必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Berlin

省份(region): Berlin

国家(country): Germany

运营商(isp): Vodafone

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '91.65.0.0 - 91.65.255.255'

% Abuse contact for '91.65.0.0 - 91.65.255.255' is 'abuse.de@vodafone.com'

inetnum:        91.65.0.0 - 91.65.255.255
netname:        KABEL-DEUTSCHLAND-CUSTOMER-SERVICES-14
descr:          Kabel Deutschland Breitband Customer 14
country:        DE
admin-c:        KDG40-RIPE
tech-c:         KDG40-RIPE
status:         ASSIGNED PA
mnt-by:         MNT-KABELDEUTSCHLAND
mnt-lower:      MNT-KABELDEUTSCHLAND
mnt-routes:     MNT-KABELDEUTSCHLAND
created:        2006-12-15T10:57:33Z
last-modified:  2015-06-09T13:29:11Z
source:         RIPE

role:           Kabel Deutschland RIPE
address:        Vodafone Kabel Deutschland GmbH
address:        Germaniastr. 14-17
address:        12099 Berlin
address:        Germany
admin-c:        FM464-RIPE
admin-c:        MM45323-RIPE
tech-c:         MM45323-RIPE
abuse-mailbox:  abuse.de@vodafone.com
nic-hdl:        KDG40-RIPE
mnt-by:         MNT-KABELDEUTSCHLAND
created:        2015-06-06T09:42:03Z
last-modified:  2019-10-28T12:25:04Z
source:         RIPE # Filtered

% Information related to '91.65.128.0/17AS31334'

route:          91.65.128.0/17
descr:          Kabeldeutschland Route
origin:         AS31334
mnt-by:         MNT-KABELDEUTSCHLAND
created:        2009-04-20T13:21:12Z
last-modified:  2009-04-20T13:21:12Z
source:         RIPE

% Information related to '91.65.128.0/17AS3209'

route:          91.65.128.0/17
origin:         AS3209
descr:          VFKD Route
mnt-routes:     ARCOR-MNT
mnt-by:         MNT-KABELDEUTSCHLAND
mnt-by:         MNT-AS31334
created:        2020-06-16T10:13:31Z
last-modified:  2020-06-16T10:13:31Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (ABERDEEN)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.65.186.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24357
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;91.65.186.135.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041201 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 13 14:54:24 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
135.186.65.91.in-addr.arpa domain name pointer ip5b41ba87.dynamic.kabel-deutschland.de.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
135.186.65.91.in-addr.arpa	name = ip5b41ba87.dynamic.kabel-deutschland.de.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
181.168.20.32 attackbots
Unauthorized IMAP connection attempt
2020-08-08 19:30:08
212.70.149.51 attack
Jul 11 08:53:35 mail postfix/smtpd[10218]: warning: unknown[212.70.149.51]: SASL LOGIN authentication failed: authentication failure
2020-08-08 19:25:29
167.172.231.211 attackspam
 TCP (SYN) 167.172.231.211:57387 -> port 7620, len 44
2020-08-08 19:17:12
37.49.230.206 attackbotsspam
Jul 25 12:42:09 mail postfix/smtpd[16533]: warning: unknown[37.49.230.206]: SASL LOGIN authentication failed: authentication failure
2020-08-08 19:24:23
220.142.33.48 attackspambots
Unauthorized IMAP connection attempt
2020-08-08 19:15:55
85.174.192.247 attackspam
Unauthorized IMAP connection attempt
2020-08-08 19:14:29
46.38.145.249 attack
Jul 11 11:10:10 mail postfix/smtpd[17327]: warning: unknown[46.38.145.249]: SASL LOGIN authentication failed: authentication failure
2020-08-08 19:18:20
222.186.30.57 attackbotsspam
Unauthorized connection attempt detected from IP address 222.186.30.57 to port 22
2020-08-08 19:20:10
51.38.190.237 attackspambots
51.38.190.237 - - \[08/Aug/2020:11:59:59 +0200\] "POST /wp-login.php HTTP/1.1" 200 9954 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
51.38.190.237 - - \[08/Aug/2020:11:59:59 +0200\] "POST /wp-login.php HTTP/1.1" 200 9854 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2020-08-08 19:32:26
173.247.174.198 attackspambots
SSH break in attempt
...
2020-08-08 19:16:45
132.148.141.147 attackbotsspam
notenfalter.de 132.148.141.147 [08/Aug/2020:12:34:39 +0200] "POST /wp-login.php HTTP/1.1" 200 6193 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
notenfalter.de 132.148.141.147 [08/Aug/2020:12:34:40 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-08 19:44:28
45.88.110.138 attackbots
2020-08-08T00:48:01.630225morrigan.ad5gb.com sshd[79933]: Failed password for root from 45.88.110.138 port 39140 ssh2
2020-08-08T00:48:04.001373morrigan.ad5gb.com sshd[79933]: Disconnected from authenticating user root 45.88.110.138 port 39140 [preauth]
2020-08-08 19:19:37
185.77.248.6 attack
Automatic report - Banned IP Access
2020-08-08 19:16:22
185.234.216.63 attack
Jul 22 07:46:32 mail postfix/smtpd[32700]: warning: unknown[185.234.216.63]: SASL LOGIN authentication failed: authentication failure
2020-08-08 19:50:09
192.35.168.228 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-08-08 19:13:16

最近上报的IP列表

54.105.246.56 31.77.102.54 2606:4700:10::ac43:2019 2606:4700:10::6814:7032
2606:4700:10::ac43:1569 2606:4700:10::6814:5172 2606:4700:10::6814:4900 2606:4700:10::ac43:2724
51.103.43.80 2606:4700:10::ac43:1352 2606:4700:10::6816:2311 2606:4700:10::6814:9453
43.129.247.237 172.232.209.215 35.195.84.127 34.95.249.32
161.35.175.50 2606:4700:10::6816:2158 2606:4700:10::6814:4446 2606:4700:10::6816:2598