必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): India

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#


NetRange:       139.5.0.0 - 139.5.19.255
CIDR:           139.5.0.0/20, 139.5.16.0/22
NetName:        APNIC-ERX-139-5-0-0
NetHandle:      NET-139-5-0-0-1
Parent:         NET139 (NET-139-0-0-0-0)
NetType:        Early Registrations, Transferred to APNIC
OriginAS:       
Organization:   Asia Pacific Network Information Centre (APNIC)
RegDate:        2015-09-04
Updated:        2022-03-08
Comment:        This IP address range is not registered in the ARIN database.
Comment:        This range was transferred to the APNIC Whois Database as
Comment:        part of the ERX (Early Registration Transfer) project.
Comment:        For details, refer to the APNIC Whois Database via
Comment:        WHOIS.APNIC.NET or http://wq.apnic.net/apnic-bin/whois.pl
Comment:        
Comment:        ** IMPORTANT NOTE: APNIC is the Regional Internet Registry
Comment:        for the Asia Pacific region. APNIC does not operate networks
Comment:        using this IP address range and is not able to investigate
Comment:        spam or abuse reports relating to these addresses. For more
Comment:        help, refer to http://www.apnic.net/apnic-info/whois_search2/abuse-and-spamming
Ref:            https://rdap.arin.net/registry/ip/139.5.0.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois.apnic.net


OrgName:        Asia Pacific Network Information Centre
OrgId:          APNIC
Address:        PO Box 3646
City:           South Brisbane
StateProv:      QLD
PostalCode:     4101
Country:        AU
RegDate:        
Updated:        2012-01-24
Ref:            https://rdap.arin.net/registry/entity/APNIC

ReferralServer:  whois://whois.apnic.net
ResourceLink:  https://apps.db.ripe.net/db-web-ui/query

OrgAbuseHandle: AWC12-ARIN
OrgAbuseName:   APNIC Whois Contact
OrgAbusePhone:  +61 7 3858 3188 
OrgAbuseEmail:  search-apnic-not-arin@apnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN

OrgTechHandle: AWC12-ARIN
OrgTechName:   APNIC Whois Contact
OrgTechPhone:  +61 7 3858 3188 
OrgTechEmail:  search-apnic-not-arin@apnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.apnic.net.

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '139.5.0.0 - 139.5.3.255'

% Abuse contact for '139.5.0.0 - 139.5.3.255' is 'abuse@railtelindia.com'

inetnum:        139.5.0.0 - 139.5.3.255
netname:        RAILTEL-IN
descr:          RailTel Corporation is an Internet Service Provider.
country:        IN
admin-c:        NA1011-AP
tech-c:         NA1011-AP
abuse-c:        NA1011-AP
status:         ALLOCATED PORTABLE
mnt-by:         MAINT-IN-IRINN
mnt-lower:      MAINT-IN-RAILTEL
mnt-lower:      MAINT-IN-IRINN
mnt-routes:     MAINT-IN-RAILTEL
mnt-routes:     MAINT-IN-IRINN
mnt-irt:        IRT-RAILTEL-IN
last-modified:  2025-08-11T22:56:46Z
source:         APNIC

irt:            IRT-RAILTEL-IN
address:        Plot No, 143
address:        Sector 44 ,Gurugram
address:        Haryana ,122003
e-mail:         abuse@railtelindia.com
abuse-mailbox:  abuse@railtelindia.com
admin-c:        NA1011-AP
tech-c:         NA1011-AP
auth:           # Filtered
mnt-by:         MAINT-IN-RAILTEL
mnt-by:         MAINT-IN-IRINN
last-modified:  2025-09-27T12:14:45Z
source:         APNIC

person:         Network Administrator
address:        Plate-A, 6th Floor, Office Block Tower-2,
address:        East Kidwai Nagar, New Delhi-110023
country:        IN
phone:          +91 11 22900600
e-mail:         ipadmin@railtel.in
nic-hdl:        NA1011-AP
mnt-by:         MAINT-IN-RAILTEL
mnt-by:         MAINT-IN-IRINN
fax-no:         +91 11 22900699
last-modified:  2025-09-27T09:36:11Z
source:         APNIC

% Information related to '139.5.0.0/24AS24186'

route:          139.5.0.0/24
descr:          Railtel Enterprise Limited
origin:         AS24186
mnt-by:         MAINT-IN-REL
mnt-by:         MAINT-IN-IRINN
last-modified:  2025-09-27T09:57:55Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.5.0.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22690
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.5.0.113.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025101701 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 18 11:01:10 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
b'113.0.5.139.in-addr.arpa domain name pointer ws113-0.5.139.rcil.gov.in.
'
NSLOOKUP信息:
b'113.0.5.139.in-addr.arpa	name = ws113-0.5.139.rcil.gov.in.

Authoritative answers can be found from:

'
相关IP信息:
最新评论:
IP 类型 评论内容 时间
117.6.94.132 attack
Unauthorized connection attempt detected from IP address 117.6.94.132 to port 445 [T]
2020-08-14 00:59:11
218.253.34.97 attackbots
Unauthorized connection attempt detected from IP address 218.253.34.97 to port 5555 [T]
2020-08-14 01:10:51
181.143.246.2 attack
Unauthorized connection attempt detected from IP address 181.143.246.2 to port 3390 [T]
2020-08-14 01:16:24
176.40.226.100 attackbots
Unauthorized connection attempt detected from IP address 176.40.226.100 to port 445 [T]
2020-08-14 01:17:31
45.243.231.95 attack
Unauthorized connection attempt detected from IP address 45.243.231.95 to port 445 [T]
2020-08-14 01:06:42
222.186.61.19 attackbots
firewall-block, port(s): 83/tcp, 9001/tcp
2020-08-14 01:32:10
186.226.160.227 attackspam
Unauthorized connection attempt detected from IP address 186.226.160.227 to port 445 [T]
2020-08-14 01:13:50
37.49.224.158 attackspambots
port scan and connect, tcp 81 (hosts2-ns)
2020-08-14 01:31:00
91.239.19.47 attack
Unauthorized connection attempt detected from IP address 91.239.19.47 to port 445 [T]
2020-08-14 01:24:39
115.239.242.86 attack
" "
2020-08-14 00:59:29
42.113.121.253 attackspam
Unauthorized connection attempt detected from IP address 42.113.121.253 to port 445 [T]
2020-08-14 01:30:39
41.216.172.34 attack
Unauthorized connection attempt detected from IP address 41.216.172.34 to port 1433 [T]
2020-08-14 01:07:55
160.16.223.96 attackbots
Unauthorized connection attempt detected from IP address 160.16.223.96 to port 23 [T]
2020-08-14 00:55:53
117.4.50.102 attackspambots
Unauthorized connection attempt detected from IP address 117.4.50.102 to port 445 [T]
2020-08-14 01:20:16
112.206.117.202 attackspambots
Unauthorized connection attempt detected from IP address 112.206.117.202 to port 445 [T]
2020-08-14 01:00:43

最近上报的IP列表

167.99.191.65 125.122.13.182 113.141.86.87 113.215.189.192
8.219.175.228 47.236.234.142 96.62.49.200 172.68.173.138
38.66.201.212 120.92.51.170 117.151.37.60 43.188.40.204
43.188.40.209 43.188.40.191 91.202.233.79 188.132.137.114
162.243.73.133 20.171.27.90 107.161.215.242 107.161.215.214