必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Asunción

省份(region): Asuncion

国家(country): Paraguay

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% IP Client: 124.223.158.242
 
% Joint Whois - whois.lacnic.net
%  This server accepts single ASN, IPv4 or IPv6 queries

% LACNIC resource: whois.lacnic.net


% Copyright LACNIC lacnic.net
%  The data below is provided for information purposes
%  and to assist persons in obtaining information about or
%  related to AS and IP numbers registrations
%  By submitting a whois query, you agree to use this data
%  only for lawful purposes.
%  2026-04-09 21:47:20 (-03 -03:00)

inetnum:     181.94.224.0/21
status:      allocated
aut-num:     N/A
owner:       Núcleo S.A.
ownerid:     PY-NUSA-LACNIC
responsible: Omar Monges
address:     Maximo Lira, 522, 
address:     8605 - Asuncion - CE
country:     PY
phone:       +595 21 2199000
owner-c:     SES52
tech-c:      SES52
abuse-c:     SES52
inetrev:     181.94.224.0/24
nserver:     NS1.PERSONAL.NET.PY
nsstat:      20260408 AA
nslastaa:    20260408
nserver:     NS2.PERSONAL.NET.PY
nsstat:      20260408 AA
nslastaa:    20260408
nserver:     NS3.PERSONAL.NET.PY
nsstat:      20260408 AA
nslastaa:    20260408
nserver:     NS4.PERSONAL.NET.PY
nsstat:      20260408 AA
nslastaa:    20260408
inetrev:     181.94.225.0/24
nserver:     NS1.PERSONAL.NET.PY
nsstat:      20260407 AA
nslastaa:    20260407
nserver:     NS2.PERSONAL.NET.PY
nsstat:      20260407 AA
nslastaa:    20260407
nserver:     NS3.PERSONAL.NET.PY
nsstat:      20260407 AA
nslastaa:    20260407
nserver:     NS4.PERSONAL.NET.PY
nsstat:      20260407 AA
nslastaa:    20260407
inetrev:     181.94.226.0/24
nserver:     NS1.PERSONAL.NET.PY
nsstat:      20260408 AA
nslastaa:    20260408
nserver:     NS2.PERSONAL.NET.PY
nsstat:      20260408 AA
nslastaa:    20260408
nserver:     NS3.PERSONAL.NET.PY
nsstat:      20260408 AA
nslastaa:    20260408
nserver:     NS4.PERSONAL.NET.PY
nsstat:      20260408 AA
nslastaa:    20260408
inetrev:     181.94.227.0/24
nserver:     NS1.PERSONAL.NET.PY
nsstat:      20260409 AA
nslastaa:    20260409
nserver:     NS2.PERSONAL.NET.PY
nsstat:      20260409 AA
nslastaa:    20260409
nserver:     NS3.PERSONAL.NET.PY
nsstat:      20260409 AA
nslastaa:    20260409
nserver:     NS4.PERSONAL.NET.PY
nsstat:      20260409 AA
nslastaa:    20260409
inetrev:     181.94.228.0/24
nserver:     NS1.PERSONAL.NET.PY
nsstat:      20260408 AA
nslastaa:    20260408
nserver:     NS2.PERSONAL.NET.PY
nsstat:      20260408 AA
nslastaa:    20260408
nserver:     NS3.PERSONAL.NET.PY
nsstat:      20260408 AA
nslastaa:    20260408
nserver:     NS4.PERSONAL.NET.PY
nsstat:      20260408 AA
nslastaa:    20260408
inetrev:     181.94.229.0/24
nserver:     NS1.PERSONAL.NET.PY
nsstat:      20260408 AA
nslastaa:    20260408
nserver:     NS2.PERSONAL.NET.PY
nsstat:      20260408 AA
nslastaa:    20260408
nserver:     NS3.PERSONAL.NET.PY
nsstat:      20260408 AA
nslastaa:    20260408
nserver:     NS4.PERSONAL.NET.PY
nsstat:      20260408 AA
nslastaa:    20260408
inetrev:     181.94.230.0/24
nserver:     NS1.PERSONAL.NET.PY
nsstat:      20260409 AA
nslastaa:    20260409
nserver:     NS2.PERSONAL.NET.PY
nsstat:      20260409 AA
nslastaa:    20260409
nserver:     NS3.PERSONAL.NET.PY
nsstat:      20260409 AA
nslastaa:    20260409
nserver:     NS4.PERSONAL.NET.PY
nsstat:      20260409 AA
nslastaa:    20260409
inetrev:     181.94.231.0/24
nserver:     NS1.PERSONAL.NET.PY
nsstat:      20260409 AA
nslastaa:    20260409
nserver:     NS2.PERSONAL.NET.PY
nsstat:      20260409 AA
nslastaa:    20260409
nserver:     NS3.PERSONAL.NET.PY
nsstat:      20260409 AA
nslastaa:    20260409
nserver:     NS4.PERSONAL.NET.PY
nsstat:      20260409 AA
nslastaa:    20260409
created:     20110919
changed:     20231207

