必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Tokyo

省份(region): Tokyo

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '141.11.50.0 - 141.11.51.255'

% Abuse contact for '141.11.50.0 - 141.11.51.255' is 'report@abuseradar.com'

inetnum:        141.11.50.0 - 141.11.51.255
netname:        NET-141-11-50-0-23
country:        HK
geofeed:        https://geofeed.ipxo.com/geofeed.txt
org:            ORG-NL583-RIPE
admin-c:        NL5308-RIPE
tech-c:         NL5308-RIPE
abuse-c:        NL5308-RIPE
status:         ASSIGNED PA
remarks:        End User Organization
mnt-by:         netutils-mnt
created:        2024-12-02T12:21:49Z
last-modified:  2025-02-12T15:13:16Z
source:         RIPE

organisation:   ORG-NL583-RIPE
org-name:       Private Customer
org-type:       OTHER
remarks:        End User Organization
address:        Private Residence
country:        HK
abuse-c:        NL5308-RIPE
mnt-ref:        IPXO-MNT
mnt-ref:        netutils-mnt
mnt-by:         IPXO-MNT
mnt-by:         netutils-mnt
created:        2023-06-01T11:12:54Z
last-modified:  2024-12-05T09:21:49Z
source:         RIPE # Filtered

role:           Private Customer
address:        Private Residence
nic-hdl:        NL5308-RIPE
remarks:        End User Organization
abuse-mailbox:  report@abuseradar.com
mnt-by:         netutils-mnt
created:        2023-06-01T11:12:54Z
last-modified:  2024-12-05T09:42:02Z
source:         RIPE # Filtered

% Information related to '141.11.50.0/23AS46829'

route:          141.11.50.0/23
origin:         AS46829
mnt-by:         netutils-mnt
created:        2024-06-03T05:32:57Z
last-modified:  2025-02-12T14:01:29Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (SHETLAND)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.11.51.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9752
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.11.51.54.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032101 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 22 12:48:19 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
Host 54.51.11.141.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.51.11.141.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
116.104.3.233 attackspam
1586925430 - 04/15/2020 06:37:10 Host: 116.104.3.233/116.104.3.233 Port: 445 TCP Blocked
2020-04-15 17:39:33
51.254.37.192 attack
2020-04-15T02:53:21.939697linuxbox-skyline sshd[134460]: Invalid user deploy from 51.254.37.192 port 52040
...
2020-04-15 17:49:05
54.38.240.23 attack
Apr 15 12:06:11 hosting sshd[14144]: Invalid user mirko from 54.38.240.23 port 35754
Apr 15 12:06:11 hosting sshd[14144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.ip-54-38-240.eu
Apr 15 12:06:11 hosting sshd[14144]: Invalid user mirko from 54.38.240.23 port 35754
Apr 15 12:06:13 hosting sshd[14144]: Failed password for invalid user mirko from 54.38.240.23 port 35754 ssh2
Apr 15 12:16:44 hosting sshd[15044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.ip-54-38-240.eu  user=root
Apr 15 12:16:46 hosting sshd[15044]: Failed password for root from 54.38.240.23 port 39156 ssh2
...
2020-04-15 17:43:25
62.122.201.170 attack
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2020-04-15 17:30:59
2002:b9ea:db69::b9ea:db69 attack
Apr 15 07:41:32 web01.agentur-b-2.de postfix/smtpd[85659]: warning: unknown[2002:b9ea:db69::b9ea:db69]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 15 07:41:32 web01.agentur-b-2.de postfix/smtpd[85659]: lost connection after AUTH from unknown[2002:b9ea:db69::b9ea:db69]
Apr 15 07:43:35 web01.agentur-b-2.de postfix/smtpd[89354]: warning: unknown[2002:b9ea:db69::b9ea:db69]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 15 07:43:35 web01.agentur-b-2.de postfix/smtpd[89354]: lost connection after AUTH from unknown[2002:b9ea:db69::b9ea:db69]
Apr 15 07:48:09 web01.agentur-b-2.de postfix/smtpd[89354]: warning: unknown[2002:b9ea:db69::b9ea:db69]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-04-15 18:02:15
109.224.1.210 attackbots
spam
2020-04-15 17:23:48
130.185.108.149 attack
SpamScore above: 10.0
2020-04-15 17:48:13
69.94.158.88 attack
Email Spam
2020-04-15 18:05:53
218.92.0.173 attack
Apr 15 06:39:21 firewall sshd[32633]: Failed password for root from 218.92.0.173 port 25223 ssh2
Apr 15 06:39:25 firewall sshd[32633]: Failed password for root from 218.92.0.173 port 25223 ssh2
Apr 15 06:39:29 firewall sshd[32633]: Failed password for root from 218.92.0.173 port 25223 ssh2
...
2020-04-15 17:45:44
195.231.3.155 attackspam
(smtpauth) Failed SMTP AUTH login from 195.231.3.155 (IT/Italy/host155-3-231-195.serverdedicati.aruba.it): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-04-15 12:10:30 login authenticator failed for (USER) [195.231.3.155]: 535 Incorrect authentication data (set_id=info@shalbaf-brick.com)
2020-04-15 18:01:18
185.153.196.230 attackspam
[portscan] tcp/22 [SSH]
[scan/connect: 3 time(s)]
*(RWIN=8192)(04151025)
2020-04-15 17:57:24
139.199.80.67 attackspam
Apr 15 10:55:30 vps333114 sshd[15016]: Failed password for root from 139.199.80.67 port 58448 ssh2
Apr 15 11:04:41 vps333114 sshd[15269]: Invalid user marke from 139.199.80.67
...
2020-04-15 17:58:15
82.166.152.154 attackbotsspam
spam
2020-04-15 17:29:59
95.170.115.154 attackspam
spam
2020-04-15 17:25:28
14.134.184.139 attackbots
postfix
2020-04-15 17:47:15

最近上报的IP列表

147.146.0.12 216.180.246.88 2606:4700:10::6814:8556 2606:4700:10::6816:4274
2606:4700:10::ac43:1370 2606:4700:10::6814:9362 2606:4700:10::6816:3487 2606:4700:10::6816:1769
2606:4700:10::6816:3074 2606:4700:10::6814:9567 2606:4700:10::6814:9661 2606:4700:10::6816:1951
13.126.210.4 111.55.113.18 43.153.33.100 2606:4700:10::6816:3634
2606:4700:10::6814:8476 110.78.158.167 2606:4700:10::6814:6044 2606:4700:10::6816:643