必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Algiers

省份(region): Alger

国家(country): Algeria

运营商(isp): AT

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       168.253.0.0 - 168.253.255.255
CIDR:           168.253.0.0/16
NetName:        AFRINIC-168-253-0-0
NetHandle:      NET-168-253-0-0-1
Parent:         NET168 (NET-168-0-0-0-0)
NetType:        Transferred to AfriNIC
OriginAS:       
Organization:   African Network Information Center (AFRINIC)
RegDate:        2010-07-09
Updated:        2010-07-09
Comment:        This IP address range is under AFRINIC responsibility.
Comment:        Please see http://www.afrinic.net/ for further details,
Comment:        or check the WHOIS server located at whois.afrinic.net.
Ref:            https://rdap.arin.net/registry/ip/168.253.0.0

ResourceLink:  http://afrinic.net/en/services/whois-query
ResourceLink:  whois.afrinic.net


OrgName:        African Network Information Center
OrgId:          AFRINIC
Address:        Level 11ABC
Address:        Raffles Tower
Address:        Lot 19, Cybercity
City:           Ebene
StateProv:      
PostalCode:     
Country:        MU
RegDate:        2004-05-17
Updated:        2015-05-04
Comment:        AfriNIC - http://www.afrinic.net
Comment:        The African & Indian Ocean Internet Registry
Ref:            https://rdap.arin.net/registry/entity/AFRINIC

ReferralServer:  whois://whois.afrinic.net
ResourceLink:  http://afrinic.net/en/services/whois-query

OrgAbuseHandle: GENER11-ARIN
OrgAbuseName:   Generic POC
OrgAbusePhone:  +230 4666616 
OrgAbuseEmail:  abusepoc@afrinic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/GENER11-ARIN

OrgTechHandle: GENER11-ARIN
OrgTechName:   Generic POC
OrgTechPhone:  +230 4666616 
OrgTechEmail:  abusepoc@afrinic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/GENER11-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.afrinic.net.

% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to  the following terms of Use. See https://afrinic.net/whois/terms

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '168.253.104.0 - 168.253.107.255'

% No abuse contact registered for 168.253.104.0 - 168.253.107.255

inetnum:        168.253.104.0 - 168.253.107.255
netname:        Net_Subnet
descr:          Net_Subnet
country:        DZ
admin-c:        WE11-AFRINIC
tech-c:         WE11-AFRINIC
status:         ASSIGNED PA
mnt-by:         Wataniya-Tel-MNT
source:         AFRINIC # Filtered
parent:         168.253.96.0 - 168.253.111.255

person:         Wataniya Eldjazair
nic-hdl:        WE11-AFRINIC
address:        66. Route de Ouled Fayet, Cheraga Algiers Algeria
address:        Algiers
address:        Algeria
phone:          tel:+213-554-50-05-07
mnt-by:         Wataniya-Tel-MNT
source:         AFRINIC # Filtered

% Information related to '168.253.96.0/20AS33779'

route:          168.253.96.0/20
descr:          Net_Subnet
origin:         AS33779
mnt-by:         WATANIYA-TEL-MNT
source:         AFRINIC # Filtered
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 168.253.106.0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65009
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;168.253.106.0.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026022600 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 26 14:13:00 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 0.106.253.168.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 0.106.253.168.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
187.167.202.51 attackbots
Automatic report - Port Scan Attack
2020-02-21 02:14:42
216.218.206.78 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-21 02:16:35
222.186.31.135 attackbotsspam
Feb 20 19:03:30 ucs sshd\[17058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.135  user=root
Feb 20 19:03:32 ucs sshd\[17056\]: error: PAM: User not known to the underlying authentication module for root from 222.186.31.135
Feb 20 19:03:33 ucs sshd\[17059\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.135  user=root
...
2020-02-21 02:05:39
112.173.146.233 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-21 02:34:16
201.108.235.213 attackspam
Honeypot attack, port: 81, PTR: dsl-201-108-235-213.prod-dial.com.mx.
2020-02-21 02:21:57
41.219.190.106 attackspambots
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2020-02-21 02:27:54
128.199.233.188 attackbots
suspicious action Thu, 20 Feb 2020 12:47:27 -0300
2020-02-21 02:15:01
190.214.55.218 attack
suspicious action Thu, 20 Feb 2020 10:24:44 -0300
2020-02-21 02:29:24
193.112.89.32 attackbotsspam
suspicious action Thu, 20 Feb 2020 10:25:17 -0300
2020-02-21 02:07:03
46.32.121.245 attackbotsspam
Feb 20 15:29:42 vpn01 sshd[9082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.32.121.245
Feb 20 15:29:45 vpn01 sshd[9082]: Failed password for invalid user pi from 46.32.121.245 port 26548 ssh2
...
2020-02-21 02:32:52
165.22.251.121 attackbotsspam
Automatic report - XMLRPC Attack
2020-02-21 02:08:07
192.241.219.194 attackbotsspam
7777/tcp 2077/tcp 5631/tcp...
[2020-02-14/20]9pkt,8pt.(tcp),1pt.(udp)
2020-02-21 02:19:46
121.66.224.90 attackspambots
Feb 20 19:00:04  sshd\[21205\]: Invalid user guest from 121.66.224.90Feb 20 19:00:05  sshd\[21205\]: Failed password for invalid user guest from 121.66.224.90 port 60508 ssh2
...
2020-02-21 02:02:30
209.97.174.186 attackbotsspam
Invalid user couchdb from 209.97.174.186 port 34802
2020-02-21 02:23:07
80.82.70.239 attackbotsspam
02/20/2020-19:06:47.202863 80.82.70.239 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 82
2020-02-21 02:17:57

最近上报的IP列表

154.218.3.133 85.11.167.7 54.39.16.132 45.200.17.169
194.180.48.253 158.94.211.254 109.87.124.2 182.134.22.79
157.245.158.45 138.91.107.7 154.213.192.174 154.213.192.43
95.179.129.1 104.140.148.70 44.220.185.229 51.159.105.145
116.178.129.45 166.1.6.8 112.74.127.184 26.19.224.242