必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): India

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       146.195.0.0 - 146.196.127.255
CIDR:           146.195.0.0/16, 146.196.0.0/17
NetName:        APNIC-ERX-146-195-0-0
NetHandle:      NET-146-195-0-0-1
Parent:         NET146 (NET-146-0-0-0-0)
NetType:        Early Registrations, Transferred to APNIC
OriginAS:       
Organization:   Asia Pacific Network Information Centre (APNIC)
RegDate:        2004-02-04
Updated:        2016-03-02
Comment:        This IP address range is not registered in the ARIN database.
Comment:        This range was transferred to the APNIC Whois Database as
Comment:        part of the ERX (Early Registration Transfer) project.
Comment:        For details, refer to the APNIC Whois Database via
Comment:        WHOIS.APNIC.NET or http://wq.apnic.net/apnic-bin/whois.pl
Comment:        
Comment:        ** IMPORTANT NOTE: APNIC is the Regional Internet Registry
Comment:        for the Asia Pacific region.  APNIC does not operate networks
Comment:        using this IP address range and is not able to investigate
Comment:        spam or abuse reports relating to these addresses.  For more
Comment:        help, refer to http://www.apnic.net/apnic-info/whois_search2/abuse-and-spamming
Ref:            https://rdap.arin.net/registry/ip/146.195.0.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois.apnic.net


OrgName:        Asia Pacific Network Information Centre
OrgId:          APNIC
Address:        PO Box 3646
City:           South Brisbane
StateProv:      QLD
PostalCode:     4101
Country:        AU
RegDate:        
Updated:        2012-01-24
Ref:            https://rdap.arin.net/registry/entity/APNIC

ReferralServer:  whois://whois.apnic.net
ResourceLink:  http://wq.apnic.net/whois-search/static/search.html

OrgAbuseHandle: AWC12-ARIN
OrgAbuseName:   APNIC Whois Contact
OrgAbusePhone:  +61 7 3858 3188 
OrgAbuseEmail:  search-apnic-not-arin@apnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN

OrgTechHandle: AWC12-ARIN
OrgTechName:   APNIC Whois Contact
OrgTechPhone:  +61 7 3858 3188 
OrgTechEmail:  search-apnic-not-arin@apnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.apnic.net.

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '146.196.120.0 - 146.196.123.255'

% Abuse contact for '146.196.120.0 - 146.196.123.255' is 'reyazmir@cns24x7.net'

inetnum:        146.196.120.0 - 146.196.123.255
netname:        CNSINFOTEL
descr:          CNS Infotel Services Pvt. Ltd.
admin-c:        RM634-AP
tech-c:         MA604-AP
country:        IN
mnt-by:         MAINT-IN-IRINN
mnt-irt:        IRT-CNSINFOTEL-IN
mnt-routes:     MAINT-IN-CNSINFOTEL
mnt-routes:     MAINT-IN-IRINN
status:         ASSIGNED PORTABLE
last-modified:  2025-08-11T22:56:48Z
source:         APNIC

irt:            IRT-CNSINFOTEL-IN
address:        First Floor, Shri Chander Chinar Complex, Opp. Woman College, M.A. Road, Sri Nagar
e-mail:         reyazmir@cns24x7.net
abuse-mailbox:  reyazmir@cns24x7.net
admin-c:        RM634-AP
tech-c:         MA604-AP
auth:           # Filtered
mnt-by:         MAINT-IN-CNSINFOTEL
mnt-by:         MAINT-IN-IRINN
last-modified:  2026-02-10T04:56:23Z
source:         APNIC

role:           manager admin
address:        First Floor, Shri Chander Chinar Complex,  Opp. Woman College, M.A. Road, Sri Nagar
country:        IN
phone:          +91 9205059003
e-mail:         reyazmir@cns24x7.net
admin-c:        RM634-AP
tech-c:         RM634-AP
nic-hdl:        MA604-AP
mnt-by:         MAINT-IN-CNSINFOTEL
mnt-by:         MAINT-IN-IRINN
last-modified:  2025-09-27T09:52:48Z
source:         APNIC

person:         Reyaz Mir
address:        First Floor, Shri Chander Chinar Complex,  Opp. Woman College, M.A. Road, Sri Nagar
country:        IN
phone:          +91 9205059003
e-mail:         reyazmir@cns24x7.net
nic-hdl:        RM634-AP
mnt-by:         MAINT-IN-CNSINFOTEL
mnt-by:         MAINT-IN-IRINN
last-modified:  2025-09-27T09:52:48Z
source:         APNIC

% Information related to '146.196.121.0/24AS133285'

route:          146.196.121.0/24
descr:          Route for 146.196.121.0/24
origin:         AS133285
country:        IN
mnt-lower:      MAINT-IN-CNSINFOTEL
mnt-routes:     MAINT-IN-CNSINFOTEL
mnt-by:         MAINT-IN-CNSINFOTEL
mnt-by:         MAINT-IN-IRINN
mnt-routes:     MAINT-IN-IRINN
last-modified:  2025-12-14T22:19:20Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.196.121.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32388
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;146.196.121.252.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026022602 1800 900 604800 86400

