必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): London

省份(region): England

国家(country): United Kingdom

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '89.45.176.0 - 89.45.191.255'

% Abuse contact for '89.45.176.0 - 89.45.191.255' is 'abuse@communityfibre.co.uk'

inetnum:        89.45.176.0 - 89.45.191.255
geoloc:         51.5175 -0.1804
netname:        UK-COMMUNITYFIBRE-20051129
country:        GB
org:            ORG-CFL2-RIPE
admin-c:        CFL-RIPE
tech-c:         CFL-RIPE
status:         ALLOCATED PA
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         CFL-MNT
created:        2015-08-10T07:36:25Z
last-modified:  2024-06-06T10:17:22Z
source:         RIPE
geofeed:        https://gitlab.com/cflpublic/geofeed/-/raw/main/AS201838_geofeed.csv

organisation:   ORG-CFL2-RIPE
geoloc:         51.5175 -0.1804
country:        GB
org-name:       Community Fibre Limited
org-type:       LIR
address:        167-169 Great Portland Street
address:        W1W 5PF
address:        London
address:        UNITED KINGDOM
phone:          +448000820770
mnt-ref:        RIPE-NCC-HM-MNT
mnt-ref:        PREFIXBROKER-MNT
mnt-ref:        CFL-MNT
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         CFL-MNT
abuse-c:        CFL-RIPE
created:        2014-02-05T11:24:48Z
last-modified:  2025-09-17T08:17:44Z
source:         RIPE # Filtered

role:           Community Fibre Hostmaster Contact
address:        32 Page Street, London, England, SW1P 4EN
admin-c:        CNT13-RIPE
tech-c:         CNT13-RIPE
nic-hdl:        CFL-RIPE
abuse-mailbox:  abuse@communityfibre.co.uk
mnt-by:         CFL-MNT
created:        2015-02-09T16:56:04Z
last-modified:  2021-07-21T10:41:02Z
source:         RIPE # Filtered

% Information related to '89.45.176.0/20AS201838'

