必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Toronto

省份(region): Ontario

国家(country): Canada

运营商(isp): Bell

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       142.189.0.0 - 142.189.255.255
CIDR:           142.189.0.0/16
NetName:        STEN-BELL-189
NetHandle:      NET-142-189-0-0-1
Parent:         NET142 (NET-142-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Bell Canada (LINX)
RegDate:        1992-08-27
Updated:        2021-07-21
Ref:            https://rdap.arin.net/registry/ip/142.189.0.0


OrgName:        Bell Canada
OrgId:          LINX
Address:        160 Elgin Street
City:           Ottawa
StateProv:      ON
PostalCode:     K1G-3J4
Country:        CA
RegDate:        1990-03-09
Updated:        2026-04-09
Ref:            https://rdap.arin.net/registry/entity/LINX


OrgTechHandle: SOCEV-ARIN
OrgTechName:   SOC-Events
OrgTechPhone:  +1-888-570-8125 
OrgTechEmail:  IP.admin@bell.ca
OrgTechRef:    https://rdap.arin.net/registry/entity/SOCEV-ARIN

OrgTechHandle: ANR1-ARIN
OrgTechName:   Automated Network Resolution
OrgTechPhone:  +1-877-877-2426 
OrgTechEmail:  bwnteam@bell.ca
OrgTechRef:    https://rdap.arin.net/registry/entity/ANR1-ARIN

OrgTechHandle: DHANJ1-ARIN
OrgTechName:   Dhanji, Shaffiq 
OrgTechPhone:  +1-416-353-9801 
OrgTechEmail:  shaffiq.dhanji@bell.ca
OrgTechRef:    https://rdap.arin.net/registry/entity/DHANJ1-ARIN

OrgAbuseHandle: ABUSE1127-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-877-877-2426 
OrgAbuseEmail:  abuse@sympatico.ca
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE1127-ARIN

OrgRoutingHandle: IRRAD-ARIN
OrgRoutingName:   IRR Admin
OrgRoutingPhone:  +1-888-788-2355 
OrgRoutingEmail:  irr-admin@bell.ca
OrgRoutingRef:    https://rdap.arin.net/registry/entity/IRRAD-ARIN

OrgAbuseHandle: ABAI1-ARIN
OrgAbuseName:   Abuse Business abuse issues
OrgAbusePhone:  +1-877-877-2426 
OrgAbuseEmail:  abuse@bell.ca
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABAI1-ARIN

# end


# start

NetRange:       142.189.34.0 - 142.189.34.255
CIDR:           142.189.34.0/24
NetName:        HSE-DYNAMIC-1689872194-CA
NetHandle:      NET-142-189-34-0-1
Parent:         STEN-BELL-189 (NET-142-189-0-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       Sympatico HSE (C09847421)
RegDate:        2023-07-20
Updated:        2023-07-20
Comment:        For Abuse issues contact our abuse groups
Ref:            https://rdap.arin.net/registry/ip/142.189.34.0


CustName:       Sympatico HSE
Address:        130 RIDELLE AVENUE
City:           TORONTO
StateProv:      ON
PostalCode:     M6B 1J8
Country:        CA
RegDate:        2023-07-20
Updated:        2023-07-20
Ref:            https://rdap.arin.net/registry/entity/C09847421

OrgTechHandle: SOCEV-ARIN
OrgTechName:   SOC-Events
OrgTechPhone:  +1-888-570-8125 
OrgTechEmail:  IP.admin@bell.ca
OrgTechRef:    https://rdap.arin.net/registry/entity/SOCEV-ARIN

OrgTechHandle: ANR1-ARIN
OrgTechName:   Automated Network Resolution
OrgTechPhone:  +1-877-877-2426 
OrgTechEmail:  bwnteam@bell.ca
OrgTechRef:    https://rdap.arin.net/registry/entity/ANR1-ARIN

OrgTechHandle: DHANJ1-ARIN
OrgTechName:   Dhanji, Shaffiq 
OrgTechPhone:  +1-416-353-9801 
OrgTechEmail:  shaffiq.dhanji@bell.ca
OrgTechRef:    https://rdap.arin.net/registry/entity/DHANJ1-ARIN

OrgAbuseHandle: ABUSE1127-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-877-877-2426 
OrgAbuseEmail:  abuse@sympatico.ca
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE1127-ARIN

OrgRoutingHandle: IRRAD-ARIN
OrgRoutingName:   IRR Admin
OrgRoutingPhone:  +1-888-788-2355 
OrgRoutingEmail:  irr-admin@bell.ca
OrgRoutingRef:    https://rdap.arin.net/registry/entity/IRRAD-ARIN

