必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       141.206.160.0 - 141.206.255.255
CIDR:           141.206.192.0/18, 141.206.160.0/19
NetName:        TD-ELSU
NetHandle:      NET-141-206-160-0-1
Parent:         RIPE-ERX-141 (NET-141-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Teradata Operations, Inc. (TERAD)
RegDate:        1992-10-16
Updated:        2021-12-14
Ref:            https://rdap.arin.net/registry/ip/141.206.160.0


OrgName:        Teradata Operations, Inc.
OrgId:          TERAD
Address:        17095 Via Del Campo
City:           San Diego
StateProv:      CA
PostalCode:     92127
Country:        US
RegDate:        2008-02-12
Updated:        2025-03-18
Ref:            https://rdap.arin.net/registry/entity/TERAD


OrgTechHandle: TMK5-ARIN
OrgTechName:   Tran, Mei Kuen 
OrgTechPhone:  +1-858-485-2000 
OrgTechEmail:  meikuen.tran@teradata.com
OrgTechRef:    https://rdap.arin.net/registry/entity/TMK5-ARIN

OrgTechHandle: SONGJ21-ARIN
OrgTechName:   Song, Jay 
OrgTechPhone:  +1-858-284-1439 
OrgTechEmail:  jay.song@teradata.com
OrgTechRef:    https://rdap.arin.net/registry/entity/SONGJ21-ARIN

OrgAbuseHandle: DOMAI380-ARIN
OrgAbuseName:   Domain Admin
OrgAbusePhone:  +1-858-485-1220 
OrgAbuseEmail:  neil.palmer@teradata.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/DOMAI380-ARIN

