必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): India

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       146.195.0.0 - 146.196.127.255
CIDR:           146.196.0.0/17, 146.195.0.0/16
NetName:        APNIC-ERX-146-195-0-0
NetHandle:      NET-146-195-0-0-1
Parent:         NET146 (NET-146-0-0-0-0)
NetType:        Early Registrations, Transferred to APNIC
OriginAS:       
Organization:   Asia Pacific Network Information Centre (APNIC)
RegDate:        2004-02-04
Updated:        2016-03-02
Comment:        This IP address range is not registered in the ARIN database.
Comment:        This range was transferred to the APNIC Whois Database as
Comment:        part of the ERX (Early Registration Transfer) project.
Comment:        For details, refer to the APNIC Whois Database via
Comment:        WHOIS.APNIC.NET or http://wq.apnic.net/apnic-bin/whois.pl
Comment:        
Comment:        ** IMPORTANT NOTE: APNIC is the Regional Internet Registry
Comment:        for the Asia Pacific region.  APNIC does not operate networks
Comment:        using this IP address range and is not able to investigate
Comment:        spam or abuse reports relating to these addresses.  For more
Comment:        help, refer to http://www.apnic.net/apnic-info/whois_search2/abuse-and-spamming
Ref:            https://rdap.arin.net/registry/ip/146.195.0.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois.apnic.net


OrgName:        Asia Pacific Network Information Centre
OrgId:          APNIC
Address:        PO Box 3646
City:           South Brisbane
StateProv:      QLD
PostalCode:     4101
Country:        AU
RegDate:        
Updated:        2012-01-24
Ref:            https://rdap.arin.net/registry/entity/APNIC

ReferralServer:  whois://whois.apnic.net
ResourceLink:  http://wq.apnic.net/whois-search/static/search.html

OrgAbuseHandle: AWC12-ARIN
OrgAbuseName:   APNIC Whois Contact
OrgAbusePhone:  +61 7 3858 3188 
OrgAbuseEmail:  search-apnic-not-arin@apnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN

OrgTechHandle: AWC12-ARIN
OrgTechName:   APNIC Whois Contact
OrgTechPhone:  +61 7 3858 3188 
OrgTechEmail:  search-apnic-not-arin@apnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.apnic.net.

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '146.196.120.0 - 146.196.123.255'

% Abuse contact for '146.196.120.0 - 146.196.123.255' is 'reyazmir@cns24x7.net'

inetnum:        146.196.120.0 - 146.196.123.255
netname:        CNSINFOTEL
descr:          CNS Infotel Services Pvt. Ltd.
admin-c:        RM634-AP
tech-c:         MA604-AP
country:        IN
mnt-by:         MAINT-IN-IRINN
mnt-irt:        IRT-CNSINFOTEL-IN
mnt-routes:     MAINT-IN-CNSINFOTEL
mnt-routes:     MAINT-IN-IRINN
status:         ASSIGNED PORTABLE
last-modified:  2025-08-11T22:56:48Z
source:         APNIC

irt:            IRT-CNSINFOTEL-IN
address:        First Floor, Shri Chander Chinar Complex, Opp. Woman College, M.A. Road, Sri Nagar
e-mail:         reyazmir@cns24x7.net
abuse-mailbox:  reyazmir@cns24x7.net
admin-c:        RM634-AP
tech-c:         MA604-AP
auth:           # Filtered
mnt-by:         MAINT-IN-CNSINFOTEL
mnt-by:         MAINT-IN-IRINN
last-modified:  2026-02-10T04:56:23Z
source:         APNIC

role:           manager admin
address:        First Floor, Shri Chander Chinar Complex,  Opp. Woman College, M.A. Road, Sri Nagar
country:        IN
phone:          +91 9205059003
e-mail:         reyazmir@cns24x7.net
admin-c:        RM634-AP
tech-c:         RM634-AP
nic-hdl:        MA604-AP
mnt-by:         MAINT-IN-CNSINFOTEL
mnt-by:         MAINT-IN-IRINN
last-modified:  2025-09-27T09:52:48Z
source:         APNIC

person:         Reyaz Mir
address:        First Floor, Shri Chander Chinar Complex,  Opp. Woman College, M.A. Road, Sri Nagar
country:        IN
phone:          +91 9205059003
e-mail:         reyazmir@cns24x7.net
nic-hdl:        RM634-AP
mnt-by:         MAINT-IN-CNSINFOTEL
mnt-by:         MAINT-IN-IRINN
last-modified:  2025-09-27T09:52:48Z
source:         APNIC

