必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Chaguanas

省份(region): Chaguanas

国家(country): Trinidad and Tobago

运营商(isp): Digicel

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% IP Client: 124.223.158.242
 
% Joint Whois - whois.lacnic.net
%  This server accepts single ASN, IPv4 or IPv6 queries

% LACNIC resource: whois.lacnic.net


% Copyright LACNIC lacnic.net
%  The data below is provided for information purposes
%  and to assist persons in obtaining information about or
%  related to AS and IP numbers registrations
%  By submitting a whois query, you agree to use this data
%  only for lawful purposes.
%  2025-10-09 22:27:49 (-03 -03:00)

inetnum:     181.118.32.0/19
status:      allocated
aut-num:     AS27800
owner:       Digicel Trinidad and Tobago Ltd.
ownerid:     TT-DTAT-LACNIC
responsible: Digicel Trinidad IP
address:     11C Maraval Road, ANSA Bldg, 0, -
address:     00000 - Port of Spain - 
country:     TT
phone:       +1  8683999999 [0000]
owner-c:     MAT22
tech-c:      MAT22
abuse-c:     MAT22
inetrev:     181.118.32.0/20
nserver:     DNS4.DIGICELGROUP.COM [lame - not published]
nsstat:      20251009 TIMEOUT
nslastaa:    20251006
nserver:     DNS5.DIGICELGROUP.COM [lame - not published]
nsstat:      20251009 FAIL
nslastaa:    20230809
inetrev:     181.118.48.0/20
nserver:     DNS4.DIGICELGROUP.COM
nsstat:      20251008 AA
nslastaa:    20251008
nserver:     DNS5.DIGICELGROUP.COM [lame - not published]
nsstat:      20251008 FAIL
nslastaa:    20230808
created:     20130628
changed:     20170816

nic-hdl:     MAT22
person:      Marvin Thomas
e-mail:      marvin.thomas@digicelgroup.com
address:     ANSA CENTER, 11c Maraval Road, St. Clair, 11, C
address:     9999 - Port-of-Spain - 
country:     TT
phone:       +1 868 2902887
created:     20121023
changed:     20220107

% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 181.118.42.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52989
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;181.118.42.75.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025100901 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 10 09:27:49 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 75.42.118.181.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 75.42.118.181.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
112.85.42.94 attackbotsspam
May 30 11:20:58 game-panel sshd[18161]: Failed password for root from 112.85.42.94 port 46774 ssh2
May 30 11:21:00 game-panel sshd[18161]: Failed password for root from 112.85.42.94 port 46774 ssh2
May 30 11:21:02 game-panel sshd[18161]: Failed password for root from 112.85.42.94 port 46774 ssh2
2020-05-30 19:38:18
79.126.130.42 attackbots
Attempted connection to port 8080.
2020-05-30 19:04:04
179.83.125.202 attackbots
Unauthorized connection attempt from IP address 179.83.125.202 on Port 445(SMB)
2020-05-30 19:37:48
64.227.2.96 attack
May 30 13:41:56 hosting sshd[9480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.2.96  user=root
May 30 13:41:58 hosting sshd[9480]: Failed password for root from 64.227.2.96 port 33610 ssh2
May 30 13:46:36 hosting sshd[10117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.2.96  user=root
May 30 13:46:37 hosting sshd[10117]: Failed password for root from 64.227.2.96 port 39558 ssh2
...
2020-05-30 19:14:28
105.22.35.14 attackbotsspam
Unauthorized connection attempt from IP address 105.22.35.14 on Port 445(SMB)
2020-05-30 19:01:17
51.255.35.58 attackspam
Invalid user cvsroot from 51.255.35.58 port 49852
2020-05-30 19:27:26
36.89.156.141 attack
2020-05-30T06:43:45.049647abusebot.cloudsearch.cf sshd[27035]: Invalid user user from 36.89.156.141 port 52530
2020-05-30T06:43:45.054726abusebot.cloudsearch.cf sshd[27035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.89.156.141
2020-05-30T06:43:45.049647abusebot.cloudsearch.cf sshd[27035]: Invalid user user from 36.89.156.141 port 52530
2020-05-30T06:43:47.313410abusebot.cloudsearch.cf sshd[27035]: Failed password for invalid user user from 36.89.156.141 port 52530 ssh2
2020-05-30T06:48:13.394599abusebot.cloudsearch.cf sshd[27363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.89.156.141  user=root
2020-05-30T06:48:15.778677abusebot.cloudsearch.cf sshd[27363]: Failed password for root from 36.89.156.141 port 57658 ssh2
2020-05-30T06:52:44.727544abusebot.cloudsearch.cf sshd[27634]: Invalid user test2 from 36.89.156.141 port 34550
...
2020-05-30 19:21:45
13.209.68.44 attackbotsspam
May 30 09:35:12 localhost sshd\[31220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.209.68.44  user=root
May 30 09:35:14 localhost sshd\[31220\]: Failed password for root from 13.209.68.44 port 50238 ssh2
May 30 10:06:47 localhost sshd\[31754\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.209.68.44  user=root
...
2020-05-30 19:15:35
211.205.95.1 attack
Unauthorized connection attempt from IP address 211.205.95.1 on Port 445(SMB)
2020-05-30 19:33:46
200.5.55.199 attack
Unauthorized connection attempt from IP address 200.5.55.199 on Port 445(SMB)
2020-05-30 18:56:33
212.3.172.107 attackbotsspam
Automatic report - Banned IP Access
2020-05-30 19:35:15
49.235.76.84 attackspam
Invalid user test6 from 49.235.76.84 port 42428
2020-05-30 19:18:35
178.175.241.247 attackspam
Attempted connection to port 23.
2020-05-30 19:16:02
220.134.12.44 attackbotsspam
port 23
2020-05-30 19:23:41
45.79.125.140 attackspam
Unauthorised access (May 30) SRC=45.79.125.140 LEN=40 TTL=243 ID=54321 TCP DPT=8080 WINDOW=65535 SYN
2020-05-30 19:08:05

最近上报的IP列表

10.1.214.36 10.20.74.26 1.225.85.168 64.23.196.172
143.110.156.43 196.251.115.78 185.213.83.62 112.80.139.214
112.80.139.230 82.216.238.102 112.12.145.241 185.177.72.48
113.215.188.86 91.227.62.213 172.237.124.234 46.101.90.109
10.89.67.233 111.172.229.145 111.172.229.173 120.222.228.167