必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Tijuana

省份(region): Baja California

国家(country): Mexico

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% IP Client: 124.223.158.242
 
% Joint Whois - whois.lacnic.net
%  This server accepts single ASN, IPv4 or IPv6 queries

% LACNIC resource: whois.lacnic.net


% Copyright LACNIC lacnic.net
%  The data below is provided for information purposes
%  and to assist persons in obtaining information about or
%  related to AS and IP numbers registrations
%  By submitting a whois query, you agree to use this data
%  only for lawful purposes.
%  2026-04-03 12:32:19 (-03 -03:00)

inetnum:     189.223.0.0/17
status:      reallocated
aut-num:     N/A
owner:       Telefonos del Noroeste, S.A. de C.V.
ownerid:     MX-TNSC1-LACNIC
responsible: Dasaev Rangel Davila
address:     Pio Pico, 1525, Zona Centro
address:     22000 - Tijuana - BC
country:     MX
phone:       +52  6646332260
owner-c:     LEZ7
tech-c:      LRG
abuse-c:     LRG
created:     20101007
changed:     20130423
inetnum-up:  189.222.0.0/15

nic-hdl:     LEZ7
person:      LUIS ENRIQUE HERNANDEZ ZAZUETA
e-mail:      luhe@telnor.com
address:     NARCISO MENDOZA, 503, BAHIA
address:     22880 - ENSENADA - BC
country:     MX
phone:       +52  6461823530
created:     20230112
changed:     20230112

nic-hdl:     LRG
person:      Jefatura de Datos
e-mail:      txd_telnor@telnor.com
address:     Pio Pico, 1525, Zona Centro
address:     22000 - Tijuana - BC
country:     MX
phone:       +52  6646332264
created:     20021209
changed:     20250912

% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 189.223.105.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13343
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;189.223.105.56.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040300 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 03 23:11:45 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
56.105.223.189.in-addr.arpa domain name pointer 189.223.105.56.dsl.dyn.telnor.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
56.105.223.189.in-addr.arpa	name = 189.223.105.56.dsl.dyn.telnor.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.175.93.27 attackbots
05/31/2020-15:15:02.970465 185.175.93.27 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-06-01 03:58:59
87.251.74.136 attack
May 31 21:55:12 debian-2gb-nbg1-2 kernel: \[13213687.338478\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=87.251.74.136 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=14286 PROTO=TCP SPT=55567 DPT=3289 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-01 04:12:55
94.102.51.29 attack
Port scanning [5 denied]
2020-06-01 04:06:27
84.38.184.53 attackbotsspam
05/31/2020-15:10:43.635433 84.38.184.53 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-01 04:15:29
125.73.131.213 attackbots
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2020-06-01 04:03:12
82.202.197.233 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 74 - port: 3757 proto: TCP cat: Misc Attack
2020-06-01 04:15:42
45.142.127.23 attack
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2020-06-01 04:26:17
185.156.73.57 attack
05/31/2020-15:22:10.534938 185.156.73.57 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-01 04:00:08
89.248.162.247 attackspambots
Port scanning [10 denied]
2020-06-01 04:10:46
37.49.226.248 attackbots
May 31 22:03:42 server2 sshd\[11326\]: User root from 37.49.226.248 not allowed because not listed in AllowUsers
May 31 22:04:21 server2 sshd\[11362\]: User root from 37.49.226.248 not allowed because not listed in AllowUsers
May 31 22:04:58 server2 sshd\[11378\]: User root from 37.49.226.248 not allowed because not listed in AllowUsers
May 31 22:05:36 server2 sshd\[11567\]: User root from 37.49.226.248 not allowed because not listed in AllowUsers
May 31 22:06:14 server2 sshd\[11598\]: User root from 37.49.226.248 not allowed because not listed in AllowUsers
May 31 22:06:51 server2 sshd\[11616\]: User root from 37.49.226.248 not allowed because not listed in AllowUsers
2020-06-01 04:27:54
64.225.22.43 attack
Port scan denied
2020-06-01 04:20:42
80.82.77.33 attackbotsspam
Unauthorized connection attempt detected from IP address 80.82.77.33 to port 8080 [T]
2020-06-01 04:16:25
185.175.93.37 attack
firewall-block, port(s): 3391/tcp, 3394/tcp
2020-06-01 03:58:45
92.63.196.6 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 88 - port: 21084 proto: TCP cat: Misc Attack
2020-06-01 04:08:42
64.225.106.89 attack
 TCP (SYN) 64.225.106.89:57283 -> port 26231, len 44
2020-06-01 04:20:10

最近上报的IP列表

2606:4700:10::6816:846 2606:4700:10::6816:2201 2606:4700:10::6814:7744 2606:4700:10::6814:8413
2606:4700:10::6814:5473 2606:4700:10::6816:1688 204.244.88.209 224.121.3.72
3.85.49.138 133.106.125.10 110.77.226.227 2606:4700:10::6816:3211
2606:4700:10::6814:7493 2606:4700:10::6814:5910 2606:4700:10::6814:9621 2606:4700:10::6814:9646
14.207.194.109 2606:4700:10::6814:6482 190.194.63.254 158.158.32.192