必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Las Condes

省份(region): Region Metropolitana (RM)

国家(country): Chile

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% IP Client: 124.223.158.242
 
% Joint Whois - whois.lacnic.net
%  This server accepts single ASN, IPv4 or IPv6 queries

% LACNIC resource: whois.lacnic.net


% Copyright LACNIC lacnic.net
%  The data below is provided for information purposes
%  and to assist persons in obtaining information about or
%  related to AS and IP numbers registrations
%  By submitting a whois query, you agree to use this data
%  only for lawful purposes.
%  2026-04-07 09:39:46 (-03 -03:00)

inetnum:     190.215.0.0/17
status:      allocated
aut-num:     N/A
owner:       Gtd Internet S.A.
ownerid:     CL-GISA-LACNIC
responsible: Manuel Suanez Berrios
address:     Moneda, 920, Piso 11
address:     6500712 - Santiago - RM
country:     CL
phone:       +56 02 3809193
owner-c:     MAS309
tech-c:      MAS309
abuse-c:     MAS309
inetrev:     190.215.0.0/19
nserver:     NS.GTDINTERNET.COM
nsstat:      20260403 AA
nslastaa:    20260403
nserver:     NS2.GTDINTERNET.COM
nsstat:      20260403 AA
nslastaa:    20260403
nserver:     NS3.GTDINTERNET.COM
nsstat:      20260403 AA
nslastaa:    20260403
nserver:     NS4.GTDINTERNET.COM
nsstat:      20260403 AA
nslastaa:    20260403
inetrev:     190.215.32.0/20
nserver:     NS.GTDINTERNET.COM
nsstat:      20260406 AA
nslastaa:    20260406
nserver:     NS2.GTDINTERNET.COM
nsstat:      20260406 AA
nslastaa:    20260406
nserver:     NS3.GTDINTERNET.COM
nsstat:      20260406 AA
nslastaa:    20260406
nserver:     NS4.GTDINTERNET.COM
nsstat:      20260406 AA
nslastaa:    20260406
inetrev:     190.215.60.0/22
nserver:     NS.GTDINTERNET.COM
nsstat:      20260405 AA
nslastaa:    20260405
nserver:     NS2.GTDINTERNET.COM
nsstat:      20260405 AA
nslastaa:    20260405
nserver:     NS3.GTDINTERNET.COM
nsstat:      20260405 AA
nslastaa:    20260405
nserver:     NS4.GTDINTERNET.COM
nsstat:      20260405 AA
nslastaa:    20260405
inetrev:     190.215.58.0/23
nserver:     NS.GTDINTERNET.COM
nsstat:      20260407 AA
nslastaa:    20260407
nserver:     NS2.GTDINTERNET.COM
nsstat:      20260407 AA
nslastaa:    20260407
nserver:     NS3.GTDINTERNET.COM
nsstat:      20260407 AA
nslastaa:    20260407
nserver:     NS4.GTDINTERNET.COM
nsstat:      20260407 AA
nslastaa:    20260407
inetrev:     190.215.57.0/24
nserver:     NS.GTDINTERNET.COM
nsstat:      20260403 AA
nslastaa:    20260403
nserver:     NS2.GTDINTERNET.COM
nsstat:      20260403 AA
nslastaa:    20260403
nserver:     NS3.GTDINTERNET.COM