OrgAbuseHandle: ABAI1-ARIN
OrgAbuseName:   Abuse Business abuse issues
OrgAbusePhone:  +1-877-877-2426 
OrgAbuseEmail:  abuse@bell.ca
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABAI1-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.189.34.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28462
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.189.34.124.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026050701 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 08 06:03:06 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 124.34.189.142.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 142.189.34.124.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
189.176.22.197 attack
37215/tcp 37215/tcp 37215/tcp...
[2020-04-10/12]4pkt,1pt.(tcp)
2020-04-13 07:28:23
103.145.12.68 attackbots
[2020-04-12 19:21:52] NOTICE[12114][C-00004f4e] chan_sip.c: Call from '' (103.145.12.68:60649) to extension '01146132660954' rejected because extension not found in context 'public'.
[2020-04-12 19:21:52] SECURITY[12128] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-12T19:21:52.018-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="01146132660954",SessionID="0x7f020c0db748",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/103.145.12.68/60649",ACLName="no_extension_match"
[2020-04-12 19:21:57] NOTICE[12114][C-00004f4f] chan_sip.c: Call from '' (103.145.12.68:51898) to extension '+46132660954' rejected because extension not found in context 'public'.
[2020-04-12 19:21:57] SECURITY[12128] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-12T19:21:57.531-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="+46132660954",SessionID="0x7f020c167898",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/103.
...
2020-04-13 07:38:59
78.184.126.240 attackspambots
23/tcp
[2020-04-12]1pkt
2020-04-13 07:41:59
177.11.136.4 attackspambots
445/tcp
[2020-04-12]1pkt
2020-04-13 07:48:09
80.81.0.94 attackspambots
Apr 13 00:35:29 pve sshd[10014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.81.0.94 
Apr 13 00:35:31 pve sshd[10014]: Failed password for invalid user test from 80.81.0.94 port 42486 ssh2
Apr 13 00:40:31 pve sshd[13722]: Failed password for root from 80.81.0.94 port 5538 ssh2
2020-04-13 07:19:58
145.239.137.248 attack
20037/tcp
[2020-04-12]1pkt
2020-04-13 07:38:03
120.233.171.6 attackbotsspam
port
2020-04-13 07:17:01
104.131.121.25 attackbotsspam
Apr 13 02:22:52 taivassalofi sshd[186017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.121.25
Apr 13 02:22:54 taivassalofi sshd[186017]: Failed password for invalid user schagerer from 104.131.121.25 port 49083 ssh2
...
2020-04-13 07:36:34
177.6.86.56 attackbotsspam
23/tcp
[2020-04-12]1pkt
2020-04-13 07:32:57
144.217.242.247 attack
Apr 12 23:42:37 sshgateway sshd\[3758\]: Invalid user garduno from 144.217.242.247
Apr 12 23:42:37 sshgateway sshd\[3758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=247.ip-144-217-242.net
Apr 12 23:42:39 sshgateway sshd\[3758\]: Failed password for invalid user garduno from 144.217.242.247 port 43244 ssh2
2020-04-13 07:50:11
114.118.7.153 attack
2020-04-12T22:47:24.671469shield sshd\[28826\]: Invalid user apache2 from 114.118.7.153 port 48146
2020-04-12T22:47:24.675067shield sshd\[28826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.118.7.153
2020-04-12T22:47:26.812650shield sshd\[28826\]: Failed password for invalid user apache2 from 114.118.7.153 port 48146 ssh2
2020-04-12T22:51:04.532833shield sshd\[29713\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.118.7.153  user=root
2020-04-12T22:51:06.208390shield sshd\[29713\]: Failed password for root from 114.118.7.153 port 43740 ssh2
2020-04-13 07:38:29
198.40.56.50 attack
Icarus honeypot on github
2020-04-13 07:14:20
128.199.38.162 attackspam
20229/tcp 20229/tcp
[2020-04-12]2pkt
2020-04-13 07:36:47
151.127.0.151 attackspambots
Invalid user pi from 151.127.0.151 port 60736
2020-04-13 07:15:40
121.134.202.22 attack
ssh brute force
2020-04-13 07:33:35

最近上报的IP列表

2606:4700:10::6814:7067 74.14.121.217 121.40.45.125 172.215.145.162
128.203.202.233 5.61.209.102 180.101.144.152 2606:4700:10::ac43:1628
2606:4700:10::ac43:1430 14.207.194.189 3.80.92.191 185.56.45.50
18.212.83.63 166.88.26.174 2606:4700:10::6816:52 2606:4700:10::ac43:2631
2606:4700:10::6816:4929 2606:4700:10::6814:6601 174.95.103.123 34.21.138.140