必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Frankfurt am Main

省份(region): Hessen

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '89.169.54.0 - 89.169.55.255'

% Abuse contact for '89.169.54.0 - 89.169.55.255' is 'abuse@aeza.ru'

inetnum:        89.169.54.0 - 89.169.55.255
netname:        Aeza-Network
mnt-domains:    aeza-mnt
mnt-lower:      aeza-mnt
mnt-routes:     aeza-mnt
country:        DE
admin-c:        NT5020-RIPE
abuse-c:        AR79375-RIPE
tech-c:         NT5020-RIPE
org:            ORG-AGL50-RIPE
status:         ASSIGNED PA
mnt-by:         aeza-mnt
mnt-by:         lir-ru-aezagroup-1-MNT
mnt-by:         webrocket-mnt
created:        2024-11-06T17:06:25Z
last-modified:  2026-03-05T18:22:07Z
source:         RIPE
geofeed:        https://aeza.net/static/ipv4_f.csv

organisation:   ORG-AGL50-RIPE
org-name:       AEZA GROUP LLC
country:        RU
org-type:       LIR
address:        Room 1N, Office 603, Hse 15, Building 1, Zolnaya Street, Pravoberezhny
address:        193318
address:        Saint Petersburg
address:        RUSSIAN FEDERATION
phone:          +79650135518
phone:          +78002006013
admin-c:        NT5020-RIPE
tech-c:         NT5020-RIPE
abuse-c:        AR79375-RIPE
mnt-ref:        lir-ru-aezagroup-1-MNT
mnt-ref:        aeza-mnt
mnt-ref:        IVC-MNT
mnt-ref:        Renets-mnt
mnt-ref:        VF1-MNT
mnt-ref:        DN-MNT
mnt-ref:        WEBROCKET-MNT
mnt-ref:        QWARTA-MNT
mnt-ref:        ROSNIIROS-MNT
mnt-ref:        mnt-ru-am-1
mnt-ref:        IROST-MNT
mnt-ref:        JD-RIPE-MNT
mnt-ref:        AS15509-MNT
mnt-ref:        sistemallc-mnt
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         lir-ru-aezagroup-1-MNT
created:        2025-12-29T09:59:14Z
last-modified:  2026-03-06T16:19:59Z
source:         RIPE # Filtered

role:           NOC team
address:        RUSSIAN FEDERATION
address:        Saint Petersburg
address:        193318
address:        Room 1N, Office 603, Hse 15, Building 1,
                Zolnaya Street, Pravoberezhny
phone:          +78002006013
nic-hdl:        NT5020-RIPE
mnt-by:         lir-ru-aezagroup-1-MNT
created:        2025-12-29T09:59:13Z
last-modified:  2025-12-29T09:59:13Z
source:         RIPE # Filtered

% Information related to '89.169.54.0/23AS210644'

