必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Vinhedo

省份(region): Sao Paulo

国家(country): Brazil

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       129.121.0.0 - 129.121.255.255
CIDR:           129.121.0.0/16
NetName:        OGTIPS1-129-121
NetHandle:      NET-129-121-0-0-1
Parent:         NET129 (NET-129-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Oso Grande IP Services, LLC (OGISL)
RegDate:        1988-03-11
Updated:        2026-04-16
Comment:        OCITOKEN::129.121.32.0/22:cc7c27d7f667d6c52ee067a7972a4f2b92b00a4791306da0d3f485a5d8572e1c
Comment:        OCITOKEN::129.121.64.0/23:675603fbdfe90052619455238e113820abb7061dba71c369209c4af8547f610d
Comment:        OCITOKEN::129.121.72.0/22:1d3664745c87073aedb71dc6fe9f1b8c453594b459ee27d45082510e8536beae
Comment:        OCITOKEN::129.121.36.0/22:9e18327589fa1b8c7e4f9303e86a92f0f57604dc2bcef4cfa90f4cdecc50ccda
Comment:        OCITOKEN::129.121.40.0/22:aaad20ae303f1527b57465864d2062705118d31624812bde4cbbb7a72790b045
Comment:        OCITOKEN::129.121.44.0/22:293e0715b8cff10349a83dfc6c41c4350d3b37e21a7993973c110b27d60882ee
Comment:        OCITOKEN::129.121.76.0/22:a946ac52e9c38493fd22b4a1e78e08ba64b1969db85b8d03e7e2c1e1c22adc8b
Comment:        OCITOKEN::129.121.80.0/23:b0bf3648475a45d8311ecdca177659c00ab312b6d7673778de1c540a933ddd1e
Comment:        OCITOKEN::129.121.48.0/21:1a61a1e11b75c35dcf0f0529fd315fb01a51e5d038dd3d409bda17f7b532c1a2
Comment:        OCITOKEN::129.121.84.0/22:25a7c1cf5ff21b13e77f1c506b236ed2fa94bb89311a3800dd2123481445876c
Comment:        OCITOKEN::129.121.82.0/23:1e898c6a9f02d5bb26c5faf9c80b1eeeada28babbfa9538d5ff858e5173a3d10
Comment:        OCITOKEN::129.121.88.0/22:da957aec850f6cf9471ca01537639e580eec104cd4364bf39fda1e59eae14155
Comment:        OCITOKEN::129.121.56.0/22:11898f8829bb0c23f3e203c9166ec8838f0ebaa259f128c7c6e3765accd2fa0d
Comment:        OCITOKEN::129.121.60.0/22:8c8c2cc72e33c7a70673fe366b15e8d0fe0a08ee594ba5cbfd06e10682ad777f
Comment:        OCITOKEN::129.121.96.0/21:866b1ba1c96c3208ccf17357863e659d2d8c10daabd0e8a1f49fe24cdabf5930
Comment:        OCITOKEN::129.121.92.0/22:4ed8eb18309a39014c79229a73e545b7b44d661b58cac6027dedb0965e8ddbdb
Ref:            https://rdap.arin.net/registry/ip/129.121.0.0


OrgName:        Oso Grande IP Services, LLC
OrgId:          OGISL
Address:        C/O A Small Orange LLC
Address:        10 Corporate Drive
City:           Burlington
StateProv:      MA
PostalCode:     01803
Country:        US
RegDate:        2013-09-10
Updated:        2026-02-17
Ref:            https://rdap.arin.net/registry/entity/OGISL


OrgTechHandle: ENO74-ARIN
OrgTechName:   EIG Network Operations
OrgTechPhone:  +1-781-852-3200 
OrgTechEmail:  eig-net-team@endurance.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ENO74-ARIN

OrgAbuseHandle: EIGAB1-ARIN
OrgAbuseName:   EIG-Abuse Mitigation
OrgAbusePhone:  +1-877-659-6181 
OrgAbuseEmail:  IARPOC@Newfold.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/EIGAB1-ARIN

OrgNOCHandle: ENO74-ARIN
OrgNOCName:   EIG Network Operations
OrgNOCPhone:  +1-781-852-3200 
OrgNOCEmail:  eig-net-team@endurance.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/ENO74-ARIN

RNOCHandle: NOC13063-ARIN
RNOCName:   Network Operations Center
RNOCPhone:  +1-919-408-7600 
RNOCEmail:  noc@asmallorange.com
RNOCRef:    https://rdap.arin.net/registry/entity/NOC13063-ARIN

RTechHandle: NOC13063-ARIN
RTechName:   Network Operations Center
RTechPhone:  +1-919-408-7600 
RTechEmail:  noc@asmallorange.com
RTechRef:    https://rdap.arin.net/registry/entity/NOC13063-ARIN

