必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Madrid

省份(region): Comunidad de Madrid

国家(country): Spain

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       158.158.0.0 - 158.158.255.255
CIDR:           158.158.0.0/16
NetName:        APNIC
NetHandle:      NET-158-158-0-0-1
Parent:         NET158 (NET-158-0-0-0-0)
NetType:        Early Registrations, Transferred to APNIC
OriginAS:       
Organization:   Asia Pacific Network Information Centre (APNIC)
RegDate:        2019-04-16
Updated:        2019-04-16
Ref:            https://rdap.arin.net/registry/ip/158.158.0.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois://whois.apnic.net


OrgName:        Asia Pacific Network Information Centre
OrgId:          APNIC
Address:        PO Box 3646
City:           South Brisbane
StateProv:      QLD
PostalCode:     4101
Country:        AU
RegDate:        
Updated:        2012-01-24
Ref:            https://rdap.arin.net/registry/entity/APNIC

ReferralServer:  whois://whois.apnic.net
ResourceLink:  http://wq.apnic.net/whois-search/static/search.html

OrgTechHandle: AWC12-ARIN
OrgTechName:   APNIC Whois Contact
OrgTechPhone:  +61 7 3858 3188 
OrgTechEmail:  search-apnic-not-arin@apnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN

OrgAbuseHandle: AWC12-ARIN
OrgAbuseName:   APNIC Whois Contact
OrgAbusePhone:  +61 7 3858 3188 
OrgAbuseEmail:  search-apnic-not-arin@apnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.apnic.net.

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '158.158.0.0 - 158.158.255.255'

% Abuse contact for '158.158.0.0 - 158.158.255.255' is 'abuse@microsoft.com'

inetnum:        158.158.0.0 - 158.158.255.255
netname:        MICROSOFT-APNIC-AP
descr:          Microsoft Singapore Pte. Ltd.
country:        SG
org:            ORG-MSPL4-AP
admin-c:        DB662-AP
tech-c:         MP234-AP
abuse-c:        AM2589-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-MOPL-SG
mnt-routes:     MAINT-MOPL-SG
mnt-lower:      MAINT-AP-MICROSOFT
mnt-routes:     MAINT-AP-MICROSOFT
mnt-irt:        IRT-MICROSOFT-APNIC-SG
mnt-irt:        IRT-MOPL-SG
last-modified:  2022-12-16T05:54:14Z
source:         APNIC

irt:            IRT-MICROSOFT-APNIC-SG
address:        One Microsft Way
address:        Redmond, WA 98052
address:        US
e-mail:         abuse@microsoft.com
abuse-mailbox:  abuse@microsoft.com
admin-c:        MP234-AP
tech-c:         MP234-AP
auth:           # Filtered
remarks:        abuse@microsoft.com is invalid
mnt-by:         MAINT-AP-MICROSOFT
last-modified:  2025-11-18T00:26:27Z
source:         APNIC

irt:            IRT-MOPL-SG
address:        80 Raffles Place,
e-mail:         abuse@microsoft.com
abuse-mailbox:  abuse@microsoft.com
admin-c:        MOPL1-AP
tech-c:         MOPL1-AP
auth:           # Filtered
remarks:        abuse@microsoft.com is invalid
mnt-by:         MAINT-MOPL-SG
last-modified:  2025-11-18T00:36:31Z
source:         APNIC

organisation:   ORG-MSPL4-AP
org-name:       Microsoft Singapore Pte. Ltd.
country:        US
address:        One Microsoft Way
phone:          +011-425-706-8080
fax-no:         +011-425-936-7329
e-mail:         dawn.bedard@microsoft.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2020-05-27T12:56:32Z
source:         APNIC

role:           ABUSE MICROSOFTAPNICSG
country:        ZZ
address:        One Microsft Way
address:        Redmond, WA 98052
address:        US
phone:          +000000000
e-mail:         abuse@microsoft.com
admin-c:        MP234-AP
tech-c:         MP234-AP
nic-hdl:        AM2589-AP
remarks:        Generated from irt object IRT-MICROSOFT-APNIC-SG
remarks:        abuse@microsoft.com is invalid
abuse-mailbox:  abuse@microsoft.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-04T18:10:10Z
source:         APNIC

person:         Dawn Bedard
address:        One Microsoft Way
country:        US
phone:          +0114257062751
e-mail:         dabedard@microsoft.com
nic-hdl:        DB662-AP
mnt-by:         MAINT-AP-MICROSOFT
last-modified:  2019-03-25T16:26:42Z
source:         APNIC

person:         MSFT POC
nic-hdl:        MP234-AP
e-mail:         iprrms@microsoft.com
address:        One Microsft Way
address:        Redmond, WA 98052
address:        US
phone:          +1-425-882-8080
country:        US
mnt-by:         MAINT-AP-MICROSOFT
last-modified:  2008-09-04T07:32:53Z
source:         APNIC