nic-hdl:     SES52
person:      Sergio Da Silva
e-mail:      sergio.dasilva@personal.com.py
address:     Maximo Lira, 522, 
address:     0000 - Asuncion - Ce
country:     PY
phone:       +595 21 2199225
created:     20140805
changed:     20211228

% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 181.94.229.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58332
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;181.94.229.11.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040902 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 10 08:31:04 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
11.229.94.181.in-addr.arpa domain name pointer host-11.personal.net.py.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
11.229.94.181.in-addr.arpa	name = host-11.personal.net.py.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
34.73.144.77 attack
Sep 30 07:47:03 prox sshd[13807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.73.144.77 
Sep 30 07:47:05 prox sshd[13807]: Failed password for invalid user admin from 34.73.144.77 port 54886 ssh2
2020-09-30 15:14:07
102.165.30.17 attack
Automatic report - Banned IP Access
2020-09-30 15:40:32
213.184.254.128 attackspambots
445/tcp 1433/tcp...
[2020-08-04/09-29]7pkt,2pt.(tcp)
2020-09-30 15:31:41
180.76.96.55 attackspam
Invalid user user3 from 180.76.96.55 port 49842
2020-09-30 15:24:40
71.6.232.8 attackspambots
Port scan denied
2020-09-30 15:26:02
123.171.6.137 attack
[MK-VM2] Blocked by UFW
2020-09-30 15:04:46
202.98.203.20 attack
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 60
2020-09-30 15:32:28
196.52.43.119 attackspambots
srv02 Mass scanning activity detected Target: 40000  ..
2020-09-30 15:20:31
51.83.136.117 attackspam
Sep 29 19:18:06 ws22vmsma01 sshd[192332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.136.117
Sep 29 19:18:07 ws22vmsma01 sshd[192332]: Failed password for invalid user office1 from 51.83.136.117 port 41324 ssh2
...
2020-09-30 15:10:49
35.188.49.176 attackbotsspam
Sep 30 04:50:35 vm1 sshd[13182]: Failed password for root from 35.188.49.176 port 57002 ssh2
...
2020-09-30 15:03:43
167.248.133.50 attackspam
Tried our host z.
2020-09-30 15:20:14
185.49.87.86 attackspambots
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 60
2020-09-30 15:33:21
129.211.74.252 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-30 15:08:40
174.138.27.165 attackspambots
2020-09-29T22:06:51.726371dreamphreak.com sshd[448882]: Invalid user uji from 174.138.27.165 port 48244
2020-09-29T22:06:54.203453dreamphreak.com sshd[448882]: Failed password for invalid user uji from 174.138.27.165 port 48244 ssh2
...
2020-09-30 15:00:47
111.229.176.206 attackbotsspam
Invalid user test from 111.229.176.206 port 51950
2020-09-30 15:07:11

最近上报的IP列表

193.202.9.211 17.239.194.181 64.23.180.195 38.250.187.139
122.192.203.117 2606:4700:10::6814:4745 2606:4700:10::6814:6660 2606:4700:10::6816:4263
2606:4700:10::ac43:1989 2606:4700:10::6816:2488 2606:4700:10::6814:9773 110.78.138.160
142.250.69.174 2606:4700:10::6814:6927 2606:4700:10::6814:6622 110.78.153.143
2606:4700:10::6816:1825 38.248.192.53 111.200.212.26 104.126.37.179