RAbuseHandle: ABUSE3681-ARIN
RAbuseName:   Abuse
RAbusePhone:  +1-877-659-6181 
RAbuseEmail:  IARPOC@Newfold.com
RAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE3681-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.121.38.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4732
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.121.38.216.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042501 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 26 03:30:34 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
216.38.121.129.in-addr.arpa domain name pointer 129-121-38-216.unifiedlayer.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
216.38.121.129.in-addr.arpa	name = 129-121-38-216.unifiedlayer.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
178.128.54.223 attackbotsspam
Jul 25 20:06:33 mail sshd\[26026\]: Invalid user miteq from 178.128.54.223 port 20321
Jul 25 20:06:33 mail sshd\[26026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.54.223
...
2019-07-26 03:13:12
50.233.42.98 attackspambots
2019-07-25 07:32:43 H=(50-233-42-98-static.hfc.comcastbusiness.net) [50.233.42.98]:33966 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/query/ip/50.233.42.98)
2019-07-25 07:32:44 H=(50-233-42-98-static.hfc.comcastbusiness.net) [50.233.42.98]:33966 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/sbl/query/SBLCSS)
2019-07-25 07:32:45 H=(50-233-42-98-static.hfc.comcastbusiness.net) [50.233.42.98]:33966 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/sbl/query/SBLCSS)
...
2019-07-26 03:18:43
40.124.4.131 attackspambots
Jul 25 18:39:05 marvibiene sshd[18139]: Invalid user qhsupport from 40.124.4.131 port 50908
Jul 25 18:39:05 marvibiene sshd[18139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.124.4.131
Jul 25 18:39:05 marvibiene sshd[18139]: Invalid user qhsupport from 40.124.4.131 port 50908
Jul 25 18:39:06 marvibiene sshd[18139]: Failed password for invalid user qhsupport from 40.124.4.131 port 50908 ssh2
...
2019-07-26 03:24:36
78.186.198.117 attack
Honeypot attack, port: 23, PTR: 78.186.198.117.static.ttnet.com.tr.
2019-07-26 03:10:44
160.16.100.16 attack
Brute force SMTP login attempted.
...
2019-07-26 03:28:49
212.64.26.131 attackspam
ssh failed login
2019-07-26 02:58:01
203.48.246.66 attack
Unauthorized SSH login attempts
2019-07-26 03:20:07
159.65.245.203 attackbots
Jul 25 18:38:16 XXXXXX sshd[48057]: Invalid user michael from 159.65.245.203 port 36690
2019-07-26 03:01:20
23.129.64.165 attackspambots
scan r
2019-07-26 03:26:36
148.70.71.137 attackbotsspam
Jul 25 19:16:23 mail sshd\[24575\]: Failed password for invalid user ronaldo from 148.70.71.137 port 36081 ssh2
Jul 25 19:35:38 mail sshd\[25018\]: Invalid user git from 148.70.71.137 port 54576
...
2019-07-26 03:24:10
5.103.131.229 attackspambots
Jul 25 19:41:24 vpn01 sshd\[24569\]: Invalid user farah from 5.103.131.229
Jul 25 19:41:24 vpn01 sshd\[24569\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.103.131.229
Jul 25 19:41:26 vpn01 sshd\[24569\]: Failed password for invalid user farah from 5.103.131.229 port 33516 ssh2
2019-07-26 02:50:29
36.89.209.22 attack
Jul 25 18:17:03 [munged] sshd[29343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.89.209.22  user=root
Jul 25 18:17:04 [munged] sshd[29343]: Failed password for root from 36.89.209.22 port 36880 ssh2
2019-07-26 03:05:24
185.93.41.62 attackspambots
[portscan] Port scan
2019-07-26 02:42:39
79.7.206.177 attackspam
Jul 25 21:05:32 ubuntu-2gb-nbg1-dc3-1 sshd[29860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.7.206.177
Jul 25 21:05:34 ubuntu-2gb-nbg1-dc3-1 sshd[29860]: Failed password for invalid user scaner from 79.7.206.177 port 52505 ssh2
...
2019-07-26 03:20:37
67.248.141.225 attackbots
SSH Brute Force, server-1 sshd[24922]: Failed password for invalid user connect from 67.248.141.225 port 49890 ssh2
2019-07-26 03:03:44

最近上报的IP列表

218.106.207.221 2606:4700:10::6816:794 2606:4700:10::6816:165 2606:4700:10::6814:5423
2606:4700:10::6816:1659 165.140.238.64 160.119.76.21 159.223.38.45
25.217.185.55 234.193.57.221 193.24.123.118 110.78.150.155
2606:4700:10::6814:7899 2606:4700:10::6814:5571 14.212.68.129 118.193.40.131
147.185.133.212 43.230.106.23 124.198.131.220 54.242.178.61