必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): England

国家(country): United Kingdom

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '82.163.188.0 - 82.163.188.255'

% Abuse contact for '82.163.188.0 - 82.163.188.255' is 'abuse@gigaclear.com'

inetnum:        82.163.188.0 - 82.163.188.255
netname:        Gigaclear
descr:          Gigaclear
country:        GB
admin-c:        GA10497-RIPE
tech-c:         GIGA2-RIPE
status:         ASSIGNED PA
geofeed:        https://gigaclear.net/geofeed.csv
mnt-by:         gigaclear
created:        2016-01-06T15:36:18Z
last-modified:  2024-04-15T09:02:36Z
source:         RIPE

role:           Gigaclear Administration
address:        Gigaclear Ltd
address:        Building One
address:        Wyndyke Furlong
address:        Abingdon
address:        Oxfordshire
address:        OX14 1UQ
phone:          +441865591100
nic-hdl:        GA10497-RIPE
mnt-by:         gigaclear
created:        2018-08-03T09:46:15Z
last-modified:  2025-07-14T09:11:32Z
source:         RIPE # Filtered
admin-c:        GH5569-RIPE
admin-c:        PH9432-RIPE

role:           Gigaclear Engineering
address:        Gigaclear Ltd
address:        Building One
address:        Wyndyke Furlong
address:        Abingdon
address:        Oxfordshire
address:        OX14 1UQ
address:        UK
phone:          +441865664144
org:            ORG-GL85-RIPE
admin-c:        GA10497-RIPE
tech-c:         GH5569-RIPE
tech-c:         PH9432-RIPE
nic-hdl:        GIGA2-RIPE
mnt-by:         gigaclear
created:        2014-07-24T09:44:58Z
last-modified:  2025-07-14T09:12:00Z
source:         RIPE # Filtered

% Information related to '82.163.184.0/21AS56329'

route:          82.163.184.0/21
descr:          Route for Gigaclear
origin:         AS56329
mnt-by:         gigaclear
created:        2016-03-03T16:28:18Z
last-modified:  2019-10-31T09:22:23Z
source:         RIPE # Filtered

% This query was served by the RIPE Database Query Service version 1.121.2 (SHETLAND)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.163.188.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15065
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;82.163.188.50.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032201 1800 900 604800 86400

;; Query time: 312 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 06:57:30 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
50.188.163.82.in-addr.arpa domain name pointer 82-163-188-50.customer.gigaclear.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
50.188.163.82.in-addr.arpa	name = 82-163-188-50.customer.gigaclear.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
50.74.129.22 attackspambots
Sep 18 03:01:31 www2 sshd\[57864\]: Invalid user admin from 50.74.129.22Sep 18 03:01:33 www2 sshd\[57864\]: Failed password for invalid user admin from 50.74.129.22 port 45541 ssh2Sep 18 03:01:34 www2 sshd\[57866\]: Invalid user admin from 50.74.129.22
...
2020-09-18 21:24:03
51.254.156.114 attack
Invalid user pitt from 51.254.156.114 port 44112
2020-09-18 21:15:08
69.162.124.230 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-18 21:05:07
79.132.77.123 attackbotsspam
Sep 17 14:01:33 logopedia-1vcpu-1gb-nyc1-01 sshd[377205]: Failed password for root from 79.132.77.123 port 46146 ssh2
...
2020-09-18 21:01:42
14.201.204.142 attack
port scan and connect, tcp 23 (telnet)
2020-09-18 21:20:20
78.187.110.35 attackbots
Unauthorized connection attempt from IP address 78.187.110.35 on Port 445(SMB)
2020-09-18 21:14:49
124.120.179.236 attack
124.120.179.236 - - [17/Sep/2020:20:30:40 +0100] "POST /xmlrpc.php HTTP/1.1" 503 18281 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1"
124.120.179.236 - - [17/Sep/2020:20:30:42 +0100] "POST /wp-login.php HTTP/1.1" 503 18281 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1"
124.120.179.236 - - [17/Sep/2020:20:43:26 +0100] "POST /xmlrpc.php HTTP/1.1" 503 18281 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1"
...
2020-09-18 21:06:36
122.117.122.42 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-18 20:58:36
158.174.12.189 attackspambots
Sep 17 14:01:30 logopedia-1vcpu-1gb-nyc1-01 sshd[377203]: Invalid user cablecom from 158.174.12.189 port 55946
...
2020-09-18 21:06:06
14.100.7.10 attack
Email rejected due to spam filtering
2020-09-18 21:27:04
134.209.235.106 attackbotsspam
134.209.235.106 - - [18/Sep/2020:14:56:23 +0200] "POST /xmlrpc.php HTTP/1.1" 403 14666 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
134.209.235.106 - - [18/Sep/2020:14:58:35 +0200] "POST /xmlrpc.php HTTP/1.1" 403 611 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-18 21:02:27
175.182.188.172 attack
Unauthorized connection attempt from IP address 175.182.188.172 on Port 445(SMB)
2020-09-18 20:58:14
85.229.186.252 attack
Brute-force attempt banned
2020-09-18 21:11:13
171.61.189.234 attackbotsspam
Unauthorized connection attempt from IP address 171.61.189.234 on Port 445(SMB)
2020-09-18 21:12:10
103.102.177.186 attackspambots
Sep 17 19:01:18 serwer sshd\[21059\]: Invalid user tit0nich from 103.102.177.186 port 51924
Sep 17 19:01:19 serwer sshd\[21059\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.102.177.186
Sep 17 19:01:20 serwer sshd\[21059\]: Failed password for invalid user tit0nich from 103.102.177.186 port 51924 ssh2
...
2020-09-18 21:12:59

最近上报的IP列表

92.223.232.68 82.110.141.228 35.203.210.174 31.235.131.7
193.5.117.134 110.77.248.165 2606:4700:10::6816:3479 2606:4700:10::6816:138
2606:4700:10::ac43:2214 2606:4700:10::6816:2644 2606:4700:10::6816:4067 2606:4700:10::6814:4829
2606:4700:10::6814:5678 2606:4700:10::ac43:1228 2606:4700:10::6814:6068 2606:4700:10::ac43:2889
2606:4700:10::6816:1580 2606:4700:10::6814:5217 2606:4700:10::6816:4435 212.106.121.27