OrgTechHandle: DOMAI380-ARIN
OrgTechName:   Domain Admin
OrgTechPhone:  +1-858-485-1220 
OrgTechEmail:  neil.palmer@teradata.com
OrgTechRef:    https://rdap.arin.net/registry/entity/DOMAI380-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.206.237.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52583
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.206.237.199.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026051401 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 15 12:00:26 CST 2026
;; MSG SIZE  rcvd: 108
HOST信息:
b'Host 199.237.206.141.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 141.206.237.199.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.169.194 attackbotsspam
SSH Brute-Force reported by Fail2Ban
2019-10-15 21:16:34
116.110.117.42 attack
SSH Brute-Force reported by Fail2Ban
2019-10-15 21:17:30
116.58.38.85 attackbots
Oct 15 13:30:31 mailserver sshd[18128]: Did not receive identification string from 116.58.38.85
Oct 15 13:30:45 mailserver sshd[18140]: Invalid user noc from 116.58.38.85
Oct 15 13:30:45 mailserver sshd[18140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.58.38.85
Oct 15 13:30:47 mailserver sshd[18140]: Failed password for invalid user noc from 116.58.38.85 port 58774 ssh2
Oct 15 13:30:47 mailserver sshd[18140]: Connection closed by 116.58.38.85 port 58774 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=116.58.38.85
2019-10-15 21:48:05
69.117.224.87 attackbotsspam
Automatic report - Banned IP Access
2019-10-15 21:56:14
131.221.80.211 attackbots
2019-10-15T13:22:30.896092abusebot-3.cloudsearch.cf sshd\[25359\]: Invalid user pardeep from 131.221.80.211 port 12513
2019-10-15 21:47:13
182.22.91.71 attackbots
Sent mail to target address hacked/leaked from abandonia in 2016
2019-10-15 21:45:23
118.25.231.17 attackspam
Oct 15 19:04:18 areeb-Workstation sshd[7393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.231.17
Oct 15 19:04:20 areeb-Workstation sshd[7393]: Failed password for invalid user 123 from 118.25.231.17 port 47278 ssh2
...
2019-10-15 21:41:37
190.152.39.146 attack
T: f2b postfix sasl 3x
2019-10-15 21:52:11
194.84.17.10 attackspambots
Oct 14 14:47:52 rb06 sshd[17992]: reveeclipse mapping checking getaddrinfo for ip10.sub17.equant.ru [194.84.17.10] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct 14 14:47:52 rb06 sshd[17992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.84.17.10  user=r.r
Oct 14 14:47:53 rb06 sshd[17992]: Failed password for r.r from 194.84.17.10 port 50300 ssh2
Oct 14 14:47:53 rb06 sshd[17992]: Received disconnect from 194.84.17.10: 11: Bye Bye [preauth]
Oct 14 14:55:15 rb06 sshd[9320]: reveeclipse mapping checking getaddrinfo for ip10.sub17.equant.ru [194.84.17.10] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct 14 14:55:15 rb06 sshd[9320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.84.17.10  user=r.r
Oct 14 14:55:17 rb06 sshd[9320]: Failed password for r.r from 194.84.17.10 port 53158 ssh2
Oct 14 14:55:17 rb06 sshd[9320]: Received disconnect from 194.84.17.10: 11: Bye Bye [preauth]
Oct 14 14:59:41 rb06 s........
-------------------------------
2019-10-15 21:33:34
87.118.112.63 attackspam
Automatic report - XMLRPC Attack
2019-10-15 21:22:38
188.254.14.146 attack
2019-10-15 06:34:55 H=(dynamicip-94-180-105-38.pppoe.nsk.ertelecom.ru) [188.254.14.146]:37257 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/query/ip/188.254.14.146)
2019-10-15 06:44:52 H=(dynamicip-94-180-105-38.pppoe.nsk.ertelecom.ru) [188.254.14.146]:33742 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/sbl/query/SBLCSS)
2019-10-15 06:44:52 H=(dynamicip-94-180-105-38.pppoe.nsk.ertelecom.ru) [188.254.14.146]:33742 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/sbl/query/SBLCSS)
...
2019-10-15 21:47:40
46.102.114.246 attackbotsspam
Oct 15 11:44:35 system,error,critical: login failure for user admin from 46.102.114.246 via telnet
Oct 15 11:44:36 system,error,critical: login failure for user root from 46.102.114.246 via telnet
Oct 15 11:44:38 system,error,critical: login failure for user root from 46.102.114.246 via telnet
Oct 15 11:44:44 system,error,critical: login failure for user admin from 46.102.114.246 via telnet
Oct 15 11:44:46 system,error,critical: login failure for user root from 46.102.114.246 via telnet
Oct 15 11:44:47 system,error,critical: login failure for user user from 46.102.114.246 via telnet
Oct 15 11:44:51 system,error,critical: login failure for user root from 46.102.114.246 via telnet
Oct 15 11:44:52 system,error,critical: login failure for user root from 46.102.114.246 via telnet
Oct 15 11:44:55 system,error,critical: login failure for user root from 46.102.114.246 via telnet
Oct 15 11:45:01 system,error,critical: login failure for user mother from 46.102.114.246 via telnet
2019-10-15 21:42:42
128.199.244.150 attackbotsspam
Automatic report - Banned IP Access
2019-10-15 21:31:45
123.30.157.199 attackspam
2019-10-15T12:54:23.109846abusebot-8.cloudsearch.cf sshd\[26735\]: Invalid user shoutcast from 123.30.157.199 port 35390
2019-10-15 21:44:50
106.12.6.74 attackspam
$f2bV_matches
2019-10-15 21:51:00

最近上报的IP列表

120.230.21.10 120.229.113.214 119.39.184.67 112.0.140.250
2606:4700:10::6814:8419 2606:4700:10::6814:8808 2606:4700:10::6814:4573 216.227.169.92
39.98.81.231 194.88.98.101 142.249.36.83 194.88.98.90
129.150.47.234 2606:4700:10::6814:5483 35.195.94.136 81.70.99.108
47.233.62.66 34.53.132.57 43.133.41.88 2606:4700:10::6814:7885