必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Santiago

省份(region): Region Metropolitana (RM)

国家(country): Chile

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b'% IP Client: 8.214.16.196
 
% Joint Whois - whois.lacnic.net
%  This server accepts single ASN, IPv4 or IPv6 queries

% LACNIC resource: whois.lacnic.net


% Copyright LACNIC lacnic.net
%  The data below is provided for information purposes
%  and to assist persons in obtaining information about or
%  related to AS and IP numbers registrations
%  By submitting a whois query, you agree to use this data
%  only for lawful purposes.
%  2026-01-28 10:42:20 (-03 -03:00)

inetnum:     190.20.0.0/16
status:      allocated
aut-num:     N/A
owner:       TELEFxc3x83xc2x93NICA CHILE S.A.
ownerid:     CL-TCSA41-LACNIC
responsible: Technical Contact Telefonica Chile S.A.
address:     AVENIDA PROVIDENCIA, 111, COMUNA DE PROVIDENCIA
address:     7500775 - SANTIAGO - RM
country:     CL
phone:       +56 2 3306932
owner-c:     TCS5
tech-c:      TCS5
abuse-c:     TCS5
inetrev:     190.20.0.0/16
nserver:     NS1.REDIP.CL [lame - not published]
nsstat:      20260128 ERR
nslastaa:    20260106
nserver:     NS2.REDIP.CL
nsstat:      20260128 AA
nslastaa:    20260128
created:     20060612
changed:     20110502

nic-hdl:     TCS5
person:      Technical Contact Telefonica Chile
e-mail:      tecnical.isp.movistar@gmail.com
address:     Providencia, 111, Piso 3
address:     8320215 - santiago - Metropolitana
country:     CL
phone:       +56  26616815 [0000]
created:     20110502
changed:     20240418

% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.'
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 190.20.7.211
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48746
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;190.20.7.211.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026012800 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 28 21:38:40 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
b'211.7.20.190.in-addr.arpa domain name pointer 190-20-7-211.fo.baf.movistar.cl.
'
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
211.7.20.190.in-addr.arpa	name = 190-20-7-211.fo.baf.movistar.cl.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
140.249.18.118 attackbotsspam
SSH Invalid Login
2020-03-27 06:45:06
207.180.217.229 attackbotsspam
Mar 27 03:29:51 gw1 sshd[15540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.180.217.229
Mar 27 03:29:53 gw1 sshd[15540]: Failed password for invalid user amit from 207.180.217.229 port 34832 ssh2
...
2020-03-27 06:44:55
220.149.231.165 attackspam
SSH brutforce
2020-03-27 07:05:34
145.239.95.241 attack
Mar 26 22:18:55 nextcloud sshd\[23534\]: Invalid user sinusbot from 145.239.95.241
Mar 26 22:18:55 nextcloud sshd\[23534\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.95.241
Mar 26 22:18:57 nextcloud sshd\[23534\]: Failed password for invalid user sinusbot from 145.239.95.241 port 37572 ssh2
2020-03-27 06:58:11
139.59.169.103 attackspam
Mar 26 21:34:30 l03 sshd[23268]: Invalid user xws from 139.59.169.103 port 43912
...
2020-03-27 06:57:23
14.186.179.83 attack
(smtpauth) Failed SMTP AUTH login from 14.186.179.83 (VN/Vietnam/static.vnpt.vn): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-03-27 01:48:38 plain authenticator failed for ([127.0.0.1]) [14.186.179.83]: 535 Incorrect authentication data (set_id=info@matinkimia.com)
2020-03-27 07:15:50
51.83.41.120 attack
SSH Invalid Login
2020-03-27 06:53:08
167.99.83.237 attackspam
SSH Invalid Login
2020-03-27 06:53:26
195.223.211.242 attackbotsspam
Mar 26 14:21:34 pixelmemory sshd[11622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.223.211.242
Mar 26 14:21:36 pixelmemory sshd[11622]: Failed password for invalid user vl from 195.223.211.242 port 55648 ssh2
Mar 26 14:31:45 pixelmemory sshd[14409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.223.211.242
...
2020-03-27 06:44:32
51.75.30.214 attackspambots
SSH Invalid Login
2020-03-27 06:52:07
46.101.94.224 attack
30900/tcp 25257/tcp 24526/tcp...
[2020-03-24/26]8pkt,3pt.(tcp)
2020-03-27 07:02:00
47.75.13.189 attackspambots
Automatic report - XMLRPC Attack
2020-03-27 06:39:10
109.124.65.86 attack
fail2ban
2020-03-27 06:47:14
189.210.177.177 attackspambots
Mar 26 22:19:20 hosting180 sshd[25204]: Invalid user sic from 189.210.177.177 port 48152
...
2020-03-27 06:41:42
210.249.92.244 attackspambots
Invalid user testgay from 210.249.92.244 port 55008
2020-03-27 07:02:59

最近上报的IP列表

112.4.101.49 66.249.77.99 101.43.199.117 104.40.64.30
101.35.223.135 206.168.34.194 111.230.193.112 40.124.186.160
206.189.212.103 162.216.149.13 43.225.157.162 52.79.234.93
38.15.20.50 194.187.177.204 194.187.177.135 47.92.244.182
45.156.87.55 152.42.223.111 66.249.75.224 135.237.126.88