必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       136.249.0.0 - 136.254.255.255
CIDR:           136.249.0.0/16, 136.250.0.0/15, 136.254.0.0/16, 136.252.0.0/15
NetName:        SLB-WESTERNGECO-GLOBAL-DP-MARINE-LAND-NET
NetHandle:      NET-136-249-0-0-1
Parent:         NET136 (NET-136-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Schlumberger Limited (SCHLU-3)
RegDate:        1989-05-15
Updated:        2012-03-02
Ref:            https://rdap.arin.net/registry/ip/136.249.0.0


OrgName:        Schlumberger Limited
OrgId:          SCHLU-3
Address:        5599 San Felipe
Address:        Suite 1700
City:           Houston
StateProv:      TX
PostalCode:     77056
Country:        US
RegDate:        2005-02-16
Updated:        2024-11-25
Ref:            https://rdap.arin.net/registry/entity/SCHLU-3


OrgAbuseHandle: SISO-ARIN
OrgAbuseName:   Schlumberger IT Security Operations
OrgAbusePhone:  +1-713-513-1100 
OrgAbuseEmail:  hostmaster@slb.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/SISO-ARIN

OrgTechHandle: ZS104-ARIN
OrgTechName:   Schlumberger IP Address Coordinator
OrgTechPhone:  +1-713-513-1100 
OrgTechEmail:  hostmaster@slb.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ZS104-ARIN

OrgNOCHandle: SHEWD-ARIN
OrgNOCName:   Schlumberger Houston EMC WAN Desk
OrgNOCPhone:  +1-713-513-2028 
OrgNOCEmail:  hostmaster@slb.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/SHEWD-ARIN

RNOCHandle: SHEWD-ARIN
RNOCName:   Schlumberger Houston EMC WAN Desk
RNOCPhone:  +1-713-513-2028 
RNOCEmail:  hostmaster@slb.com
RNOCRef:    https://rdap.arin.net/registry/entity/SHEWD-ARIN

RAbuseHandle: SISO-ARIN
RAbuseName:   Schlumberger IT Security Operations
RAbusePhone:  +1-713-513-1100 
RAbuseEmail:  hostmaster@slb.com
RAbuseRef:    https://rdap.arin.net/registry/entity/SISO-ARIN

RTechHandle: ZS104-ARIN
RTechName:   Schlumberger IP Address Coordinator
RTechPhone:  +1-713-513-1100 
RTechEmail:  hostmaster@slb.com
RTechRef:    https://rdap.arin.net/registry/entity/ZS104-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.249.240.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59859
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.249.240.220.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042800 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 28 14:36:33 CST 2026
;; MSG SIZE  rcvd: 108
HOST信息:
220.240.249.136.in-addr.arpa domain name pointer host.slb.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
220.240.249.136.in-addr.arpa	name = host.slb.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
122.147.2.194 attackspam
Port Scan: UDP/49153
2019-08-24 11:48:41
119.84.8.43 attack
Aug 23 16:52:15 hiderm sshd\[19581\]: Invalid user secretaria from 119.84.8.43
Aug 23 16:52:15 hiderm sshd\[19581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.84.8.43
Aug 23 16:52:16 hiderm sshd\[19581\]: Failed password for invalid user secretaria from 119.84.8.43 port 40351 ssh2
Aug 23 16:54:17 hiderm sshd\[19761\]: Invalid user janet from 119.84.8.43
Aug 23 16:54:17 hiderm sshd\[19761\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.84.8.43
2019-08-24 11:15:10
177.21.120.102 attackbots
proto=tcp  .  spt=36699  .  dpt=25  .     (listed on Blocklist de  Aug 23)     (150)
2019-08-24 11:20:28
125.22.76.76 attack
Aug 24 04:41:49 vps691689 sshd[867]: Failed password for root from 125.22.76.76 port 29463 ssh2
Aug 24 04:48:30 vps691689 sshd[1020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.22.76.76
...
2019-08-24 11:35:48
187.211.171.229 attackbotsspam
Port Scan: TCP/23
2019-08-24 11:42:15
195.154.164.242 attackbotsspam
Port Scan: TCP/80
2019-08-24 11:41:43
109.227.196.32 attackspambots
Port Scan: TCP/445
2019-08-24 11:50:55
115.132.127.188 attackbots
Aug 24 04:15:28 www sshd\[153081\]: Invalid user usuario from 115.132.127.188
Aug 24 04:15:28 www sshd\[153081\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.132.127.188
Aug 24 04:15:30 www sshd\[153081\]: Failed password for invalid user usuario from 115.132.127.188 port 35634 ssh2
...
2019-08-24 11:19:17
177.62.168.213 attackspam
Port Scan: TCP/60001
2019-08-24 11:45:12
167.99.13.51 attack
Aug 23 16:52:25 sachi sshd\[27314\]: Invalid user ginger from 167.99.13.51
Aug 23 16:52:25 sachi sshd\[27314\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.13.51
Aug 23 16:52:27 sachi sshd\[27314\]: Failed password for invalid user ginger from 167.99.13.51 port 42484 ssh2
Aug 23 16:59:20 sachi sshd\[27937\]: Invalid user wwwrun from 167.99.13.51
Aug 23 16:59:20 sachi sshd\[27937\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.13.51
2019-08-24 11:01:47
186.201.214.163 attackbots
Aug 24 05:54:07 www sshd\[47562\]: Invalid user gogs from 186.201.214.163Aug 24 05:54:09 www sshd\[47562\]: Failed password for invalid user gogs from 186.201.214.163 port 27297 ssh2Aug 24 05:59:21 www sshd\[47586\]: Invalid user vermont from 186.201.214.163
...
2019-08-24 11:09:41
51.68.173.108 attackspambots
Aug 24 05:10:13 SilenceServices sshd[8536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.173.108
Aug 24 05:10:15 SilenceServices sshd[8536]: Failed password for invalid user jenkins from 51.68.173.108 port 42274 ssh2
Aug 24 05:14:15 SilenceServices sshd[11854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.173.108
2019-08-24 11:29:29
103.28.219.143 attackspam
Aug 23 17:03:16 tdfoods sshd\[24770\]: Invalid user tez from 103.28.219.143
Aug 23 17:03:16 tdfoods sshd\[24770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.28.219.143
Aug 23 17:03:18 tdfoods sshd\[24770\]: Failed password for invalid user tez from 103.28.219.143 port 40234 ssh2
Aug 23 17:08:14 tdfoods sshd\[25205\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.28.219.143  user=root
Aug 23 17:08:16 tdfoods sshd\[25205\]: Failed password for root from 103.28.219.143 port 30229 ssh2
2019-08-24 11:15:49
83.19.99.65 attackbots
proto=tcp  .  spt=54115  .  dpt=25  .     (listed on Blocklist de  Aug 23)     (151)
2019-08-24 11:17:40
175.150.213.204 attack
Port Scan: TCP/8081
2019-08-24 11:46:06

最近上报的IP列表

10.132.222.123 121.230.89.97 2606:4700:10::6814:8062 2606:4700:10::6814:8426
2606:4700:10::6816:3973 104.168.109.197 131.9.39.151 178.22.135.141
58.240.69.236 191.206.80.25 12.12.96.130 166.112.130.151
196.152.213.82 36.140.162.242 49.231.122.72 2606:4700:10::6814:7291
2606:4700:10::6814:7152 2606:4700:10::6816:526 150.109.12.46 185.145.240.105