必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Tokyo

省份(region): Tokyo

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       137.220.128.0 - 137.220.255.255
CIDR:           137.220.128.0/17
NetName:        APNIC
NetHandle:      NET-137-220-128-0-1
Parent:         NET137 (NET-137-0-0-0-0)
NetType:        Early Registrations, Transferred to APNIC
OriginAS:       
Organization:   Asia Pacific Network Information Centre (APNIC)
RegDate:        2019-06-05
Updated:        2019-06-05
Ref:            https://rdap.arin.net/registry/ip/137.220.128.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois://whois.apnic.net


OrgName:        Asia Pacific Network Information Centre
OrgId:          APNIC
Address:        PO Box 3646
City:           South Brisbane
StateProv:      QLD
PostalCode:     4101
Country:        AU
RegDate:        
Updated:        2012-01-24
Ref:            https://rdap.arin.net/registry/entity/APNIC

ReferralServer:  whois://whois.apnic.net
ResourceLink:  https://apps.db.ripe.net/db-web-ui/query

OrgTechHandle: AWC12-ARIN
OrgTechName:   APNIC Whois Contact
OrgTechPhone:  +61 7 3858 3188 
OrgTechEmail:  search-apnic-not-arin@apnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN

OrgAbuseHandle: AWC12-ARIN
OrgAbuseName:   APNIC Whois Contact
OrgAbusePhone:  +61 7 3858 3188 
OrgAbuseEmail:  search-apnic-not-arin@apnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.apnic.net.

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '137.220.192.0 - 137.220.255.255'

% Abuse contact for '137.220.192.0 - 137.220.255.255' is 'cs.mail@ctgserver.com'

inetnum:        137.220.192.0 - 137.220.255.255
netname:        CTG220-192-JP
descr:          CTG Server Ltd.
country:        JP
admin-c:        RCPL3-AP
tech-c:         RCPL3-AP
abuse-c:        AC2487-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-RCPL-SG
mnt-irt:        IRT-CTG-HK
last-modified:  2022-03-30T17:10:01Z
source:         APNIC

irt:            IRT-CTG-HK
address:        202 ,2/F Kam Sang BLDG 257,Des Voeux RD Central Hong Kong
e-mail:         cs.mail@ctgserver.com
abuse-mailbox:  cs.mail@ctgserver.com
admin-c:        RCPL3-AP
tech-c:         RCPL3-AP
auth:           # Filtered
remarks:        cs.mail@ctgserver.com
remarks:        cs.mail@ctgserver.com was validated on 2025-07-31
mnt-by:         MAINT-RCPL-SG
last-modified:  2025-11-18T00:34:04Z
source:         APNIC

role:           ABUSE CTGHK
country:        ZZ
address:        202 ,2/F Kam Sang BLDG 257,Des Voeux RD Central Hong Kong
phone:          +000000000
e-mail:         cs.mail@ctgserver.com
admin-c:        RCPL3-AP
tech-c:         RCPL3-AP
nic-hdl:        AC2487-AP
remarks:        Generated from irt object IRT-CTG-HK
remarks:        cs.mail@ctgserver.com was validated on 2025-07-31
abuse-mailbox:  cs.mail@ctgserver.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-07-31T03:16:34Z
source:         APNIC

role:           RACKIP CONSULTANCY PTE LTD administrator
address:        399 Chai Wan Road, Chai Wan, Hong Kong
country:        SG
phone:          +603-7806-1316
fax-no:         +603-7806-1316
e-mail:         abuse@rackip.com
admin-c:        RCPL3-AP
tech-c:         RCPL3-AP
nic-hdl:        RCPL3-AP
mnt-by:         MAINT-RCPL-SG
last-modified:  2021-08-30T06:13:42Z
source:         APNIC

% Information related to '137.220.227.0/24AS152194'

route:          137.220.227.0/24
origin:         AS152194
descr:          RACKIP CONSULTANCY PTE. LTD.
                No. 3, Pemimpin Drive, #07-04 Lip Hing, Industrial Building,
mnt-by:         MAINT-RCPL-SG
last-modified:  2024-03-23T13:56:22Z
source:         APNIC

% Information related to '137.220.227.0/24AS64050'

route:          137.220.227.0/24
origin:         AS64050
descr:          RACKIP CONSULTANCY PTE. LTD.
                No. 3, Pemimpin Drive, #07-04 Lip Hing, Industrial Building,
mnt-by:         MAINT-RCPL-SG
last-modified:  2020-05-20T04:58:52Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.220.227.243
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36401
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.220.227.243.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026012600 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 26 18:53:44 CST 2026
;; MSG SIZE  rcvd: 108
HOST信息:
Host 243.227.220.137.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 243.227.220.137.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.38.238.87 attackbotsspam
Jul 21 07:11:57 icinga sshd[4666]: Failed password for root from 51.38.238.87 port 56728 ssh2
...
2019-07-21 15:10:04
188.143.31.150 attackbots
Sat, 20 Jul 2019 21:53:48 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 15:07:34
181.192.250.96 attack
Sat, 20 Jul 2019 21:53:54 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 14:49:04
36.89.229.145 attackspam
Sat, 20 Jul 2019 21:53:47 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 15:13:12
197.254.29.190 attackbotsspam
Sat, 20 Jul 2019 21:53:51 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 14:57:35
45.116.233.13 attack
Sat, 20 Jul 2019 21:53:58 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 14:38:52
85.115.224.210 attackbots
Sat, 20 Jul 2019 21:53:50 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 14:59:48
117.4.238.210 attackspambots
Sat, 20 Jul 2019 21:53:56 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 14:44:02
49.148.143.235 attackbots
Sat, 20 Jul 2019 21:53:53 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 14:51:37
31.0.127.222 attackbotsspam
Sat, 20 Jul 2019 21:53:50 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 15:03:21
202.142.173.74 attackbotsspam
Sat, 20 Jul 2019 21:53:57 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 14:39:58
202.142.151.162 attackbotsspam
Unauthorized connection attempt from IP address 202.142.151.162 on Port 445(SMB)
2019-07-21 14:48:20
182.38.112.224 attackspambots
" "
2019-07-21 14:40:32
42.118.50.21 attackspambots
Sat, 20 Jul 2019 21:53:46 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 15:15:09
139.59.17.173 attackspambots
Jul 21 06:54:52 debian sshd\[6317\]: Invalid user wp-user from 139.59.17.173 port 33790
Jul 21 06:54:52 debian sshd\[6317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.17.173
...
2019-07-21 14:49:56

最近上报的IP列表

31.130.155.161 185.247.137.82 61.54.29.207 112.97.82.15
140.174.161.179 34.148.187.47 14.220.182.154 173.82.226.18
142.171.201.207 34.52.153.230 188.253.124.73 1.234.44.150
183.192.195.199 39.156.130.185 209.85.128.177 44.220.185.58
192.168.0.64 13.79.87.25 194.88.135.172 106.8.72.230