必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Karachi

省份(region): Sindh

国家(country): Pakistan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '110.38.242.0 - 110.38.242.255'

% Abuse contact for '110.38.242.0 - 110.38.242.255' is 'whois@wateen.com'

inetnum:        110.38.242.0 - 110.38.242.255
netname:        WATEEN-TEL
descr:          National Wimax/IMS environment
country:        PK
admin-c:        WS1673-AP
tech-c:         WS1673-AP
abuse-c:        AW997-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-PK-WATEEN
mnt-irt:        IRT-WATEENTEL-PK
geoloc:         24.930798602 67.087031334
last-modified:  2025-05-23T10:06:30Z
source:         APNIC

irt:            IRT-WATEENTEL-PK
address:        Wateen Telecom Limited Main Walton Road, Opp. Bab-e-Pakistan, Walton Cantt., Lahore
e-mail:         whois@wateen.com
abuse-mailbox:  whois@wateen.com
admin-c:        WS1673-AP
tech-c:         WS1673-AP
auth:           # Filtered
remarks:        whois@wateen.com was validated on 2025-12-03
mnt-by:         MAINT-PK-WATEEN
last-modified:  2025-12-03T05:30:49Z
source:         APNIC

role:           ABUSE WATEENTELPK
country:        ZZ
address:        Wateen Telecom Limited Main Walton Road, Opp. Bab-e-Pakistan, Walton Cantt., Lahore
phone:          +000000000
e-mail:         whois@wateen.com
admin-c:        WS1673-AP
tech-c:         WS1673-AP
nic-hdl:        AW997-AP
remarks:        Generated from irt object IRT-WATEENTEL-PK
remarks:        whois@wateen.com was validated on 2025-12-03
abuse-mailbox:  whois@wateen.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-12-03T05:31:00Z
source:         APNIC

person:         Wateen Support
address:        Wateen Telecom Limited Main Walton Road, Opp. Bab-e-Pakistan, Walton Cantt., Lahore
country:        PK
phone:          +92-111 365 111
e-mail:         whois@wateen.com
nic-hdl:        WS1673-AP
mnt-by:         MAINT-PK-WATEEN
last-modified:  2025-05-13T05:51:27Z
source:         APNIC

% Information related to '110.38.242.0/24AS139879'