route:          89.169.54.0/23
origin:         AS210644
mnt-by:         aeza-mnt
mnt-by:         AEZA-NETWORK-MNT
created:        2024-03-21T15:13:46Z
last-modified:  2024-03-21T15:13:46Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121 (SHETLAND)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.169.55.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53051
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;89.169.55.117.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026030701 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 08 09:00:20 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
117.55.169.89.in-addr.arpa domain name pointer testvpn.ptr.network.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
117.55.169.89.in-addr.arpa	name = testvpn.ptr.network.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
193.112.164.113 attackbots
Nov 24 21:12:59 php1 sshd\[26651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.164.113  user=root
Nov 24 21:13:01 php1 sshd\[26651\]: Failed password for root from 193.112.164.113 port 41520 ssh2
Nov 24 21:21:30 php1 sshd\[27341\]: Invalid user axel69 from 193.112.164.113
Nov 24 21:21:30 php1 sshd\[27341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.164.113
Nov 24 21:21:32 php1 sshd\[27341\]: Failed password for invalid user axel69 from 193.112.164.113 port 48134 ssh2
2019-11-25 15:42:33
181.14.240.149 attackspam
Nov 25 04:35:41 firewall sshd[21506]: Invalid user schets from 181.14.240.149
Nov 25 04:35:44 firewall sshd[21506]: Failed password for invalid user schets from 181.14.240.149 port 48663 ssh2
Nov 25 04:43:53 firewall sshd[21677]: Invalid user istclass from 181.14.240.149
...
2019-11-25 15:52:24
176.109.233.23 attack
" "
2019-11-25 15:31:18
168.181.49.66 attackspambots
$f2bV_matches
2019-11-25 15:19:43
37.187.93.105 attackspam
Automatic report - XMLRPC Attack
2019-11-25 15:39:01
178.62.228.122 attackbotsspam
Automatic report - Banned IP Access
2019-11-25 15:19:20
103.89.168.196 attack
103.89.168.196 - admin \[24/Nov/2019:22:17:11 -0800\] "GET /rss/order/new HTTP/1.1" 401 25103.89.168.196 - admin \[24/Nov/2019:22:31:39 -0800\] "GET /rss/order/new HTTP/1.1" 401 25103.89.168.196 - admin \[24/Nov/2019:22:31:48 -0800\] "GET /rss/order/new HTTP/1.1" 401 25
...
2019-11-25 15:22:31
63.88.23.139 attackspambots
63.88.23.139 was recorded 11 times by 7 hosts attempting to connect to the following ports: 80. Incident counter (4h, 24h, all-time): 11, 61, 665
2019-11-25 15:25:10
188.213.49.223 attack
C2,WP GET /wp-login.php
GET /wp-login.php
2019-11-25 15:30:00
176.10.250.50 attackspam
Nov 25 07:30:36 ip-172-31-62-245 sshd\[16606\]: Invalid user ibrahim from 176.10.250.50\
Nov 25 07:30:37 ip-172-31-62-245 sshd\[16606\]: Failed password for invalid user ibrahim from 176.10.250.50 port 44502 ssh2\
Nov 25 07:33:59 ip-172-31-62-245 sshd\[16628\]: Invalid user root000 from 176.10.250.50\
Nov 25 07:34:01 ip-172-31-62-245 sshd\[16628\]: Failed password for invalid user root000 from 176.10.250.50 port 52240 ssh2\
Nov 25 07:37:21 ip-172-31-62-245 sshd\[16652\]: Invalid user shanice from 176.10.250.50\
2019-11-25 15:53:17
202.96.137.99 attack
Port Scan 1433
2019-11-25 15:41:08
117.119.84.34 attackbots
Nov 25 09:57:42 microserver sshd[50780]: Invalid user landi4 from 117.119.84.34 port 52877
Nov 25 09:57:42 microserver sshd[50780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.119.84.34
Nov 25 09:57:43 microserver sshd[50780]: Failed password for invalid user landi4 from 117.119.84.34 port 52877 ssh2
Nov 25 10:07:37 microserver sshd[52097]: Invalid user bergtun from 117.119.84.34 port 40602
Nov 25 10:07:37 microserver sshd[52097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.119.84.34
Nov 25 10:22:58 microserver sshd[54095]: Invalid user smmsp from 117.119.84.34 port 40584
Nov 25 10:22:58 microserver sshd[54095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.119.84.34
Nov 25 10:23:00 microserver sshd[54095]: Failed password for invalid user smmsp from 117.119.84.34 port 40584 ssh2
Nov 25 10:30:49 microserver sshd[55280]: Invalid user herouin from 117.119.84.34 port 54692
2019-11-25 15:13:54
60.190.226.188 attackspambots
SSH-bruteforce attempts
2019-11-25 15:37:13
178.62.181.74 attackspam
Nov 25 08:13:37 mout sshd[22153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.181.74  user=root
Nov 25 08:13:39 mout sshd[22153]: Failed password for root from 178.62.181.74 port 37411 ssh2
2019-11-25 15:43:46
180.68.177.15 attack
Nov 25 14:39:38 webhost01 sshd[21115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.68.177.15
Nov 25 14:39:39 webhost01 sshd[21115]: Failed password for invalid user quickert from 180.68.177.15 port 45886 ssh2
...
2019-11-25 15:43:18

最近上报的IP列表

20.64.105.126 121.234.219.184 2606:4700:10::6814:5647 2606:4700:10::6814:6329
2606:4700:10::6814:6102 2606:4700:10::6814:8011 2606:4700:20::681a:501 2606:4700:10::ac43:935
2606:4700:10::ac43:1213 2606:4700:10::6814:6142 109.167.82.69 35.220.130.2
49.232.183.185 121.230.89.36 2606:4700:10::6814:9901 2606:4700:10::6814:9956
2606:4700:10::ac43:703 2606:4700:10::6816:1682 14.207.194.29 2606:4700:10::6814:4429