必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Ashburn

省份(region): Virginia

国家(country): United States

运营商(isp): Vodafone

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '80.174.220.0 - 80.174.223.255'

% Abuse contact for '80.174.220.0 - 80.174.223.255' is 'tech@grupo-ion.es'

inetnum:        80.174.220.0 - 80.174.223.255
netname:        US-EUROPEAN-NET
country:        US
org:            ORG-EIIG1-RIPE
admin-c:        SCH32-RIPE
tech-c:         SCH32-RIPE
status:         SUB-ALLOCATED PA
mnt-by:         lir-es-european-1-MNT
mnt-by:         mnt-es-airenetworks-1
created:        2026-02-13T14:15:26Z
last-modified:  2026-02-13T14:15:26Z
source:         RIPE
geofeed:        https://grupo-ion.es/geofeed.csv
remarks:        Geofeed https://grupo-ion.es/geofeed.csv
geoloc:         39.0438 -77.487

organisation:   ORG-EIIG1-RIPE
org-name:       European ION Investment Group SL
country:        ES
org-type:       LIR
address:        C/ JUAN DE LA CIERVA 27 Bl.4 1 A - ELCHE PARQUE EMPRESARIAL
address:        03203
address:        Elche
address:        SPAIN
phone:          +34865660151
admin-c:        TS41062-RIPE
tech-c:         TS41062-RIPE
abuse-c:        AR65469-RIPE
mnt-ref:        lir-es-european-1-MNT
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         lir-es-european-1-MNT
created:        2021-10-06T07:52:44Z
last-modified:  2025-03-12T12:36:52Z
source:         RIPE # Filtered

role:           Strictly Cloud Hostmaster
address:        24A Trolley Square # 1430
address:        Wilmington DE 19806-3334
address:        USA
nic-hdl:        SCH32-RIPE
mnt-by:         MANITU-MNT
created:        2024-09-03T06:09:03Z
last-modified:  2024-09-03T06:09:03Z
source:         RIPE # Filtered

% Information related to '80.174.220.0/22AS3949'

