必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Santiago

省份(region): Region Metropolitana (RM)

国家(country): Chile

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#


NetRange:       148.222.188.0 - 148.222.239.255
CIDR:           148.222.188.0/22, 148.222.192.0/19, 148.222.224.0/20
NetName:        LACNIC
NetHandle:      NET-148-222-188-0-1
Parent:         NET148 (NET-148-0-0-0-0)
NetType:        Transferred to LACNIC
OriginAS:       
Organization:   Latin American and Caribbean IP address Regional Registry (LACNIC)
RegDate:        2003-10-29
Updated:        2025-01-03
Ref:            https://rdap.arin.net/registry/ip/148.222.188.0

ResourceLink:  http://lacnic.net/cgi-bin/lacnic/whois
ResourceLink:  whois.lacnic.net


OrgName:        Latin American and Caribbean IP address Regional Registry
OrgId:          LACNIC
Address:        Rambla Republica de Mexico 6125
City:           Montevideo
StateProv:      
PostalCode:     11400
Country:        UY
RegDate:        2002-07-27
Updated:        2018-03-15
Ref:            https://rdap.arin.net/registry/entity/LACNIC

ReferralServer:  whois://whois.lacnic.net
ResourceLink:  http://lacnic.net/cgi-bin/lacnic/whois

OrgTechHandle: LACNIC-ARIN
OrgTechName:   LACNIC Whois Info
OrgTechPhone:  +598-2604-2222 
OrgTechEmail:  whois-contact@lacnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/LACNIC-ARIN

OrgAbuseHandle: LWI100-ARIN
OrgAbuseName:   LACNIC Whois Info
OrgAbusePhone:  +598-2604-2222 
OrgAbuseEmail:  abuse@lacnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/LWI100-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.lacnic.net.

% IP Client: 124.223.158.242
 
% Joint Whois - whois.lacnic.net
%  This server accepts single ASN, IPv4 or IPv6 queries

% LACNIC resource: whois.lacnic.net


% Copyright LACNIC lacnic.net
%  The data below is provided for information purposes
%  and to assist persons in obtaining information about or
%  related to AS and IP numbers registrations
%  By submitting a whois query, you agree to use this data
%  only for lawful purposes.
%  2025-11-10 11:32:04 (-03 -03:00)

inetnum:     148.222.205.0/24
status:      reallocated
aut-num:     AS14593
owner:       Starlink Chile SpA
ownerid:     CL-SCSP6-LACNIC
responsible: Luis Anzola
address:     Av. Andres Bello 2457, Piso 19, 0, 
address:     7510689 - Region Metropolitana - Providencia
country:     CL
phone:       +1  3103636000
owner-c:     SKH4
tech-c:      SKH4
abuse-c:     SKH4
inetrev:     148.222.205.0/24
nserver:     DNS31.CLOUDNS.NET
nsstat:      20251108 AA
nslastaa:    20251108
nserver:     DNS32.CLOUDNS.NET
nsstat:      20251108 AA
nslastaa:    20251108
nserver:     DNS33.CLOUDNS.NET
nsstat:      20251108 AA
nslastaa:    20251108
nserver:     DNS34.CLOUDNS.NET
nsstat:      20251108 AA
nslastaa:    20251108
created:     20250304
changed:     20250304
inetnum-up:  148.222.192.0/19

nic-hdl:     SKH4
person:      Reyan Pina
e-mail:      abhishek.kattuparambil@spacex.com
address:     1 Rocket Rd, 1, -
address:     90250 - Hawthorne - CA
country:     US
phone:       +1  3103636000 [0000]
created:     20200813
changed:     20250715

% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.222.205.60
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12463
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.222.205.60.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025111000 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Nov 10 22:24:07 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
60.205.222.148.in-addr.arpa domain name pointer customer.sntochl1.pop.starlinkisp.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
60.205.222.148.in-addr.arpa	name = customer.sntochl1.pop.starlinkisp.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
120.70.100.54 attackbotsspam
2020-04-20 16:11:14,291 fail2ban.actions: WARNING [ssh] Ban 120.70.100.54
2020-04-21 01:50:17
192.144.140.20 attackspambots
Automatic report BANNED IP
2020-04-21 01:17:23
178.44.185.37 attack
Invalid user admin from 178.44.185.37 port 43147
2020-04-21 01:27:17
167.114.185.237 attack
Apr 20 16:20:44 vps sshd[18658]: Failed password for root from 167.114.185.237 port 44910 ssh2
Apr 20 16:25:23 vps sshd[18835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.185.237 
Apr 20 16:25:25 vps sshd[18835]: Failed password for invalid user shutdown from 167.114.185.237 port 41372 ssh2
...
2020-04-21 01:30:42
156.194.147.40 attackspam
2020-04-20 13:54:38 login_virtual_exim authenticator failed for ([127.0.0.1]) [156.194.147.40]: 535 Incorrect authentication data (set_id=verteiler)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=156.194.147.40
2020-04-21 01:36:47
175.141.247.190 attack
$f2bV_matches
2020-04-21 01:29:13
129.211.111.239 attackbotsspam
SSH Brute-Force. Ports scanning.
2020-04-21 01:43:43
165.227.66.224 attackbotsspam
detected by Fail2Ban
2020-04-21 01:31:27
134.175.196.241 attackbotsspam
$f2bV_matches
2020-04-21 01:43:07
206.189.73.164 attackspam
Apr 20 18:15:20 ArkNodeAT sshd\[11312\]: Invalid user iy from 206.189.73.164
Apr 20 18:15:20 ArkNodeAT sshd\[11312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.73.164
Apr 20 18:15:22 ArkNodeAT sshd\[11312\]: Failed password for invalid user iy from 206.189.73.164 port 36266 ssh2
2020-04-21 01:12:25
178.128.55.67 attackspambots
Apr 20 18:43:37 [host] sshd[6302]: Invalid user rd
Apr 20 18:43:37 [host] sshd[6302]: pam_unix(sshd:a
Apr 20 18:43:39 [host] sshd[6302]: Failed password
2020-04-21 01:26:44
123.58.4.17 attackspam
Apr 20 16:27:28 cloud sshd[2633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.58.4.17 
Apr 20 16:27:29 cloud sshd[2633]: Failed password for invalid user ld from 123.58.4.17 port 58789 ssh2
2020-04-21 01:46:59
216.68.91.104 attack
Apr 20 18:17:26 dev0-dcde-rnet sshd[19305]: Failed password for root from 216.68.91.104 port 40824 ssh2
Apr 20 18:31:53 dev0-dcde-rnet sshd[19378]: Failed password for root from 216.68.91.104 port 45536 ssh2
2020-04-21 01:09:49
189.57.73.18 attackspam
SSH Brute Force
2020-04-21 01:20:13
210.56.23.100 attackspam
Apr 20 18:51:20 odroid64 sshd\[24586\]: User root from 210.56.23.100 not allowed because not listed in AllowUsers
Apr 20 18:51:20 odroid64 sshd\[24586\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.56.23.100  user=root
...
2020-04-21 01:10:11

最近上报的IP列表

190.5.32.210 181.173.218.13 64.62.156.32 200.119.241.99
154.196.5.120 52.167.144.65 200.74.165.227 5.248.149.180
118.26.105.113 118.26.105.155 138.84.35.154 152.173.180.135
47.250.147.151 165.227.46.19 179.57.105.63 179.60.76.217
181.160.58.47 216.167.91.95 181.190.9.170 181.212.118.122