;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 27 10:26:10 CST 2026
;; MSG SIZE  rcvd: 108
HOST信息:
Host 252.121.196.146.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 252.121.196.146.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
198.108.66.108 attackbots
firewall-block, port(s): 591/tcp
2020-04-27 05:12:35
152.136.165.226 attackbots
SSH bruteforce
2020-04-27 05:02:49
180.76.232.80 attackbots
Apr 26 17:40:36 vps46666688 sshd[29021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.232.80
Apr 26 17:40:38 vps46666688 sshd[29021]: Failed password for invalid user pms from 180.76.232.80 port 44334 ssh2
...
2020-04-27 04:51:39
13.68.250.218 attackspam
fail2ban - Attack against WordPress
2020-04-27 04:54:05
197.26.63.165 attackbots
Automatic report - Port Scan Attack
2020-04-27 04:53:02
183.89.214.10 attackbotsspam
(imapd) Failed IMAP login from 183.89.214.10 (TH/Thailand/mx-ll-183.89.214-10.dynamic.3bb.co.th): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Apr 26 16:28:03 ir1 dovecot[264309]: imap-login: Disconnected (auth failed, 1 attempts in 12 secs): user=, method=PLAIN, rip=183.89.214.10, lip=5.63.12.44, TLS, session=
2020-04-27 04:35:35
35.229.135.250 attack
Apr 27 06:28:26 our-server-hostname sshd[31248]: Failed password for r.r from 35.229.135.250 port 47468 ssh2
Apr 27 06:32:27 our-server-hostname sshd[3437]: Invalid user nagios from 35.229.135.250
Apr 27 06:32:29 our-server-hostname sshd[3437]: Failed password for invalid user nagios from 35.229.135.250 port 53160 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=35.229.135.250
2020-04-27 04:50:16
195.206.105.217 attackspambots
Apr 26 21:31:14  sshd[18433]: Invalid user ubnt from 195.206.105.217
Apr 26 21:31:14  sshd[18433]: input_userauth_request: invalid user ubnt [preauth]
2020-04-27 05:12:48
185.50.149.3 attackspambots
2020-04-26T22:06:34.309710l03.customhost.org.uk postfix/smtps/smtpd[31958]: warning: unknown[185.50.149.3]: SASL LOGIN authentication failed: authentication failure
2020-04-26T22:06:46.652914l03.customhost.org.uk postfix/smtps/smtpd[31958]: warning: unknown[185.50.149.3]: SASL LOGIN authentication failed: authentication failure
2020-04-26T22:07:37.126976l03.customhost.org.uk postfix/smtps/smtpd[31958]: warning: unknown[185.50.149.3]: SASL LOGIN authentication failed: authentication failure
2020-04-26T22:07:48.363596l03.customhost.org.uk postfix/smtps/smtpd[31958]: warning: unknown[185.50.149.3]: SASL LOGIN authentication failed: authentication failure
...
2020-04-27 05:11:35
125.124.254.31 attackbotsspam
2020-04-26T14:40:22.204329linuxbox-skyline sshd[91339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.254.31  user=root
2020-04-26T14:40:24.320178linuxbox-skyline sshd[91339]: Failed password for root from 125.124.254.31 port 40978 ssh2
...
2020-04-27 05:00:43
210.16.93.20 attackbotsspam
(sshd) Failed SSH login from 210.16.93.20 (IN/India/webmail.redbytes.in): 5 in the last 3600 secs
2020-04-27 04:31:50
80.82.77.212 attack
80.82.77.212 was recorded 5 times by 5 hosts attempting to connect to the following ports: 111,17. Incident counter (4h, 24h, all-time): 5, 55, 7643
2020-04-27 04:41:33
222.186.15.115 attackspam
Apr 26 16:40:38 NPSTNNYC01T sshd[5003]: Failed password for root from 222.186.15.115 port 32231 ssh2
Apr 26 16:40:47 NPSTNNYC01T sshd[5024]: Failed password for root from 222.186.15.115 port 64140 ssh2
Apr 26 16:40:49 NPSTNNYC01T sshd[5024]: Failed password for root from 222.186.15.115 port 64140 ssh2
...
2020-04-27 04:44:06
123.207.149.93 attackspambots
2020-04-26T20:50:41.526418shield sshd\[11103\]: Invalid user pp from 123.207.149.93 port 49034
2020-04-26T20:50:41.530033shield sshd\[11103\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.149.93
2020-04-26T20:50:42.958856shield sshd\[11103\]: Failed password for invalid user pp from 123.207.149.93 port 49034 ssh2
2020-04-26T20:52:33.478718shield sshd\[11339\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.149.93  user=root
2020-04-26T20:52:35.950350shield sshd\[11339\]: Failed password for root from 123.207.149.93 port 44172 ssh2
2020-04-27 04:53:15
109.201.133.24 attack
[portscan] Port scan
2020-04-27 04:38:23

最近上报的IP列表

91.196.152.125 146.196.121.229 182.124.123.164 103.9.8.35
51.79.151.214 106.75.249.134 45.156.129.199 101.36.118.177
88.101.166.60 153.35.209.42 47.98.153.122 159.223.72.38
45.156.129.188 21.113.38.251 61.228.203.46 163.61.73.38
154.19.241.75 34.229.36.79 118.184.173.208 192.168.0.159