route:          80.174.220.0/22
descr:          Strictly
origin:         AS3949
mnt-by:         lir-es-european-1-MNT
mnt-by:         mnt-es-airenetworks-1
created:        2026-02-13T14:08:01Z
last-modified:  2026-02-13T14:08:01Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121 (SHETLAND)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.174.222.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2818
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.174.222.112.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031200 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 12 16:55:04 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 112.222.174.80.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 112.222.174.80.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
43.227.68.26 attackspambots
Automatic report - Banned IP Access
2019-08-08 05:31:41
180.126.235.225 attackspambots
Automatic report - Port Scan Attack
2019-08-08 05:27:59
104.206.128.22 attack
firewall-block, port(s): 21/tcp
2019-08-08 05:18:54
195.154.86.34 attackbotsspam
GET /pma/scripts/setup.php HTTP/1.1
2019-08-08 05:13:35
222.122.31.133 attackspambots
2019-08-07T20:27:02.893354abusebot-7.cloudsearch.cf sshd\[6903\]: Invalid user joshua from 222.122.31.133 port 43650
2019-08-08 04:51:10
144.217.164.104 attackspam
Automatic report - Banned IP Access
2019-08-08 05:11:52
61.114.217.72 attack
61.114.217.72 [07/Aug/2019:13:33:59 +0100] "GET /phpmyadmin2011/index.php?lang=en HTTP/1.1"
61.114.217.72 [07/Aug/2019:13:33:59 +0100] "GET /phpmyadmin2012/index.php?lang=en HTTP/1.1"
61.114.217.72 [07/Aug/2019:13:34:00 +0100] "GET /phpmyadmin2013/index.php?lang=en HTTP/1.1"
61.114.217.72 [07/Aug/2019:13:34:00 +0100] "GET /phpmyadmin2014/index.php?lang=en HTTP/1.1"
61.114.217.72 [07/Aug/2019:13:34:00 +0100] "GET /phpmyadmin2015/index.php?lang=en HTTP/1.1"
61.114.217.72 [07/Aug/2019:13:34:01 +0100] "GET /phpmyadmin2016/index.php?lang=en HTTP/1.1"
61.114.217.72 [07/Aug/2019:13:34:01 +0100] "GET /phpmyadmin2017/index.php?lang=en HTTP/1.1"
61.114.217.72 [07/Aug/2019:13:34:02 +0100] "GET /phpmyadmin2018/index.php?lang=en HTTP/1.1"
61.114.217.72 [07/Aug/2019:13:34:02 +0100] "GET /phpmyadmin2019/index.php?lang=en HTTP/1.1"
61.114.217.72 [07/Aug/2019:13:34:03 +0100] "GET /index.php?lang=en HTTP/1.1"
2019-08-08 05:10:50
81.44.65.195 attackbotsspam
ssh intrusion attempt
2019-08-08 05:24:40
95.110.227.199 attack
Hacking script: 
95.110.227.199 - - [06/Aug/2019:19:41:58 +0100] "GET /muieblackcat HTTP/1.1" 404 544 "-" "-"
2019-08-08 05:36:12
144.217.85.183 attackspambots
Aug  7 19:38:53 ncomp sshd[30723]: Invalid user shane from 144.217.85.183
Aug  7 19:38:53 ncomp sshd[30723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.85.183
Aug  7 19:38:53 ncomp sshd[30723]: Invalid user shane from 144.217.85.183
Aug  7 19:38:55 ncomp sshd[30723]: Failed password for invalid user shane from 144.217.85.183 port 58272 ssh2
2019-08-08 05:35:54
218.92.1.130 attack
SSH Brute Force, server-1 sshd[28600]: Failed password for root from 218.92.1.130 port 28529 ssh2
2019-08-08 05:14:51
49.88.112.69 attackspam
Failed password for root from 49.88.112.69 port 39364 ssh2
Failed password for root from 49.88.112.69 port 39364 ssh2
Failed password for root from 49.88.112.69 port 39364 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.69  user=root
Failed password for root from 49.88.112.69 port 62188 ssh2
2019-08-08 05:24:21
209.141.44.238 attack
Automatic report - Banned IP Access
2019-08-08 04:57:47
185.175.93.105 attackbots
08/07/2019-16:33:44.246115 185.175.93.105 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-08-08 05:18:01
134.209.189.224 attackspambots
Aug  7 22:41:02 microserver sshd[30672]: Invalid user pe from 134.209.189.224 port 46218
Aug  7 22:41:02 microserver sshd[30672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.189.224
Aug  7 22:41:04 microserver sshd[30672]: Failed password for invalid user pe from 134.209.189.224 port 46218 ssh2
Aug  7 22:45:18 microserver sshd[31448]: Invalid user cedric from 134.209.189.224 port 45920
Aug  7 22:45:18 microserver sshd[31448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.189.224
Aug  7 22:57:42 microserver sshd[33516]: Invalid user rajesh from 134.209.189.224 port 42168
Aug  7 22:57:42 microserver sshd[33516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.189.224
Aug  7 22:57:44 microserver sshd[33516]: Failed password for invalid user rajesh from 134.209.189.224 port 42168 ssh2
Aug  7 23:01:54 microserver sshd[34328]: Invalid user gilberto from 134.209.189.22
2019-08-08 05:27:33

最近上报的IP列表

2.249.142.165 185.231.33.46 10.36.198.186 254.238.12.218
178.16.53.90 74.7.241.51 74.7.175.142 149.52.71.138
122.162.151.75 192.71.224.103 37.24.235.170 45.142.154.32
178.62.29.13 220.103.92.112 20.23.9.218 91.231.89.68
91.231.89.2 58.240.69.164 62.33.26.212 115.45.42.36