必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Fīrozābād

省份(region): Uttar Pradesh

国家(country): India

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       139.5.0.0 - 139.5.19.255
CIDR:           139.5.16.0/22, 139.5.0.0/20
NetName:        APNIC-ERX-139-5-0-0
NetHandle:      NET-139-5-0-0-1
Parent:         NET139 (NET-139-0-0-0-0)
NetType:        Early Registrations, Transferred to APNIC
OriginAS:       
Organization:   Asia Pacific Network Information Centre (APNIC)
RegDate:        2015-09-04
Updated:        2022-03-08
Comment:        This IP address range is not registered in the ARIN database.
Comment:        This range was transferred to the APNIC Whois Database as
Comment:        part of the ERX (Early Registration Transfer) project.
Comment:        For details, refer to the APNIC Whois Database via
Comment:        WHOIS.APNIC.NET or http://wq.apnic.net/apnic-bin/whois.pl
Comment:        
Comment:        ** IMPORTANT NOTE: APNIC is the Regional Internet Registry
Comment:        for the Asia Pacific region. APNIC does not operate networks
Comment:        using this IP address range and is not able to investigate
Comment:        spam or abuse reports relating to these addresses. For more
Comment:        help, refer to http://www.apnic.net/apnic-info/whois_search2/abuse-and-spamming
Ref:            https://rdap.arin.net/registry/ip/139.5.0.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois.apnic.net


OrgName:        Asia Pacific Network Information Centre
OrgId:          APNIC
Address:        PO Box 3646
City:           South Brisbane
StateProv:      QLD
PostalCode:     4101
Country:        AU
RegDate:        
Updated:        2012-01-24
Ref:            https://rdap.arin.net/registry/entity/APNIC

ReferralServer:  whois://whois.apnic.net
ResourceLink:  http://wq.apnic.net/whois-search/static/search.html

OrgAbuseHandle: AWC12-ARIN
OrgAbuseName:   APNIC Whois Contact
OrgAbusePhone:  +61 7 3858 3188 
OrgAbuseEmail:  search-apnic-not-arin@apnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN

OrgTechHandle: AWC12-ARIN
OrgTechName:   APNIC Whois Contact
OrgTechPhone:  +61 7 3858 3188 
OrgTechEmail:  search-apnic-not-arin@apnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.apnic.net.

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '139.5.8.0 - 139.5.11.255'

% Abuse contact for '139.5.8.0 - 139.5.11.255' is 'abuse@railtelindia.com'

inetnum:        139.5.8.0 - 139.5.11.255
netname:        RAILTEL-IN
descr:          RailTel Corporation is an Internet Service Provider.
country:        IN
admin-c:        NA1011-AP
tech-c:         NA1011-AP
abuse-c:        NA1011-AP
status:         ALLOCATED PORTABLE
mnt-by:         MAINT-IN-IRINN
mnt-lower:      MAINT-IN-RAILTEL
mnt-lower:      MAINT-IN-IRINN
mnt-routes:     MAINT-IN-RAILTEL
mnt-routes:     MAINT-IN-IRINN
mnt-irt:        IRT-RAILTEL-IN
last-modified:  2025-08-11T22:56:46Z
source:         APNIC

irt:            IRT-RAILTEL-IN
address:        Plot No, 143
address:        Sector 44 ,Gurugram
address:        Haryana ,122003
e-mail:         abuse@railtelindia.com
abuse-mailbox:  abuse@railtelindia.com
admin-c:        NA1011-AP
tech-c:         NA1011-AP
auth:           # Filtered
mnt-by:         MAINT-IN-RAILTEL
mnt-by:         MAINT-IN-IRINN
last-modified:  2026-02-10T04:57:40Z
source:         APNIC

person:         Network Administrator
address:        Plate-A, 6th Floor, Office Block Tower-2,
address:        East Kidwai Nagar, New Delhi-110023
country:        IN
phone:          +91 11 22900600
e-mail:         ipadmin@railtel.in
nic-hdl:        NA1011-AP
mnt-by:         MAINT-IN-RAILTEL
mnt-by:         MAINT-IN-IRINN
fax-no:         +91 11 22900699
last-modified:  2025-09-27T09:36:11Z
source:         APNIC

% Information related to '139.5.11.0/24AS24186'

route:          139.5.11.0/24
descr:          Railtel Enterprise Limited
origin:         AS24186
mnt-by:         MAINT-IN-REL
mnt-by:         MAINT-IN-IRINN
mnt-routes:     MAINT-IN-IRINN
last-modified:  2025-12-14T22:19:13Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.5.11.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19765
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.5.11.118.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026030500 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 05 22:01:38 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
Host 118.11.5.139.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 139.5.11.118.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
195.49.186.210 attack
23/tcp 5555/tcp...
[2020-01-23/03-23]48pkt,2pt.(tcp)
2020-03-24 20:36:00
118.172.18.216 attackspam
Unauthorized connection attempt detected from IP address 118.172.18.216 to port 445 [T]
2020-03-24 20:51:25
117.50.7.159 attackbotsspam
Unauthorized connection attempt detected from IP address 117.50.7.159 to port 9944 [T]
2020-03-24 20:52:40
1.55.55.162 attackbots
Unauthorized connection attempt detected from IP address 1.55.55.162 to port 445 [T]
2020-03-24 20:30:21
184.105.247.196 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-24 20:36:51
1.52.119.206 attack
Unauthorized connection attempt detected from IP address 1.52.119.206 to port 9530 [T]
2020-03-24 20:30:54
198.108.66.208 attackbotsspam
198.108.66.208 - - \[24/Mar/2020:12:21:49 +0100\] "GET / HTTP/1.1" 403 135 "-" "Mozilla/5.0 zgrab/0.x"
...
2020-03-24 20:35:27
175.6.228.146 attackbots
Unauthorized connection attempt detected from IP address 175.6.228.146 to port 80 [T]
2020-03-24 20:41:26
223.79.178.203 attackbots
HTTP/80/443/8080 Probe, BF, WP, Hack -
2020-03-24 20:32:31
117.74.7.102 attack
Unauthorized connection attempt detected from IP address 117.74.7.102 to port 5555 [T]
2020-03-24 20:12:59
118.172.191.61 attackbots
Unauthorized connection attempt detected from IP address 118.172.191.61 to port 445 [T]
2020-03-24 20:12:18
110.240.29.100 attack
Unauthorized connection attempt detected from IP address 110.240.29.100 to port 23 [T]
2020-03-24 20:17:45
222.209.83.72 attackbotsspam
Unauthorized connection attempt detected from IP address 222.209.83.72 to port 22 [T]
2020-03-24 20:32:50
37.187.102.226 attack
Mar 24 09:59:24 mailserver sshd\[23180\]: Invalid user test from 37.187.102.226
...
2020-03-24 20:28:08
183.193.234.186 attackbots
Unauthorized connection attempt detected from IP address 183.193.234.186 to port 2323 [T]
2020-03-24 20:37:24

最近上报的IP列表

110.77.187.22 122.192.203.45 2606:4700:10::6814:5963 2606:4700:10::6814:5846
122.192.203.146 2606:4700:10::ac43:2159 2606:4700:10::6816:4655 2606:4700:10::6816:1637
2606:4700:10::ac43:1946 2606:4700:10::6814:9196 121.234.219.115 2606:4700:10::6816:880
110.77.187.86 2606:4700:10::6816:602 2606:4700:10::6814:9292 121.8.28.53
122.193.247.214 2606:4700:10::6816:3472 194.32.149.34 161.215.200.20