必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Avellaneda

省份(region): Buenos Aires Province

国家(country): Argentina

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b'% IP Client: 8.214.16.196
 
% Joint Whois - whois.lacnic.net
%  This server accepts single ASN, IPv4 or IPv6 queries

% LACNIC resource: whois.lacnic.net


% Copyright LACNIC lacnic.net
%  The data below is provided for information purposes
%  and to assist persons in obtaining information about or
%  related to AS and IP numbers registrations
%  By submitting a whois query, you agree to use this data
%  only for lawful purposes.
%  2026-03-04 01:46:33 (-03 -03:00)

inetnum:     190.194.0.0/15
status:      allocated
aut-num:     AS7303
owner:       Telecom Argentina S.A.
ownerid:     AR-TAST-LACNIC
responsible: Administrador IP
address:     Dorrego, 2520, Piso 11
address:     1425 - Buenos Aires - 
country:     AR
phone:       +54  1149684975 [0000]
owner-c:     ADI2
tech-c:      ADI2
abuse-c:     ADI2
inetrev:     190.194.0.0/15
nserver:     O200.PRIMA.COM.AR
nsstat:      20260227 AA
nslastaa:    20260227
nserver:     O2000.PRIMA.COM.AR
nsstat:      20260227 AA
nslastaa:    20260227
created:     20100511
changed:     20180529

nic-hdl:     ADI2
person:      Administrador IP
e-mail:      abuse@teco.com.ar
address:     Dorrego, 2502, piso 11
address:     1425 - Buenos Aires - 
country:     AR
phone:       +54 11 4968 [4975]
created:     20020909
changed:     20211227

% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.'
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 190.194.63.190
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26806
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;190.194.63.190.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026030301 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 04 12:35:38 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
190.63.194.190.in-addr.arpa domain name pointer 190-63-194-190.cab.prima.net.ar.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
190.63.194.190.in-addr.arpa	name = 190-63-194-190.cab.prima.net.ar.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
123.1.186.5 attackspambots
Brute force attempt
2019-07-26 04:19:07
213.21.174.189 attack
proto=tcp  .  spt=33873  .  dpt=25  .     (listed on Blocklist de  Jul 24)     (454)
2019-07-26 04:36:31
49.149.15.22 attack
Unauthorized connection attempt from IP address 49.149.15.22 on Port 445(SMB)
2019-07-26 04:40:05
46.3.96.67 attackspambots
25.07.2019 19:50:30 Connection to port 9710 blocked by firewall
2019-07-26 04:18:27
112.85.195.19 attackspambots
SpamReport
2019-07-26 04:50:05
36.68.236.134 attackbots
Automatic report - Port Scan Attack
2019-07-26 04:43:03
103.107.92.28 attackspambots
Automatic report - Port Scan Attack
2019-07-26 04:06:24
64.136.154.170 attack
NAME : AERIO-64-136-128-0 CIDR : 64.136.128.0/19 SYN Flood DDoS Attack USA - California - block certain countries :) IP: 64.136.154.170  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-07-26 04:42:28
185.99.157.176 attackspam
firewall-block, port(s): 23/tcp
2019-07-26 04:35:56
139.59.25.3 attackbotsspam
Jul 25 18:23:38 mout sshd[12830]: Invalid user bi from 139.59.25.3 port 44468
2019-07-26 04:12:05
190.104.183.77 attackspambots
Unauthorized connection attempt from IP address 190.104.183.77 on Port 445(SMB)
2019-07-26 04:31:42
165.227.210.71 attackspambots
$f2bV_matches
2019-07-26 04:28:38
122.176.70.149 attackspambots
Unauthorized connection attempt from IP address 122.176.70.149 on Port 445(SMB)
2019-07-26 04:37:14
185.176.27.98 attack
firewall-block, port(s): 22586/tcp, 22689/tcp, 22690/tcp
2019-07-26 04:33:34
222.186.3.44 attack
Splunk® : port scan detected:
Jul 25 14:52:54 testbed kernel: Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=82:c6:52:d1:6e:53:64:c3:d6:0b:ef:f0:08:00 SRC=222.186.3.44 DST=104.248.11.191 LEN=40 TOS=0x00 PREC=0x00 TTL=102 ID=256 PROTO=TCP SPT=6000 DPT=3306 WINDOW=16384 RES=0x00 SYN URGP=0
2019-07-26 04:37:51

最近上报的IP列表

159.223.151.115 87.106.149.94 198.199.67.111 2606:4700:10::6816:447d
2606:4700:10::6816:4313 134.35.157.61 2606:4700:10::ac43:1476 2606:4700:10::6816:810
10.8.6.181 2606:4700:10::6816:2679 2606:4700:10::6814:8624 155.212.204.199
65.2.35.100 171.118.64.43 175.203.238.173 110.78.158.41
2606:4700:10::6814:8887 2606:4700:10::6816:390 2606:4700:10::6816:4948 2606:4700:10::6814:7497