必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Mexico

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% IP Client: 124.223.158.242
 
% Joint Whois - whois.lacnic.net
%  This server accepts single ASN, IPv4 or IPv6 queries

% LACNIC resource: whois.lacnic.net


% Copyright LACNIC lacnic.net
%  The data below is provided for information purposes
%  and to assist persons in obtaining information about or
%  related to AS and IP numbers registrations
%  By submitting a whois query, you agree to use this data
%  only for lawful purposes.
%  2026-03-24 16:30:29 (-03 -03:00)

inetnum:     189.206.0.0/16
status:      allocated
aut-num:     AS6503
aut-num:     AS11172
owner:       Alestra, S. de R.L. de C.V.
ownerid:     MX-ALES-LACNIC
responsible: IP NOC
address:     AV MUNICH, 175, CUAUHTEMOC
address:     66450 - SAN NICOLAS DE LOS GARZA - NL
country:     MX
phone:       +52  8008882662
owner-c:     INA2
tech-c:      INA2
abuse-c:     INA2
inetrev:     189.206.0.0/16
nserver:     DNS.ALESTRA.NET.MX
nsstat:      20260323 AA
nslastaa:    20260323
nserver:     MAIL1.ALESTRA.NET.MX
nsstat:      20260323 AA
nslastaa:    20260323
nserver:     MAIL2.ALESTRA.NET.MX
nsstat:      20260323 AA
nslastaa:    20260323
created:     20080108
changed:     20080108

nic-hdl:     INA2
person:      Inet Administrator
e-mail:      inetadmin@alestra.net.mx
address:     Ave. Eugenio Clariond Garza, 175, Cuauhtemoc
address:     66450 - San Nicolas de los Garza - NL
country:     MX
phone:       +52  8008882662
created:     20030206
changed:     20250421

% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 189.206.96.173
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30968
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;189.206.96.173.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032401 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 25 03:30:29 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
173.96.206.189.in-addr.arpa domain name pointer static-189-206-96-173.alestra.net.mx.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
173.96.206.189.in-addr.arpa	name = static-189-206-96-173.alestra.net.mx.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.173.201 attack
Jun 19 16:25:37 ns3164893 sshd[17532]: Failed password for root from 222.186.173.201 port 12770 ssh2
Jun 19 16:25:40 ns3164893 sshd[17532]: Failed password for root from 222.186.173.201 port 12770 ssh2
...
2020-06-19 22:25:50
192.99.6.138 attack
Automated report (2020-06-19T20:16:21+08:00). Misbehaving bot detected at this address.
2020-06-19 22:28:14
51.91.125.179 attackspam
Jun 19 14:59:05 server sshd[29687]: Failed password for root from 51.91.125.179 port 55920 ssh2
Jun 19 15:02:08 server sshd[30708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.125.179
Jun 19 15:02:10 server sshd[30708]: Failed password for invalid user factura from 51.91.125.179 port 55072 ssh2
...
2020-06-19 22:37:39
142.93.239.197 attackbotsspam
k+ssh-bruteforce
2020-06-19 22:57:42
42.233.251.149 attackspambots
80478:Jun 18 15:34:40 v2202006123119120432 sshd[22676]: Invalid user test7 from 42.233.251.149 port 36750
80480:Jun 18 15:34:40 v2202006123119120432 sshd[22676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.233.251.149 
80481:Jun 18 15:34:42 v2202006123119120432 sshd[22676]: Failed password for invalid user test7 from 42.233.251.149 port 36750 ssh2
80482:Jun 18 15:34:45 v2202006123119120432 sshd[22676]: Received disconnect from 42.233.251.149 port 36750:11: Bye Bye [preauth]
80483:Jun 18 15:34:45 v2202006123119120432 sshd[22676]: Disconnected from invalid user test7 42.233.251.149 port 36750 [preauth]
80553:Jun 18 15:40:23 v2202006123119120432 sshd[22987]: Invalid user vbox from 42.233.251.149 port 35970
80555:Jun 18 15:40:23 v2202006123119120432 sshd[22987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.233.251.149 

