必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Amsterdam

省份(region): Noord Holland

国家(country): The Netherlands

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '178.16.53.0 - 178.16.53.255'

% Abuse contact for '178.16.53.0 - 178.16.53.255' is 'abuse@omegatech.sc'

inetnum:        178.16.53.0 - 178.16.53.255
netname:        OMEGATECH
country:        NL
geofeed:        https://omegatech.sc/geofeed.csv
descr:          OMEGATECH
org:            ORG-OL329-RIPE
abuse-c:        CA12141-RIPE
admin-c:        CA12141-RIPE
tech-c:         CA12141-RIPE
mnt-domains:    omegatechsc-mnt
mnt-lower:      omegatechsc-mnt
mnt-routes:     omegatechsc-mnt
status:         ASSIGNED PA
mnt-by:         lir-tr-mgn-1-MNT
created:        2025-08-19T16:04:50Z
last-modified:  2026-01-21T12:56:11Z
source:         RIPE

organisation:   ORG-OL329-RIPE
org-name:       Omegatech LTD
org-type:       OTHER
address:        HOUSE OF FRANCIS ROOM 303, ILE DU PORT, MAHE, SEYCHELLES
country:        SC
abuse-c:        CA12141-RIPE
mnt-ref:        omegatechsc-mnt
mnt-ref:        lir-tr-mgn-1-MNT
created:        2026-01-05T00:10:50Z
last-modified:  2026-01-21T12:55:02Z
source:         RIPE # Filtered
mnt-by:         omegatechsc-mnt

role:           Abuse Contact
address:        abuse@omegatech.sc
nic-hdl:        CA12141-RIPE
abuse-mailbox:  abuse@omegatech.sc
mnt-by:         omegatechsc-mnt
created:        2026-01-05T00:09:14Z
last-modified:  2026-01-21T12:42:42Z
source:         RIPE # Filtered

% Information related to '178.16.53.0/24AS202412'

route:          178.16.53.0/24
origin:         AS202412
created:        2026-01-21T12:34:45Z
last-modified:  2026-01-21T12:34:45Z
source:         RIPE
mnt-by:         lir-tr-mgn-1-MNT

% This query was served by the RIPE Database Query Service version 1.121 (SHETLAND)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 178.16.53.90
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21613
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;178.16.53.90.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031200 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 12 16:01:15 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
Host 90.53.16.178.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 90.53.16.178.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
1.119.0.21 attackspam
Unauthorized connection attempt detected from IP address 1.119.0.21 to port 1433 [T]
2020-01-09 03:37:43
111.11.181.52 attackbots
Unauthorized connection attempt detected from IP address 111.11.181.52 to port 22 [T]
2020-01-09 03:30:49
157.230.128.195 attackspam
Failed password for invalid user yuanwd from 157.230.128.195 port 44634 ssh2
Invalid user qd from 157.230.128.195 port 42084
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.128.195
Failed password for invalid user qd from 157.230.128.195 port 42084 ssh2
Invalid user jsx from 157.230.128.195 port 39532
2020-01-09 03:24:31
106.12.16.154 attackspambots
Unauthorized connection attempt detected from IP address 106.12.16.154 to port 22 [T]
2020-01-09 03:52:18
1.197.113.51 attack
Unauthorized connection attempt detected from IP address 1.197.113.51 to port 445 [T]
2020-01-09 03:37:17
101.224.55.154 attackbots
Unauthorized connection attempt detected from IP address 101.224.55.154 to port 445 [T]
2020-01-09 03:53:12
183.80.93.121 attackspam
Unauthorized connection attempt detected from IP address 183.80.93.121 to port 23 [T]
2020-01-09 03:23:17
61.153.237.123 attack
Unauthorized connection attempt detected from IP address 61.153.237.123 to port 445 [T]
2020-01-09 03:32:14
120.72.21.6 attackspam
Unauthorized connection attempt detected from IP address 120.72.21.6 to port 23 [T]
2020-01-09 03:26:37
164.52.24.180 attackspam
Unauthorized connection attempt detected from IP address 164.52.24.180 to port 11 [T]
2020-01-09 03:45:11
218.10.28.58 attackbotsspam
Unauthorized connection attempt detected from IP address 218.10.28.58 to port 1433 [T]
2020-01-09 03:20:13
129.204.125.194 attackspambots
Unauthorized connection attempt detected from IP address 129.204.125.194 to port 23 [T]
2020-01-09 03:46:17
218.82.242.108 attack
Unauthorized connection attempt detected from IP address 218.82.242.108 to port 445 [T]
2020-01-09 03:43:16
203.80.45.231 attackspambots
Unauthorized connection attempt detected from IP address 203.80.45.231 to port 23 [T]
2020-01-09 03:21:07
42.119.15.134 attack
Unauthorized connection attempt detected from IP address 42.119.15.134 to port 23 [T]
2020-01-09 03:55:44

最近上报的IP列表

2.249.142.165 185.231.33.46 10.36.198.186 254.238.12.218
74.7.241.51 74.7.175.142 149.52.71.138 80.174.222.112
122.162.151.75 192.71.224.103 37.24.235.170 45.142.154.32
178.62.29.13 220.103.92.112 20.23.9.218 91.231.89.68
91.231.89.2 58.240.69.164 62.33.26.212 115.45.42.36