必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Katowice

省份(region): Slaskie

国家(country): Poland

运营商(isp): Orange

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '83.22.0.0 - 83.22.255.255'

% Abuse contact for '83.22.0.0 - 83.22.255.255' is 'cert.opl@orange.com'

inetnum:        83.22.0.0 - 83.22.255.255
netname:        Orange-Swiatlowod
descr:          Orange Swiatlowod
country:        PL
remarks:        ! - ! - ! - ! - ! - !
remarks:        Contact to ABUSE
remarks:        cert.opl@orange.com
remarks:        ! - ! - ! - ! - ! - !
admin-c:        TPHT
tech-c:         TPHT
status:         ASSIGNED PA
mnt-by:         TPNET
created:        2019-11-15T08:14:43Z
last-modified:  2019-11-15T08:14:43Z
source:         RIPE

role:           TP S.A. Hostmaster
address:        Orange Polska S.A.
address:        ul. Nowogrodzka 47A
address:        00-695 Warszawa
address:        Poland
phone:          +48 800 120810
phone:          +48 801 600006
phone:          +48 22 5039000
fax-no:         +48 22 6225182
org:            ORG-PT1-RIPE
admin-c:        MW12071-RIPE
tech-c:         KP21-RIPE
nic-hdl:        TPHT
mnt-by:         TPNET
abuse-mailbox:  cert.opl@orange.com
address:        hostmaster@tpnet.pl 20130506
created:        2003-01-28T07:54:15Z
last-modified:  2026-01-16T10:00:24Z
source:         RIPE # Filtered

% Information related to '83.16.0.0/13AS5617'

route:          83.16.0.0/13
descr:          TPNET
descr:          for abuse: abuse@tpnet.pl
origin:         AS5617
mnt-by:         AS5617-MNT
created:        2006-12-19T13:53:21Z
last-modified:  2006-12-19T13:53:21Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 83.22.204.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53061
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;83.22.204.14.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040201 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 03 06:08:26 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
14.204.22.83.in-addr.arpa domain name pointer 83.22.204.14.ipv4.supernova.orange.pl.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.204.22.83.in-addr.arpa	name = 83.22.204.14.ipv4.supernova.orange.pl.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
52.172.195.6 attackbots
Jul 15 05:54:18 marvibiene sshd[22749]: Invalid user admin from 52.172.195.6 port 48834
Jul 15 05:54:18 marvibiene sshd[22749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.172.195.6
Jul 15 05:54:18 marvibiene sshd[22749]: Invalid user admin from 52.172.195.6 port 48834
Jul 15 05:54:21 marvibiene sshd[22749]: Failed password for invalid user admin from 52.172.195.6 port 48834 ssh2
...
2020-07-15 14:18:41
40.115.49.104 attackspam
SSH/22 MH Probe, BF, Hack -
2020-07-15 14:19:17
222.186.15.115 attack
Jul 15 08:11:49 minden010 sshd[9073]: Failed password for root from 222.186.15.115 port 20127 ssh2
Jul 15 08:11:51 minden010 sshd[9073]: Failed password for root from 222.186.15.115 port 20127 ssh2
Jul 15 08:11:54 minden010 sshd[9073]: Failed password for root from 222.186.15.115 port 20127 ssh2
...
2020-07-15 14:15:17
84.108.244.181 attackspambots
Icarus honeypot on github
2020-07-15 13:52:35
123.16.230.129 attackbotsspam
1594778561 - 07/15/2020 04:02:41 Host: 123.16.230.129/123.16.230.129 Port: 445 TCP Blocked
2020-07-15 13:56:45
172.241.112.83 attackspambots
20 attempts against mh-misbehave-ban on twig
2020-07-15 13:57:59
13.65.240.44 attackspambots
Port scan on 1 port(s): 22
2020-07-15 14:24:37
106.241.33.158 attack
Invalid user gong from 106.241.33.158 port 26522
2020-07-15 13:57:15
115.77.189.212 attackspam
Unauthorized connection attempt from IP address 115.77.189.212 on Port 445(SMB)
2020-07-15 14:18:08
13.68.255.9 attackspam
Jul 14 13:28:12 dax sshd[25746]: Invalid user crevis.com from 13.68.255.9
Jul 14 13:28:12 dax sshd[25748]: Invalid user crevis.com from 13.68.255.9
Jul 14 13:28:12 dax sshd[25751]: Invalid user admin from 13.68.255.9
Jul 14 13:28:12 dax sshd[25752]: Invalid user admin from 13.68.255.9
Jul 14 13:28:12 dax sshd[25746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.68.255.9 
Jul 14 13:28:12 dax sshd[25750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.68.255.9  user=r.r
Jul 14 13:28:12 dax sshd[25745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.68.255.9  user=r.r
Jul 14 13:28:12 dax sshd[25748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.68.255.9 
Jul 14 13:28:12 dax sshd[25751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.68.255.9 
Jul 14 13:........
-------------------------------
2020-07-15 14:01:23
132.232.79.135 attackbots
Triggered by Fail2Ban at Ares web server
2020-07-15 14:11:09
171.241.14.202 attack
1594778562 - 07/15/2020 04:02:42 Host: 171.241.14.202/171.241.14.202 Port: 445 TCP Blocked
2020-07-15 13:54:31
141.98.10.208 attack
Trying to get access to server without permission
2020-07-15 14:25:36
52.143.184.104 attackbots
SSH/22 MH Probe, BF, Hack -
2020-07-15 14:26:55
52.152.138.54 attack
" "
2020-07-15 14:09:20

最近上报的IP列表

2606:4700:10::6816:1252 68.167.181.156 149.88.69.102 14.212.61.140
101.67.29.135 195.140.214.21 2606:4700:10::6814:5625 2606:4700:10::6814:5590
2606:4700:10::6814:5988 2606:4700:10::6814:7656 2606:4700:10::6816:3758 2606:4700:10::ac43:1793
2606:4700:10::ac43:978 2606:4700:10::6816:4827 2606:4700:10::6814:5576 164.155.74.133
2606:4700:10::6816:4381 2606:4700:10::6814:5794 2606:4700:10::6814:4665 2606:4700:10::6814:4477