% Information related to '158.158.0.0/16AS8075'

route:          158.158.0.0/16
origin:         AS8075
descr:          Microsoft Singapore Pte. Ltd.
                One Microsoft Way
mnt-by:         MAINT-AP-MICROSOFT
mnt-by:         MAINT-MOPL-SG
last-modified:  2022-12-16T05:54:15Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.158.49.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39961
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;158.158.49.99.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041101 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 12 08:00:02 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 99.49.158.158.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 99.49.158.158.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
91.178.188.161 attackspambots
Jun 18 00:35:11 sw01 sshd[26746]: Invalid user halford from 91.178.188.161
Jun 18 00:35:11 sw01 sshd[26746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.178.188.161 
Jun 18 00:35:13 sw01 sshd[26746]: Failed password for invalid user halford from 91.178.188.161 port 56934 ssh2
Jun 18 00:35:13 sw01 sshd[26747]: Received disconnect from 91.178.188.161: 11: Bye Bye
Jun 18 00:35:23 sw01 sshd[26769]: Invalid user liferay from 91.178.188.161
Jun 18 00:35:23 sw01 sshd[26769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.178.188.161 
Jun 18 00:35:25 sw01 sshd[26769]: Failed password for invalid user liferay from 91.178.188.161 port 55116 ssh2
Jun 18 00:35:25 sw01 sshd[26770]: Received disconnect from 91.178.188.161: 11: Bye Bye
Jun 18 00:35:31 sw01 sshd[26773]: Invalid user vendeg from 91.178.188.161
Jun 18 00:35:31 sw01 sshd[26773]: pam_unix(sshd:auth): authentication failure; logname= ........
-------------------------------
2019-06-22 04:08:51
163.172.24.170 attack
Request: "GET /test/wp-login.php HTTP/1.1"
2019-06-22 04:32:39
103.249.100.48 attackspam
Jun 21 21:47:28 www sshd\[6561\]: Invalid user server from 103.249.100.48 port 47160
...
2019-06-22 04:04:58
191.37.128.83 attack
Request: "GET / HTTP/1.1"
2019-06-22 04:39:09
84.127.137.26 attackspam
Jun 16 21:50:51 cumulus sshd[4022]: Bad protocol version identification '' from 84.127.137.26 port 56958
Jun 16 22:12:50 cumulus sshd[5285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.127.137.26  user=r.r
Jun 16 22:12:52 cumulus sshd[5285]: Failed password for r.r from 84.127.137.26 port 46304 ssh2
Jun 16 22:12:53 cumulus sshd[5285]: Connection closed by 84.127.137.26 port 46304 [preauth]
Jun 16 22:17:14 cumulus sshd[5448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.127.137.26  user=r.r
Jun 16 22:17:16 cumulus sshd[5448]: Failed password for r.r from 84.127.137.26 port 34148 ssh2
Jun 16 22:22:30 cumulus sshd[5767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.127.137.26  user=r.r
Jun 16 22:22:32 cumulus sshd[5767]: Failed password for r.r from 84.127.137.26 port 58554 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?i
2019-06-22 04:33:29
190.64.149.242 attack
Request: "GET / HTTP/1.1"
2019-06-22 04:19:52
178.162.210.6 attack
Proxy Request: "GET http://178.162.210.6/proxychecker/check.cgi?action=getinfo HTTP/1.0" Proxy Request: "GET http://178.162.210.6/proxychecker/check.cgi?action=getinfo HTTP/1.0"
2019-06-22 04:17:52
182.139.160.108 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2019-06-22 04:12:20
18.188.164.133 attackspam
/wp-login.php
2019-06-22 04:10:16
104.236.122.193 attackbotsspam
" "
2019-06-22 04:08:28
175.139.231.129 attackbots
Jun 21 21:46:36 mail postfix/smtpd\[3758\]: warning: unknown\[175.139.231.129\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 21 21:47:08 mail postfix/smtpd\[4078\]: warning: unknown\[175.139.231.129\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 21 21:47:35 mail postfix/smtpd\[4078\]: warning: unknown\[175.139.231.129\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-22 04:03:02
138.118.100.245 attackbots
Request: "GET / HTTP/1.1"
2019-06-22 04:39:44
163.172.27.234 attackbots
Request: "GET /admin/ HTTP/1.1" Request: "GET /downloader/ HTTP/1.1" Request: "GET /rss/catalog/notifystock/ HTTP/1.1" Request: "GET /rss/order/new/ HTTP/1.1" Request: "GET /news/ HTTP/1.1"
2019-06-22 04:27:29
50.199.225.204 attackspam
Jun 21 21:46:43 [host] sshd[23868]: Invalid user dun from 50.199.225.204
Jun 21 21:46:43 [host] sshd[23868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.199.225.204
Jun 21 21:46:45 [host] sshd[23868]: Failed password for invalid user dun from 50.199.225.204 port 13670 ssh2
2019-06-22 04:27:50
177.68.86.232 attackbotsspam
Request: "GET / HTTP/1.1"
2019-06-22 04:17:37

最近上报的IP列表

182.157.28.68 194.88.98.84 162.216.150.210 2606:4700:10::6816:3825
2606:4700:10::6816:174 2606:4700:10::6816:834 2606:4700:10::6816:2080 2606:4700:10::6814:4369
2606:4700:10::6814:7998 2606:4700:10::6814:6247 2606:4700:10::6816:107 2606:4700:10::6814:9095
2606:4700:10::6816:3408 110.78.156.90 2606:4700:10::6816:3698 2606:4700:10::6816:4481
46.133.217.216 185.12.248.5 103.143.11.229 66.132.172.134