nsstat:      20260403 AA
nslastaa:    20260403
nserver:     NS4.GTDINTERNET.COM
nsstat:      20260403 AA
nslastaa:    20260403
inetrev:     190.215.52.0/22
nserver:     NS.GTDINTERNET.COM
nsstat:      20260404 AA
nslastaa:    20260404
nserver:     NS2.GTDINTERNET.COM
nsstat:      20260404 AA
nslastaa:    20260404
nserver:     NS3.GTDINTERNET.COM
nsstat:      20260404 AA
nslastaa:    20260404
nserver:     NS4.GTDINTERNET.COM
nsstat:      20260404 AA
nslastaa:    20260404
inetrev:     190.215.48.0/23
nserver:     NS.GTDINTERNET.COM
nsstat:      20260407 AA
nslastaa:    20260407
nserver:     NS2.GTDINTERNET.COM
nsstat:      20260407 AA
nslastaa:    20260407
nserver:     NS3.GTDINTERNET.COM
nsstat:      20260407 AA
nslastaa:    20260407
nserver:     NS4.GTDINTERNET.COM
nsstat:      20260407 AA
nslastaa:    20260407
inetrev:     190.215.50.0/24
nserver:     NS.GTDINTERNET.COM
nsstat:      20260403 AA
nslastaa:    20260403
nserver:     NS2.GTDINTERNET.COM
nsstat:      20260403 AA
nslastaa:    20260403
nserver:     NS3.GTDINTERNET.COM
nsstat:      20260403 AA
nslastaa:    20260403
nserver:     NS4.GTDINTERNET.COM
nsstat:      20260403 AA
nslastaa:    20260403
inetrev:     190.215.64.0/19
nserver:     NS.GTDINTERNET.COM
nsstat:      20260406 AA
nslastaa:    20260406
nserver:     NS2.GTDINTERNET.COM
nsstat:      20260406 AA
nslastaa:    20260406
nserver:     NS3.GTDINTERNET.COM
nsstat:      20260406 AA
nslastaa:    20260406
nserver:     NS4.GTDINTERNET.COM
nsstat:      20260406 AA
nslastaa:    20260406
inetrev:     190.215.112.0/20
nserver:     NS.GTDINTERNET.COM
nsstat:      20260402 AA
nslastaa:    20260402
nserver:     NS2.GTDINTERNET.COM
nsstat:      20260402 AA
nslastaa:    20260402
nserver:     NS3.GTDINTERNET.COM
nsstat:      20260402 AA
nslastaa:    20260402
nserver:     NS4.GTDINTERNET.COM
nsstat:      20260402 AA
nslastaa:    20260402
inetrev:     190.215.104.0/21
nserver:     NS.GTDINTERNET.COM
nsstat:      20260407 AA
nslastaa:    20260407
nserver:     NS2.GTDINTERNET.COM
nsstat:      20260407 AA
nslastaa:    20260407
nserver:     NS3.GTDINTERNET.COM
nsstat:      20260407 AA
nslastaa:    20260407
nserver:     NS4.GTDINTERNET.COM
nsstat:      20260407 AA
nslastaa:    20260407
inetrev:     190.215.96.0/21
nserver:     NS.GTDINTERNET.COM
nsstat:      20260407 AA
nslastaa:    20260407
nserver:     NS2.GTDINTERNET.COM
nsstat:      20260407 AA
nslastaa:    20260407
nserver:     NS3.GTDINTERNET.COM
nsstat:      20260407 AA
nslastaa:    20260407
nserver:     NS4.GTDINTERNET.COM
nsstat:      20260407 AA
nslastaa:    20260407
created:     20100818
changed:     20140707

