必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       129.189.0.0 - 129.189.255.255
CIDR:           129.189.0.0/16
NetName:        TDST
NetHandle:      NET-129-189-0-0-1
Parent:         NET129 (NET-129-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   TDS TELECOM (TDST)
RegDate:        2022-03-15
Updated:        2022-03-15
Ref:            https://rdap.arin.net/registry/ip/129.189.0.0


OrgName:        TDS TELECOM
OrgId:          TDST
Address:        525 Junction Rd.
City:           Madison
StateProv:      WI
PostalCode:     53717
Country:        US
RegDate:        1994-12-16
Updated:        2024-11-25
Comment:        http://www.tdstelecom.com
Ref:            https://rdap.arin.net/registry/entity/TDST


OrgAbuseHandle: ABUSE163-ARIN
OrgAbuseName:   abuse
OrgAbusePhone:  +1-800-358-3648 
OrgAbuseEmail:  abuse@tds.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE163-ARIN

OrgTechHandle: INE14-ARIN
OrgTechName:   IP Network Engineering
OrgTechPhone:  +1-800-358-3648 
OrgTechEmail:  IPRequests@tdstelecom.com
OrgTechRef:    https://rdap.arin.net/registry/entity/INE14-ARIN

OrgTechHandle: SERVI6-ARIN
OrgTechName:   Service Activation
OrgTechPhone:  +1-800-358-3648 
OrgTechEmail:  serviceactivation@tdstelecom.com
OrgTechRef:    https://rdap.arin.net/registry/entity/SERVI6-ARIN

OrgTechHandle: INO44-ARIN
OrgTechName:   IP Network Operations
OrgTechPhone:  +1-800-358-3648 
OrgTechEmail:  ispadmin@tdstelecom.com
OrgTechRef:    https://rdap.arin.net/registry/entity/INO44-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.189.127.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43519
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.189.127.140.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041101 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 12 14:21:39 CST 2026
;; MSG SIZE  rcvd: 108
HOST信息:
140.127.189.129.in-addr.arpa domain name pointer h129-189-127-140.mdsnwi.tisp.static.tds.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.127.189.129.in-addr.arpa	name = h129-189-127-140.mdsnwi.tisp.static.tds.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
171.235.34.197 attack
unauthorized connection attempt
2020-02-19 18:22:37
119.28.232.240 attackbots
unauthorized connection attempt
2020-02-19 18:34:27
14.229.217.165 attackbots
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-02-19 18:06:23
191.255.67.202 attack
unauthorized connection attempt
2020-02-19 18:09:00
125.227.232.21 attack
Honeypot attack, port: 445, PTR: 125-227-232-21.HINET-IP.hinet.net.
2020-02-19 18:23:01
87.4.136.13 attack
unauthorized connection attempt
2020-02-19 18:13:54
59.126.14.253 attack
unauthorized connection attempt
2020-02-19 18:15:45
202.107.201.232 attackbots
unauthorized connection attempt
2020-02-19 18:08:18
35.228.162.115 attackbotsspam
C1,WP GET /suche/blog/wp-login.php
2020-02-19 18:27:27
139.162.125.159 attack
unauthorized connection attempt
2020-02-19 18:18:11
157.245.133.78 attackspambots
C1,WP GET /suche/wp-login.php
2020-02-19 18:41:04
124.46.251.75 attackspam
unauthorized connection attempt
2020-02-19 18:23:25
82.102.173.78 attackspam
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2020-02-19 18:14:55
60.23.80.218 attack
unauthorized connection attempt
2020-02-19 18:44:31
223.202.202.208 attack
unauthorized connection attempt
2020-02-19 18:16:13

最近上报的IP列表

88.101.166.248 194.136.156.225 167.53.71.61 165.227.20.212
103.12.148.144 168.144.100.90 154.222.29.11 154.222.29.222
2606:4700:10::6816:986 2606:4700:10::ac43:1884 2606:4700:10::6816:2014 2606:4700:10::6816:2247
110.77.226.34 110.78.154.183 2606:4700:10::6814:5156 2606:4700:10::6814:5371
14.207.194.130 88.101.166.148 242.176.27.23 91.230.168.91