必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Tacna

省份(region): Tacna

国家(country): Peru

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% IP Client: 124.223.158.242
 
% Joint Whois - whois.lacnic.net
%  This server accepts single ASN, IPv4 or IPv6 queries

% LACNIC resource: whois.lacnic.net


% Copyright LACNIC lacnic.net
%  The data below is provided for information purposes
%  and to assist persons in obtaining information about or
%  related to AS and IP numbers registrations
%  By submitting a whois query, you agree to use this data
%  only for lawful purposes.
%  2025-11-06 11:31:59 (-03 -03:00)

inetnum:     181.64.0.0/19
status:      reallocated
aut-num:     AS6147
owner:       PE-TDPERX6-LACNIC
ownerid:     PE-PETD8-LACNIC
responsible: Telefonica del Peru
address:     Av. San Felipe 1144, 1144, Edi. A
address:     34 - Lima - 
country:     PE
phone:       +51 1 2106771
owner-c:     GRT2
tech-c:      GRT2
abuse-c:     GRT2
created:     20120418
changed:     20120418
inetnum-up:  181.64.0.0/17

nic-hdl:     GRT2
person:      Gestion Dir. IP Telefónica del Perú
e-mail:      tommy.tomaylla@telefonica.com
address:     Calle San Felipe 1144, 1144, 
address:     LI34 - Lima - LI
country:     PE
phone:       +51 1 2106771
created:     20021204
changed:     20240409

% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 181.64.13.224
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35652
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;181.64.13.224.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025110600 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 06 22:32:00 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 224.13.64.181.in-addr.arpa. not found: 3(NXDOMAIN)
'
NSLOOKUP信息:
server can't find 181.64.13.224.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
112.251.196.47 attackspam
23/tcp
[2019-07-21]1pkt
2019-07-21 15:52:42
159.203.169.16 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2019-07-21 15:55:08
156.209.69.171 attack
Sat, 20 Jul 2019 21:53:42 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 15:26:21
113.176.44.50 attackspambots
Sat, 20 Jul 2019 21:53:42 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 15:28:28
112.85.42.87 attack
Jul 21 09:40:43 ubuntu-2gb-nbg1-dc3-1 sshd[26962]: Failed password for root from 112.85.42.87 port 47805 ssh2
Jul 21 09:40:48 ubuntu-2gb-nbg1-dc3-1 sshd[26962]: error: maximum authentication attempts exceeded for root from 112.85.42.87 port 47805 ssh2 [preauth]
...
2019-07-21 15:50:13
185.24.233.14 attackspambots
Jul 21 10:09:27 mail postfix/smtps/smtpd\[7484\]: warning: 14-233-24-185.static.servebyte.com\[185.24.233.14\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 21 10:13:58 mail postfix/smtps/smtpd\[7484\]: warning: 14-233-24-185.static.servebyte.com\[185.24.233.14\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 21 10:18:22 mail postfix/smtps/smtpd\[8221\]: warning: 14-233-24-185.static.servebyte.com\[185.24.233.14\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-07-21 16:26:52
27.157.91.183 attack
1433/tcp
[2019-07-21]1pkt
2019-07-21 15:43:56
77.88.87.74 attackspambots
xmlrpc attack
2019-07-21 15:55:33
107.170.202.91 attackspam
RDP Scan
2019-07-21 16:21:04
51.254.129.128 attackspam
Jul 21 10:06:24 vps647732 sshd[21070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.129.128
Jul 21 10:06:27 vps647732 sshd[21070]: Failed password for invalid user elsje from 51.254.129.128 port 49117 ssh2
...
2019-07-21 16:22:41
2.28.210.158 attackbots
Automatic report - Port Scan Attack
2019-07-21 15:38:33
77.40.3.189 attackspambots
failed_logins
2019-07-21 16:09:27
1.10.208.100 attack
Sat, 20 Jul 2019 21:53:41 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 15:34:55
187.151.226.119 attackspambots
Sat, 20 Jul 2019 21:53:39 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 15:39:43
59.37.22.99 attack
Port 1433 Scan
2019-07-21 16:12:40

最近上报的IP列表

74.222.3.186 112.155.39.176 106.244.42.175 192.53.64.128
95.214.53.153 2a0f:a440:0:53:ede6:93da:605f:275a 47.92.125.245 47.92.197.246
47.92.99.170 47.92.213.242 39.98.85.197 121.11.48.202
162.243.112.28 139.59.58.135 203.227.50.34 85.11.167.4
18.201.215.211 42.229.133.41 39.163.180.188 36.159.179.250