必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Medellín

省份(region): Antioquia

国家(country): Colombia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% IP Client: 124.223.158.242
 
% Joint Whois - whois.lacnic.net
%  This server accepts single ASN, IPv4 or IPv6 queries

% LACNIC resource: whois.lacnic.net


% Copyright LACNIC lacnic.net
%  The data below is provided for information purposes
%  and to assist persons in obtaining information about or
%  related to AS and IP numbers registrations
%  By submitting a whois query, you agree to use this data
%  only for lawful purposes.
%  2026-03-30 06:31:12 (-03 -03:00)

inetnum:     190.156.0.0/15
status:      allocated
aut-num:     N/A
owner:       Telmex Colombia S.A.
ownerid:     CO-ACSA-LACNIC
responsible: Operaciones Core IP
address:     CLARO FIJO COLOMBIA - Cra 68A No. 24B-10, 11111, 
address:     11111 - Bogota - DC
country:     CO
phone:       +57 01 7480000
owner-c:     ATI
tech-c:      ATI
abuse-c:     ATI
inetrev:     190.156.0.0/16
nserver:     NS3.TELMEXLA.NET.CO
nsstat:      20260326 AA
nslastaa:    20260326
nserver:     NS2.TELMEXLA.NET.CO
nsstat:      20260326 AA
nslastaa:    20260326
inetrev:     190.157.0.0/16
nserver:     NS3.TELMEXLA.NET.CO
nsstat:      20260330 AA
nslastaa:    20260330
nserver:     NS2.TELMEXLA.NET.CO
nsstat:      20260330 AA
nslastaa:    20260330
created:     20070316
changed:     20100305

nic-hdl:     ATI
person:      Network Security Team
e-mail:      ciro.mantilla@claro.com.co
address:     Carrera 68a #24b-10, 00, Plaza Claro
address:     111321 - Bogota - DC
country:     CO
phone:       +57  6017500300 [81966]
created:     20020909
changed:     20250218

% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 190.157.85.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46036
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;190.157.85.3.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026033000 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 17:31:13 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
3.85.157.190.in-addr.arpa domain name pointer dynamic-ip-190157853.cable.net.co.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
3.85.157.190.in-addr.arpa	name = dynamic-ip-190157853.cable.net.co.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
109.237.134.42 attackspam
http://www.cnc-loft.de
Received:from EdizYaziciPC (unknown [185.135.108.189]) by alfa3085.alfahosting-server.de
Subject: Anfrage Drehen, Fräsen, Lasern, Schweissen
2020-09-08 20:14:13
112.85.42.200 attackbotsspam
2020-09-08T15:06:33.336196lavrinenko.info sshd[8773]: Failed password for root from 112.85.42.200 port 19317 ssh2
2020-09-08T15:06:37.187148lavrinenko.info sshd[8773]: Failed password for root from 112.85.42.200 port 19317 ssh2
2020-09-08T15:06:42.178279lavrinenko.info sshd[8773]: Failed password for root from 112.85.42.200 port 19317 ssh2
2020-09-08T15:06:45.214738lavrinenko.info sshd[8773]: Failed password for root from 112.85.42.200 port 19317 ssh2
2020-09-08T15:06:48.924208lavrinenko.info sshd[8773]: Failed password for root from 112.85.42.200 port 19317 ssh2
...
2020-09-08 20:13:40
49.232.203.184 attackspam
Brute forcing RDP port 3389
2020-09-08 19:39:23
148.72.208.210 attackbots
SSH login attempts.
2020-09-08 20:05:15
49.234.219.31 attackbotsspam
Sep  8 08:19:18 root sshd[7340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.219.31 
...
2020-09-08 20:12:48
186.3.185.249 attack
Unauthorized connection attempt from IP address 186.3.185.249 on Port 445(SMB)
2020-09-08 19:46:36
218.92.0.173 attack
Sep  8 11:57:49 scw-6657dc sshd[12266]: Failed password for root from 218.92.0.173 port 33167 ssh2
Sep  8 11:57:49 scw-6657dc sshd[12266]: Failed password for root from 218.92.0.173 port 33167 ssh2
Sep  8 11:57:53 scw-6657dc sshd[12266]: Failed password for root from 218.92.0.173 port 33167 ssh2
...
2020-09-08 20:04:22
125.161.136.235 attackspambots
Unauthorized connection attempt from IP address 125.161.136.235 on Port 445(SMB)
2020-09-08 19:49:11
23.129.64.215 attackspambots
Sep  8 11:52:42 * sshd[11429]: Failed password for root from 23.129.64.215 port 46770 ssh2
Sep  8 11:52:54 * sshd[11429]: error: maximum authentication attempts exceeded for root from 23.129.64.215 port 46770 ssh2 [preauth]
2020-09-08 19:55:53
124.105.87.254 attackspambots
$f2bV_matches
2020-09-08 19:38:57
104.244.78.231 attackspambots
(sshd) Failed SSH login from 104.244.78.231 (LU/Luxembourg/lux1.nixnet.xyz): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  8 07:40:59 server sshd[16680]: Failed password for root from 104.244.78.231 port 38934 ssh2
Sep  8 07:41:03 server sshd[16680]: Failed password for root from 104.244.78.231 port 38934 ssh2
Sep  8 07:41:05 server sshd[16680]: Failed password for root from 104.244.78.231 port 38934 ssh2
Sep  8 07:41:08 server sshd[16680]: Failed password for root from 104.244.78.231 port 38934 ssh2
Sep  8 07:41:11 server sshd[16680]: Failed password for root from 104.244.78.231 port 38934 ssh2
2020-09-08 20:01:20
176.123.7.208 attack
Sep  8 07:36:23 h2427292 sshd\[9218\]: Invalid user admin from 176.123.7.208
Sep  8 07:36:23 h2427292 sshd\[9218\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.123.7.208 
Sep  8 07:36:25 h2427292 sshd\[9218\]: Failed password for invalid user admin from 176.123.7.208 port 41879 ssh2
...
2020-09-08 19:43:11
94.102.53.112 attack
Sep  8 11:15:02 [host] kernel: [5223053.217784] [U
Sep  8 11:17:05 [host] kernel: [5223176.069358] [U
Sep  8 11:18:28 [host] kernel: [5223258.852837] [U
Sep  8 11:18:50 [host] kernel: [5223281.334385] [U
Sep  8 11:20:52 [host] kernel: [5223402.951904] [U
Sep  8 11:27:39 [host] kernel: [5223810.195981] [U
2020-09-08 19:34:39
66.225.162.23 attackbotsspam
Sep  7 16:46:24 instance-2 sshd[15079]: Failed password for root from 66.225.162.23 port 59522 ssh2
Sep  7 16:46:29 instance-2 sshd[15101]: Failed password for root from 66.225.162.23 port 59578 ssh2
2020-09-08 19:37:02
113.179.245.234 attackbots
Unauthorized connection attempt from IP address 113.179.245.234 on Port 445(SMB)
2020-09-08 19:41:26

最近上报的IP列表

169.254.110.75 2606:4700:10::ac43:1778 2606:4700:10::6814:6639 2606:4700:10::ac43:2364
2606:4700:10::ac43:824 2606:4700:10::6816:709 2606:4700:10::ac43:1016 2606:4700:10::6814:9726
2606:4700:10::6814:5865 2606:4700:10::6814:9337 2606:4700:10::6816:2859 2606:4700:10::6816:3033
2606:4700:10::6814:7840 2606:4700:10::6816:1805 2606:4700:10::6816:4019 49.46.206.98
43.131.228.46 35.246.36.169 69.176.36.15 106.113.231.11