必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Montevideo

省份(region): Montevideo

国家(country): Uruguay

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% IP Client: 124.223.158.242
 
% Joint Whois - whois.lacnic.net
%  This server accepts single ASN, IPv4 or IPv6 queries

% LACNIC resource: whois.lacnic.net


% Copyright LACNIC lacnic.net
%  The data below is provided for information purposes
%  and to assist persons in obtaining information about or
%  related to AS and IP numbers registrations
%  By submitting a whois query, you agree to use this data
%  only for lawful purposes.
%  2026-04-10 16:00:23 (-03 -03:00)

inetnum:     186.52.0.0/14
status:      allocated
aut-num:     AS6057
owner:       Administracion Nacional de Telecomunicaciones
ownerid:     UY-ANTA-LACNIC
responsible: ANTEL URUGUAY
address:     Guatemala, 1075, Torre de las Telecomunicaciones
address:     11800 - Montevideo - Montevideo
country:     UY
phone:       +598  29280000 [0000]
owner-c:     IIA17
tech-c:      ANU
abuse-c:     ANU
inetrev:     186.52.0.0/16
nserver:     NS1.ANTELDATA.COM.UY
nsstat:      20260406 AA
nslastaa:    20260406
nserver:     NS2.ANTELDATA.COM.UY
nsstat:      20260406 AA
nslastaa:    20260406
inetrev:     186.53.0.0/16
nserver:     NS1.ANTELDATA.COM.UY
nsstat:      20260410 AA
nslastaa:    20260410
nserver:     NS2.ANTELDATA.COM.UY
nsstat:      20260410 AA
nslastaa:    20260410
inetrev:     186.54.0.0/16
nserver:     NS1.ANTELDATA.COM.UY
nsstat:      20260409 AA
nslastaa:    20260409
nserver:     NS2.ANTELDATA.COM.UY
nsstat:      20260409 AA
nslastaa:    20260409
inetrev:     186.55.0.0/16
nserver:     NS1.ANTELDATA.COM.UY
nsstat:      20260409 AA
nslastaa:    20260409
nserver:     NS2.ANTELDATA.COM.UY
nsstat:      20260409 AA
nslastaa:    20260409
created:     20111011
changed:     20111011

nic-hdl:     IIA17
person:      Ingeniería Internacional Antel
e-mail:      uai@antel.com.uy
address:     Guatemala, 1075, Torre de las Telecomunicaciones
address:     11800 - Montevideo - Montevideo
country:     UY
phone:       +598  29280000 [0000]
created:     20240118
changed:     20260128

nic-hdl:     ANU
person:      ANTEL URUGUAY
e-mail:      ipadmin@antel.net.uy
address:     Mercedes, 876, P. 2
address:     11100 - Montevideo - 
country:     UY
phone:       +598  29002877 [0000]
created:     20020910
changed:     20240117

% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 186.55.7.178
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41269
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;186.55.7.178.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041001 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 11 03:00:23 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
178.7.55.186.in-addr.arpa domain name pointer r186-55-7-178.dialup.adsl.anteldata.net.uy.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
178.7.55.186.in-addr.arpa	name = r186-55-7-178.dialup.adsl.anteldata.net.uy.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
62.210.206.78 attackspambots
Apr 19 05:23:46 powerpi2 sshd[15155]: Invalid user la from 62.210.206.78 port 53364
Apr 19 05:23:49 powerpi2 sshd[15155]: Failed password for invalid user la from 62.210.206.78 port 53364 ssh2
Apr 19 05:29:15 powerpi2 sshd[15426]: Invalid user au from 62.210.206.78 port 38918
...
2020-04-19 15:26:39
104.239.168.149 attack
$f2bV_matches
2020-04-19 15:45:00
172.93.220.103 attackbots
MAIL: User Login Brute Force Attempt
2020-04-19 15:41:58
49.234.122.94 attackspambots
ssh brute force
2020-04-19 15:24:31
222.186.180.223 attackbotsspam
2020-04-19T07:40:51.475358abusebot-4.cloudsearch.cf sshd[23175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.223  user=root
2020-04-19T07:40:52.908176abusebot-4.cloudsearch.cf sshd[23175]: Failed password for root from 222.186.180.223 port 25736 ssh2
2020-04-19T07:40:56.032488abusebot-4.cloudsearch.cf sshd[23175]: Failed password for root from 222.186.180.223 port 25736 ssh2
2020-04-19T07:40:51.475358abusebot-4.cloudsearch.cf sshd[23175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.223  user=root
2020-04-19T07:40:52.908176abusebot-4.cloudsearch.cf sshd[23175]: Failed password for root from 222.186.180.223 port 25736 ssh2
2020-04-19T07:40:56.032488abusebot-4.cloudsearch.cf sshd[23175]: Failed password for root from 222.186.180.223 port 25736 ssh2
2020-04-19T07:40:51.475358abusebot-4.cloudsearch.cf sshd[23175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 
...
2020-04-19 15:48:09
222.186.173.142 attack
Apr 19 09:42:08 server sshd[26199]: Failed none for root from 222.186.173.142 port 29226 ssh2
Apr 19 09:42:11 server sshd[26199]: Failed password for root from 222.186.173.142 port 29226 ssh2
Apr 19 09:42:16 server sshd[26199]: Failed password for root from 222.186.173.142 port 29226 ssh2
2020-04-19 16:01:19
212.64.54.49 attackspam
2020-04-19T07:36:33.782178rocketchat.forhosting.nl sshd[19615]: Invalid user gh from 212.64.54.49 port 34410
2020-04-19T07:36:35.698529rocketchat.forhosting.nl sshd[19615]: Failed password for invalid user gh from 212.64.54.49 port 34410 ssh2
2020-04-19T07:51:56.263964rocketchat.forhosting.nl sshd[19956]: Invalid user postgres from 212.64.54.49 port 56396
...
2020-04-19 15:20:59
106.13.73.210 attackbots
(sshd) Failed SSH login from 106.13.73.210 (CN/China/-): 5 in the last 3600 secs
2020-04-19 15:32:49
45.4.219.213 attackbots
Automatic report - Port Scan Attack
2020-04-19 15:30:03
141.98.81.99 attackspambots
Apr 19 09:26:43 host sshd[24556]: Invalid user Administrator from 141.98.81.99 port 40573
...
2020-04-19 15:31:55
45.67.235.65 attackbots
[ 📨 ] From devolvido@planodisponivel.live Sun Apr 19 00:52:59 2020
Received: from nochost-mx2.planodisponivel.live ([45.67.235.65]:59995)
2020-04-19 15:26:59
218.161.18.17 attackbots
" "
2020-04-19 15:36:53
73.36.232.192 attackspambots
(imapd) Failed IMAP login from 73.36.232.192 (US/United States/c-73-36-232-192.hsd1.mi.comcast.net): 1 in the last 3600 secs
2020-04-19 15:33:10
182.61.5.109 attackspam
Invalid user git from 182.61.5.109 port 44626
2020-04-19 15:50:47
128.199.162.108 attackbots
SSH Brute-Force attacks
2020-04-19 15:56:53

最近上报的IP列表

162.216.149.40 49.60.118.205 45.230.74.42 2606:4700:10::6814:9922
2606:4700:10::6814:6834 2606:4700:10::ac43:2586 2606:4700:10::6816:556 2606:4700:10::6814:8812
2606:4700:10::6814:4458 164.155.74.139 197.36.59.203 199.7.230.241
91.230.168.143 195.184.76.197 161.102.40.32 152.108.255.10
120.171.54.136 110.77.187.63 2606:4700:10::6814:7456 2606:4700:10::6816:57