必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Lahore

省份(region): Punjab

国家(country): Pakistan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '110.39.231.0 - 110.39.231.255'

% Abuse contact for '110.39.231.0 - 110.39.231.255' is 'whois@wateen.com'

inetnum:        110.39.231.0 - 110.39.231.255
netname:        WATEEN-TEL
descr:          National Wimax/IMS environment
country:        PK
admin-c:        WS1673-AP
tech-c:         WS1673-AP
abuse-c:        AW997-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-PK-WATEEN
mnt-irt:        IRT-WATEENTEL-PK
geoloc:         31.457933501 74.252230242
last-modified:  2025-05-26T05:42:36Z
source:         APNIC

irt:            IRT-WATEENTEL-PK
address:        Wateen Telecom Limited Main Walton Road, Opp. Bab-e-Pakistan, Walton Cantt., Lahore
e-mail:         whois@wateen.com
abuse-mailbox:  whois@wateen.com
admin-c:        WS1673-AP
tech-c:         WS1673-AP
auth:           # Filtered
remarks:        whois@wateen.com was validated on 2025-12-03
mnt-by:         MAINT-PK-WATEEN
last-modified:  2025-12-03T05:30:49Z
source:         APNIC

role:           ABUSE WATEENTELPK
country:        ZZ
address:        Wateen Telecom Limited Main Walton Road, Opp. Bab-e-Pakistan, Walton Cantt., Lahore
phone:          +000000000
e-mail:         whois@wateen.com
admin-c:        WS1673-AP
tech-c:         WS1673-AP
nic-hdl:        AW997-AP
remarks:        Generated from irt object IRT-WATEENTEL-PK
remarks:        whois@wateen.com was validated on 2025-12-03
abuse-mailbox:  whois@wateen.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-12-03T05:31:00Z
source:         APNIC

person:         Wateen Support
address:        Wateen Telecom Limited Main Walton Road, Opp. Bab-e-Pakistan, Walton Cantt., Lahore
country:        PK
phone:          +92-111 365 111
e-mail:         whois@wateen.com
nic-hdl:        WS1673-AP
mnt-by:         MAINT-PK-WATEEN
last-modified:  2025-05-13T05:51:27Z
source:         APNIC

% Information related to '110.39.231.0/24AS38264'

route:          110.39.231.0/24
descr:          ISB SOHO SHRD
origin:         AS38264
mnt-by:         MAINT-PK-WATEEN
last-modified:  2019-07-22T10:50:01Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 110.39.231.61
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37198
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;110.39.231.61.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026012701 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 28 05:00:31 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
61.231.39.110.in-addr.arpa domain name pointer WGPON-39231-61.wateen.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
61.231.39.110.in-addr.arpa	name = WGPON-39231-61.wateen.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
116.102.42.204 attackspam
Unauthorized connection attempt detected from IP address 116.102.42.204 to port 5555 [J]
2020-02-01 01:30:54
111.231.144.41 attack
Port scan detected on ports: 1433[TCP], 1433[TCP], 65529[TCP]
2020-02-01 02:02:51
190.254.1.234 attackbotsspam
Unauthorized connection attempt detected from IP address 190.254.1.234 to port 445
2020-02-01 02:05:22
52.56.32.218 attack
W 31101,/var/log/nginx/access.log,-,-
2020-02-01 01:44:22
92.119.160.143 attackspam
01/31/2020-12:32:15.866062 92.119.160.143 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-02-01 01:40:08
124.228.9.126 attack
Jan 31 12:48:57 plusreed sshd[22721]: Invalid user hadoop from 124.228.9.126
Jan 31 12:48:57 plusreed sshd[22721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.228.9.126
Jan 31 12:48:57 plusreed sshd[22721]: Invalid user hadoop from 124.228.9.126
Jan 31 12:48:59 plusreed sshd[22721]: Failed password for invalid user hadoop from 124.228.9.126 port 55122 ssh2
...
2020-02-01 02:06:14
222.186.190.92 attackspambots
Jan 31 18:47:14 SilenceServices sshd[27592]: Failed password for root from 222.186.190.92 port 33546 ssh2
Jan 31 18:47:18 SilenceServices sshd[27592]: Failed password for root from 222.186.190.92 port 33546 ssh2
Jan 31 18:47:27 SilenceServices sshd[27592]: error: maximum authentication attempts exceeded for root from 222.186.190.92 port 33546 ssh2 [preauth]
2020-02-01 01:58:00
122.226.238.138 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2020-02-01 01:49:32
14.186.180.178 attackbots
2020-01-31 18:31:35 auth_cram_md5 authenticator failed for (127.0.0.1) [14.186.180.178]: 535 Incorrect authentication data (set_id=info@polypics.ru)
2020-01-31 18:31:41 auth_plain authenticator failed for (127.0.0.1) [14.186.180.178]: 535 Incorrect authentication data (set_id=info@polypics.ru)
...
2020-02-01 02:16:06
42.118.106.220 attack
Unauthorized connection attempt detected from IP address 42.118.106.220 to port 23 [J]
2020-02-01 01:46:48
34.254.162.36 attackspam
(mod_security) mod_security (id:930130) triggered by 34.254.162.36 (IE/Ireland/ec2-34-254-162-36.eu-west-1.compute.amazonaws.com): 5 in the last 3600 secs
2020-02-01 02:15:48
203.101.188.170 attackspambots
Unauthorized connection attempt from IP address 203.101.188.170 on Port 445(SMB)
2020-02-01 02:16:30
45.58.123.178 attackbotsspam
" "
2020-02-01 01:37:20
104.140.188.58 attack
01/31/2020-13:06:42.526138 104.140.188.58 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-02-01 02:11:55
182.76.160.138 attackbotsspam
Jan 31 18:04:41 server sshd[37841]: Failed password for invalid user radio from 182.76.160.138 port 56568 ssh2
Jan 31 18:11:40 server sshd[38151]: Failed password for invalid user temp from 182.76.160.138 port 60648 ssh2
Jan 31 18:32:15 server sshd[38678]: Failed password for invalid user wwwadm from 182.76.160.138 port 42736 ssh2
2020-02-01 01:37:50

最近上报的IP列表

23.234.109.247 27.46.125.207 46.171.161.190 139.59.17.60
104.198.74.63 49.235.155.25 99.84.25.223 39.100.83.205
103.100.84.233 20.169.106.128 175.178.116.123 85.234.83.84
167.71.229.26 44.197.19.56 4.241.184.25 54.159.252.252
3.94.187.229 159.65.170.213 217.76.59.17 198.211.108.132