route:          110.38.242.0/24
origin:         AS139879
descr:          Wateen Telecom Limited
                Main Walton Road
                Opp. Bab-e-Pakistan
                Walton Cantt
mnt-by:         MAINT-PK-WATEEN
last-modified:  2022-11-28T10:32:24Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 110.38.242.96
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45048
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;110.38.242.96.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031000 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 10 15:31:13 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
96.242.38.110.in-addr.arpa domain name pointer GPONUser38242-96.wateen.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
96.242.38.110.in-addr.arpa	name = GPONUser38242-96.wateen.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
177.129.17.57 attackbots
8080/tcp
[2019-09-08]1pkt
2019-09-09 03:27:47
42.234.80.157 attackspambots
37215/tcp 37215/tcp
[2019-09-08]2pkt
2019-09-09 03:23:10
177.67.8.39 attackspam
8080/tcp
[2019-09-08]1pkt
2019-09-09 03:21:18
121.62.222.11 attack
Sep  8 20:52:10 polaris sshd[8597]: Invalid user admin from 121.62.222.11
Sep  8 20:52:12 polaris sshd[8597]: Failed password for invalid user admin from 121.62.222.11 port 45035 ssh2
Sep  8 20:52:14 polaris sshd[8597]: Failed password for invalid user admin from 121.62.222.11 port 45035 ssh2
Sep  8 20:52:17 polaris sshd[8597]: Failed password for invalid user admin from 121.62.222.11 port 45035 ssh2
Sep  8 20:52:19 polaris sshd[8597]: Failed password for invalid user admin from 121.62.222.11 port 45035 ssh2
Sep  8 20:52:22 polaris sshd[8597]: Failed password for invalid user admin from 121.62.222.11 port 45035 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=121.62.222.11
2019-09-09 03:48:07
51.75.52.134 attackbots
Sep  8 09:29:24 wbs sshd\[4243\]: Invalid user server from 51.75.52.134
Sep  8 09:29:24 wbs sshd\[4243\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3130931.ip-51-75-52.eu
Sep  8 09:29:26 wbs sshd\[4243\]: Failed password for invalid user server from 51.75.52.134 port 54472 ssh2
Sep  8 09:35:11 wbs sshd\[4884\]: Invalid user gitblit from 51.75.52.134
Sep  8 09:35:11 wbs sshd\[4884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3130931.ip-51-75-52.eu
2019-09-09 03:41:34
77.247.108.202 attack
09/08/2019-15:34:47.137676 77.247.108.202 Protocol: 17 ET SCAN Sipvicious Scan
2019-09-09 03:56:03
198.108.67.51 attack
" "
2019-09-09 03:49:59
115.178.62.51 attack
2019-09-09T02:34:47.104492enmeeting.mahidol.ac.th sshd\[3850\]: Invalid user server from 115.178.62.51 port 49640
2019-09-09T02:34:47.122679enmeeting.mahidol.ac.th sshd\[3850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.178.62.51
2019-09-09T02:34:49.321700enmeeting.mahidol.ac.th sshd\[3850\]: Failed password for invalid user server from 115.178.62.51 port 49640 ssh2
...
2019-09-09 03:53:05
112.253.11.105 attackbotsspam
Sep  8 14:27:14 aat-srv002 sshd[25615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.253.11.105
Sep  8 14:27:17 aat-srv002 sshd[25615]: Failed password for invalid user uploader from 112.253.11.105 port 61605 ssh2
Sep  8 14:31:00 aat-srv002 sshd[25718]: Failed password for ftp from 112.253.11.105 port 38876 ssh2
Sep  8 14:34:50 aat-srv002 sshd[25815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.253.11.105
...
2019-09-09 03:52:24
106.52.23.167 attackspam
2019-09-08T18:37:34.891453abusebot-7.cloudsearch.cf sshd\[26963\]: Invalid user www from 106.52.23.167 port 56134
2019-09-09 03:09:49
182.69.208.228 attack
Configuration snooping (/cgi-bin/ViewLog.asp): "POST 127.0.0.1:80/cgi-bin/ViewLog.asp"
2019-09-09 03:47:09
222.186.34.171 attack
139/tcp 139/tcp
[2019-09-08]2pkt
2019-09-09 03:27:24
218.98.40.152 attackbots
Sep  8 21:53:34 MK-Soft-Root1 sshd\[1300\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.40.152  user=root
Sep  8 21:53:36 MK-Soft-Root1 sshd\[1300\]: Failed password for root from 218.98.40.152 port 47716 ssh2
Sep  8 21:53:38 MK-Soft-Root1 sshd\[1300\]: Failed password for root from 218.98.40.152 port 47716 ssh2
...
2019-09-09 03:58:00
75.31.93.181 attackbots
Sep  9 01:05:10 areeb-Workstation sshd[26948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.31.93.181
Sep  9 01:05:13 areeb-Workstation sshd[26948]: Failed password for invalid user test from 75.31.93.181 port 44464 ssh2
...
2019-09-09 03:40:44
217.61.20.241 attackbotsspam
Scanning random ports - tries to find possible vulnerable services
2019-09-09 03:23:32

最近上报的IP列表

176.65.148.68 77.68.6.216 123.220.94.80 147.185.133.163
188.166.219.219 165.232.43.198 143.198.165.121 80.94.92.158
107.172.20.103 167.172.149.199 167.172.90.204 60.190.252.115
104.28.94.138 82.213.153.144 146.190.82.177 60.190.252.139
192.168.50.17 205.198.70.172 230.160.191.239 157.245.197.148