 10 23:34:48 srv01 postfix/smtpd\[26735\]: warning: unknown\[45.125.65.42\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 10 23:49:24 srv01 postfix/smtpd\[32629\]: warning: unknown\[45.125.65.42\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-04-11 06:37:22
177.141.123.20 attack
SSH Brute Force
2020-04-11 06:57:33
205.206.50.222 attack
SSH Brute Force
2020-04-11 06:55:58
141.98.10.137 attack
Apr 10 20:52:52 mail postfix/smtpd\[2932\]: warning: unknown\[141.98.10.137\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Apr 10 21:14:51 mail postfix/smtpd\[3372\]: warning: unknown\[141.98.10.137\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Apr 10 21:59:39 mail postfix/smtpd\[4508\]: warning: unknown\[141.98.10.137\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Apr 10 22:22:13 mail postfix/smtpd\[5114\]: warning: unknown\[141.98.10.137\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-04-11 06:44:14
104.131.13.199 attack
Apr 11 00:41:01 hosting sshd[8964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.13.199  user=root
Apr 11 00:41:03 hosting sshd[8964]: Failed password for root from 104.131.13.199 port 52544 ssh2
...
2020-04-11 06:30:49

最近上报的IP列表

157.250.228.126 157.219.101.201 156.217.85.214 154.5.151.143
38.190.200.90 154.47.31.5 152.42.137.102 15.119.214.59
149.84.43.169 122.193.247.134 2606:4700:10::6814:4625 2606:4700:10::ac43:1260
2606:4700:10::6816:2098 2606:4700:10::6814:9928 2606:4700:10::ac43:1207 2606:4700:10::6814:4726
121.237.149.205 148.149.134.162 146.233.150.151 146.136.193.18