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=42.23
2020-06-19 22:56:41
2.85.160.166 attackbots
Automatic report - Port Scan Attack
2020-06-19 23:01:20
192.144.219.201 attack
Jun 19 16:15:56 abendstille sshd\[5615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.219.201  user=root
Jun 19 16:15:58 abendstille sshd\[5615\]: Failed password for root from 192.144.219.201 port 50810 ssh2
Jun 19 16:25:07 abendstille sshd\[15317\]: Invalid user server from 192.144.219.201
Jun 19 16:25:07 abendstille sshd\[15317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.219.201
Jun 19 16:25:09 abendstille sshd\[15317\]: Failed password for invalid user server from 192.144.219.201 port 34882 ssh2
...
2020-06-19 22:57:08
49.156.41.4 attackbots
Honeypot hit.
2020-06-19 22:54:13
180.199.134.76 attackbotsspam
Wordpress attack
2020-06-19 23:04:06
209.17.97.10 attackspambots
Automatic report - Port Scan
2020-06-19 23:05:57
213.74.71.236 attack
Automatic report - Banned IP Access
2020-06-19 22:26:52
162.243.142.225 attackbotsspam
Port scan: Attack repeated for 24 hours
2020-06-19 22:47:00
45.55.222.162 attackspambots
Jun 19 22:13:05 web1 sshd[31859]: Invalid user user from 45.55.222.162 port 44072
Jun 19 22:13:05 web1 sshd[31859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.222.162
Jun 19 22:13:05 web1 sshd[31859]: Invalid user user from 45.55.222.162 port 44072
Jun 19 22:13:07 web1 sshd[31859]: Failed password for invalid user user from 45.55.222.162 port 44072 ssh2
Jun 19 22:28:04 web1 sshd[3156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.222.162  user=root
Jun 19 22:28:06 web1 sshd[3156]: Failed password for root from 45.55.222.162 port 56354 ssh2
Jun 19 22:31:04 web1 sshd[3983]: Invalid user service from 45.55.222.162 port 57184
Jun 19 22:31:04 web1 sshd[3983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.222.162
Jun 19 22:31:04 web1 sshd[3983]: Invalid user service from 45.55.222.162 port 57184
Jun 19 22:31:06 web1 sshd[3983]: Failed password fo
...
2020-06-19 22:47:34
114.237.188.29 attackbotsspam
Jun 19 15:16:10 elektron postfix/smtpd\[7623\]: NOQUEUE: reject: RCPT from unknown\[114.237.188.29\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[114.237.188.29\]\; from=\ to=\ proto=ESMTP helo=\
Jun 19 15:16:55 elektron postfix/smtpd\[6935\]: NOQUEUE: reject: RCPT from unknown\[114.237.188.29\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[114.237.188.29\]\; from=\ to=\ proto=ESMTP helo=\
Jun 19 15:17:34 elektron postfix/smtpd\[5937\]: NOQUEUE: reject: RCPT from unknown\[114.237.188.29\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[114.237.188.29\]\; from=\ to=\ proto=ESMTP helo=\
Jun 19 15:18:15 elektron postfix/smtpd\[8531\]: NOQUEUE: reject: RCPT from unknown\[114.237.188.29\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[114.237.188.29\]\; from=\ to=\
2020-06-19 23:07:46
174.219.134.225 attackspambots
Brute forcing email accounts
2020-06-19 22:29:46

最近上报的IP列表

2606:4700:10::6814:6964 2606:4700:10::6814:8683 2606:4700:10::ac43:1637 2606:4700:10::ac43:1078
2606:4700:10::6816:1443 2606:4700:10::ac43:2188 2606:4700:10::6814:7892 2606:4700:10::6816:3385
2606:4700:10::6814:5516 2606:4700:10::6814:8824 66.132.172.230 1.186.229.191
195.43.136.207 112.124.57.42 54.211.15.44 100.27.192.197
2606:4700:10::ac43:1467 2606:4700:10::6816:1562 2606:4700:10::6816:4378 2606:4700:10::ac43:606