% Information related to '146.196.121.0/24AS133285'

route:          146.196.121.0/24
descr:          Route for 146.196.121.0/24
origin:         AS133285
country:        IN
mnt-lower:      MAINT-IN-CNSINFOTEL
mnt-routes:     MAINT-IN-CNSINFOTEL
mnt-by:         MAINT-IN-CNSINFOTEL
mnt-by:         MAINT-IN-IRINN
mnt-routes:     MAINT-IN-IRINN
last-modified:  2025-12-14T22:19:20Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.196.121.229
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20743
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;146.196.121.229.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026022602 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 27 10:26:20 CST 2026
;; MSG SIZE  rcvd: 108
HOST信息:
Host 229.121.196.146.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 229.121.196.146.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
62.212.230.38 attack
Microsoft SQL Server User Authentication Brute Force Attempt, PTR: PTR record not found
2020-03-10 03:02:08
125.213.128.106 attackbotsspam
Mar  9 03:36:02 wbs sshd\[15779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.213.128.106  user=root
Mar  9 03:36:04 wbs sshd\[15779\]: Failed password for root from 125.213.128.106 port 57362 ssh2
Mar  9 03:38:36 wbs sshd\[15977\]: Invalid user 123 from 125.213.128.106
Mar  9 03:38:36 wbs sshd\[15977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.213.128.106
Mar  9 03:38:38 wbs sshd\[15977\]: Failed password for invalid user 123 from 125.213.128.106 port 38442 ssh2
2020-03-10 03:01:02
167.94.220.10 attackbots
Scan detected and blocked 2020.03.09 13:25:20
2020-03-10 02:37:16
5.123.35.126 attack
(imapd) Failed IMAP login from 5.123.35.126 (IR/Iran/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Mar  9 15:55:06 ir1 dovecot[4133960]: imap-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=5.123.35.126, lip=5.63.12.44, session=
2020-03-10 02:44:31
116.6.233.238 attackbotsspam
Mar  9 16:48:27 server sshd\[10079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.6.233.238  user=root
Mar  9 16:48:29 server sshd\[10079\]: Failed password for root from 116.6.233.238 port 52624 ssh2
Mar  9 16:52:21 server sshd\[11360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.6.233.238  user=root
Mar  9 16:52:23 server sshd\[11360\]: Failed password for root from 116.6.233.238 port 44884 ssh2
Mar  9 18:02:35 server sshd\[28164\]: Invalid user fabian from 116.6.233.238
Mar  9 18:02:35 server sshd\[28164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.6.233.238 
...
2020-03-10 03:04:09
178.62.36.116 attackbotsspam
2020-03-09T12:05:26.463556linuxbox-skyline sshd[62664]: Invalid user user from 178.62.36.116 port 33334
...
2020-03-10 03:00:01
120.230.88.227 attackbotsspam
Automatic report - Port Scan
2020-03-10 02:51:16
101.78.149.142 attack
2020-03-09T18:19:48.529056dmca.cloudsearch.cf sshd[14519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.78.149.142  user=daemon
2020-03-09T18:19:50.807903dmca.cloudsearch.cf sshd[14519]: Failed password for daemon from 101.78.149.142 port 45790 ssh2
2020-03-09T18:22:23.969723dmca.cloudsearch.cf sshd[14730]: Invalid user huangliang from 101.78.149.142 port 55916
2020-03-09T18:22:23.974692dmca.cloudsearch.cf sshd[14730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.78.149.142
2020-03-09T18:22:23.969723dmca.cloudsearch.cf sshd[14730]: Invalid user huangliang from 101.78.149.142 port 55916
2020-03-09T18:22:25.866944dmca.cloudsearch.cf sshd[14730]: Failed password for invalid user huangliang from 101.78.149.142 port 55916 ssh2
2020-03-09T18:24:27.615135dmca.cloudsearch.cf sshd[14858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.78.149.142  user=root
2
...
2020-03-10 03:09:38
45.48.17.120 attackspambots
Mar  9 13:18:25 vbuntu sshd[7628]: refused connect from cpe-45-48-17-120.socal.res.rr.com (45.48.17.120)
Mar  9 13:18:39 vbuntu sshd[7631]: refused connect from cpe-45-48-17-120.socal.res.rr.com (45.48.17.120)
Mar  9 13:18:39 vbuntu sshd[7632]: refused connect from cpe-45-48-17-120.socal.res.rr.com (45.48.17.120)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=45.48.17.120
2020-03-10 03:06:46
45.148.10.175 attackbotsspam
Mar  9 21:35:20 server sshd\[16272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.175  user=root
Mar  9 21:35:23 server sshd\[16272\]: Failed password for root from 45.148.10.175 port 42660 ssh2
Mar  9 21:35:32 server sshd\[16295\]: Invalid user oracle from 45.148.10.175
Mar  9 21:35:32 server sshd\[16295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.175 
Mar  9 21:35:35 server sshd\[16295\]: Failed password for invalid user oracle from 45.148.10.175 port 46156 ssh2
...
2020-03-10 02:38:24
124.156.174.167 attackbotsspam
port scan and connect, tcp 80 (http)
2020-03-10 02:45:54
114.67.77.148 attack
$f2bV_matches
2020-03-10 03:15:01
77.89.253.23 attackbots
SpamScore above: 10.0
2020-03-10 03:11:33
106.205.182.249 attackbotsspam
Email rejected due to spam filtering
2020-03-10 03:05:44
122.161.155.43 attack
1583774956 - 03/09/2020 18:29:16 Host: 122.161.155.43/122.161.155.43 Port: 23 TCP Blocked
2020-03-10 03:13:26

最近上报的IP列表

146.196.121.252 182.124.123.164 103.9.8.35 51.79.151.214
106.75.249.134 45.156.129.199 101.36.118.177 88.101.166.60
153.35.209.42 47.98.153.122 159.223.72.38 45.156.129.188
21.113.38.251 61.228.203.46 163.61.73.38 154.19.241.75
34.229.36.79 118.184.173.208 192.168.0.159 1.95.134.14