route:          89.45.176.0/20
origin:         AS201838
descr:          Community Fibre Limited
mnt-by:         CFL-MNT
created:        2018-09-01T11:08:20Z
last-modified:  2018-09-01T11:08:20Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.45.182.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58661
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;89.45.182.121.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040700 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 07 16:58:33 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 121.182.45.89.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 121.182.45.89.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
40.92.40.98 attackbotsspam
Dec 16 17:41:25 debian-2gb-vpn-nbg1-1 kernel: [885654.528603] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.40.98 DST=78.46.192.101 LEN=48 TOS=0x00 PREC=0x00 TTL=106 ID=2332 DF PROTO=TCP SPT=20602 DPT=25 WINDOW=8192 RES=0x00 SYN URGP=0
2019-12-17 04:12:53
37.49.231.163 attack
Dec 16 19:36:31 debian-2gb-nbg1-2 kernel: \[174174.918143\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=37.49.231.163 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=42378 PROTO=TCP SPT=58807 DPT=8443 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-17 04:32:17
104.236.142.200 attack
2019-12-16T20:26:47.995061centos sshd\[9466\]: Invalid user gianoulis from 104.236.142.200 port 39436
2019-12-16T20:26:47.998856centos sshd\[9466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.142.200
2019-12-16T20:26:50.272967centos sshd\[9466\]: Failed password for invalid user gianoulis from 104.236.142.200 port 39436 ssh2
2019-12-17 04:22:24
106.54.40.11 attackbots
Dec 16 18:56:17 server sshd\[867\]: Invalid user yttervoll from 106.54.40.11
Dec 16 18:56:17 server sshd\[867\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.40.11 
Dec 16 18:56:19 server sshd\[867\]: Failed password for invalid user yttervoll from 106.54.40.11 port 41728 ssh2
Dec 16 19:11:07 server sshd\[5479\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.40.11  user=root
Dec 16 19:11:10 server sshd\[5479\]: Failed password for root from 106.54.40.11 port 57560 ssh2
...
2019-12-17 04:27:20
89.248.173.102 attackbotsspam
B: f2b ssh aggressive 3x
2019-12-17 04:15:10
45.6.72.17 attackbots
SSH Brute Force
2019-12-17 04:28:07
51.38.225.124 attackspambots
2019-12-16T17:43:13.360588shield sshd\[16806\]: Invalid user test from 51.38.225.124 port 40332
2019-12-16T17:43:13.366804shield sshd\[16806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.225.124
2019-12-16T17:43:15.235314shield sshd\[16806\]: Failed password for invalid user test from 51.38.225.124 port 40332 ssh2
2019-12-16T17:50:41.508158shield sshd\[18820\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.225.124  user=root
2019-12-16T17:50:43.543889shield sshd\[18820\]: Failed password for root from 51.38.225.124 port 46914 ssh2
2019-12-17 04:11:47
54.38.242.233 attack
Dec 16 19:21:24 pornomens sshd\[30385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.242.233  user=daemon
Dec 16 19:21:26 pornomens sshd\[30385\]: Failed password for daemon from 54.38.242.233 port 41534 ssh2
Dec 16 19:26:19 pornomens sshd\[30428\]: Invalid user vcsa from 54.38.242.233 port 47608
Dec 16 19:26:19 pornomens sshd\[30428\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.242.233
...
2019-12-17 04:16:14
187.162.135.130 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-17 04:07:26
42.118.242.189 attackspam
2019-12-16T18:27:39.018346abusebot-4.cloudsearch.cf sshd\[2116\]: Invalid user haseltine from 42.118.242.189 port 44784
2019-12-16T18:27:39.024055abusebot-4.cloudsearch.cf sshd\[2116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.118.242.189
2019-12-16T18:27:41.554620abusebot-4.cloudsearch.cf sshd\[2116\]: Failed password for invalid user haseltine from 42.118.242.189 port 44784 ssh2
2019-12-16T18:37:35.738190abusebot-4.cloudsearch.cf sshd\[2165\]: Invalid user cssserver from 42.118.242.189 port 35734
2019-12-17 04:24:29
203.146.151.195 attackspam
Unauthorized connection attempt from IP address 203.146.151.195 on Port 445(SMB)
2019-12-17 04:17:28
150.161.8.120 attackbotsspam
Dec 16 17:47:10 pi sshd\[10002\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.161.8.120  user=root
Dec 16 17:47:12 pi sshd\[10002\]: Failed password for root from 150.161.8.120 port 39016 ssh2
Dec 16 17:53:36 pi sshd\[10305\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.161.8.120  user=root
Dec 16 17:53:38 pi sshd\[10305\]: Failed password for root from 150.161.8.120 port 45510 ssh2
Dec 16 18:00:00 pi sshd\[10628\]: Invalid user nertie from 150.161.8.120 port 52034
Dec 16 18:00:00 pi sshd\[10628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.161.8.120
...
2019-12-17 04:31:06
176.56.236.21 attackbots
Invalid user lavalsit from 176.56.236.21 port 58708
2019-12-17 04:16:59
123.20.22.206 attack
Unauthorized connection attempt detected from IP address 123.20.22.206 to port 445
2019-12-17 04:06:03
187.137.121.253 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-17 04:17:55

最近上报的IP列表

149.119.147.142 2606:4700:10::ac43:2426 2606:4700:10::6814:4851 2606:4700:10::ac43:1284
2606:4700:10::6816:1341 2606:4700:10::6814:4353 2606:4700:10::6816:2044 2606:4700:10::ac43:2099
2606:4700:10::6816:2062 134.35.157.28 2606:4700:10::ac43:1746 110.77.226.95
2606:4700:10::6816:2755 2606:4700:10::6816:4846 241.164.166.173 192.168.48.8
214.169.252.48 18.99.247.191 134.164.226.42 200.199.229.118