nic-hdl:     MAS309
person:      Manuel Suanez Berrios
e-mail:      netadmin@grupogtd.com
address:     Moneda, 920, -
address:     NONE - Santiago - SA
country:     CL
phone:       +56  224139000 [0000]
created:     20140204
changed:     20220228

% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 190.215.95.120
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14262
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;190.215.95.120.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040700 1800 900 604800 86400

;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 07 20:39:47 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 120.95.215.190.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 120.95.215.190.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
62.234.115.152 attack
Lines containing failures of 62.234.115.152
Sep 19 20:34:03 nxxxxxxx sshd[917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.115.152  user=r.r
Sep 19 20:34:05 nxxxxxxx sshd[917]: Failed password for r.r from 62.234.115.152 port 51692 ssh2
Sep 19 20:34:05 nxxxxxxx sshd[917]: Received disconnect from 62.234.115.152 port 51692:11: Bye Bye [preauth]
Sep 19 20:34:05 nxxxxxxx sshd[917]: Disconnected from authenticating user r.r 62.234.115.152 port 51692 [preauth]
Sep 19 20:39:16 nxxxxxxx sshd[1598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.115.152  user=r.r
Sep 19 20:39:18 nxxxxxxx sshd[1598]: Failed password for r.r from 62.234.115.152 port 47858 ssh2
Sep 19 20:39:18 nxxxxxxx sshd[1598]: Received disconnect from 62.234.115.152 port 47858:11: Bye Bye [preauth]
Sep 19 20:39:18 nxxxxxxx sshd[1598]: Disconnected from authenticating user r.r 62.234.115.152 port 47858 [preauth]
S........
------------------------------
2020-09-21 04:36:33
222.186.31.166 attack
Sep 20 22:13:24 abendstille sshd\[12066\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.166  user=root
Sep 20 22:13:25 abendstille sshd\[12087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.166  user=root
Sep 20 22:13:25 abendstille sshd\[12066\]: Failed password for root from 222.186.31.166 port 33321 ssh2
Sep 20 22:13:27 abendstille sshd\[12087\]: Failed password for root from 222.186.31.166 port 42752 ssh2
Sep 20 22:13:28 abendstille sshd\[12066\]: Failed password for root from 222.186.31.166 port 33321 ssh2
...
2020-09-21 04:18:23
83.36.227.153 attackspam
20/9/20@13:03:46: FAIL: Alarm-Network address from=83.36.227.153
20/9/20@13:03:47: FAIL: Alarm-Network address from=83.36.227.153
...
2020-09-21 04:21:51
114.42.22.41 attackspambots
Found on   CINS badguys     / proto=6  .  srcport=12025  .  dstport=23  .     (2349)
2020-09-21 04:11:38
80.6.35.239 attackspambots
80.6.35.239 - - [20/Sep/2020:20:24:50 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
80.6.35.239 - - [20/Sep/2020:20:24:51 +0100] "POST /wp-login.php HTTP/1.1" 200 7652 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
80.6.35.239 - - [20/Sep/2020:20:31:07 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
...
2020-09-21 04:30:32
64.227.37.93 attack
2020-09-20T14:58:46.710511yoshi.linuxbox.ninja sshd[1494402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.37.93
2020-09-20T14:58:46.704341yoshi.linuxbox.ninja sshd[1494402]: Invalid user mailtest from 64.227.37.93 port 57424
2020-09-20T14:58:48.805482yoshi.linuxbox.ninja sshd[1494402]: Failed password for invalid user mailtest from 64.227.37.93 port 57424 ssh2
...
2020-09-21 04:35:04
157.245.211.180 attackbots
$f2bV_matches
2020-09-21 04:20:24
39.36.44.112 attackbots
Automatic report - Port Scan Attack
2020-09-21 04:23:20
51.161.119.98 attackspambots
Fail2Ban Ban Triggered
2020-09-21 04:30:49
1.171.98.88 attackbots
Sep 20 19:04:01 vps639187 sshd\[29853\]: Invalid user cablecom from 1.171.98.88 port 38513
Sep 20 19:04:02 vps639187 sshd\[29853\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.171.98.88
Sep 20 19:04:04 vps639187 sshd\[29853\]: Failed password for invalid user cablecom from 1.171.98.88 port 38513 ssh2
...
2020-09-21 04:06:16
203.170.58.241 attackspam
Brute Force
2020-09-21 04:32:38
223.197.151.55 attackbots
(sshd) Failed SSH login from 223.197.151.55 (HK/Hong Kong/223-197-151-55.static.imsbiz.com): 5 in the last 3600 secs
2020-09-21 04:08:31
195.54.166.118 attack
RDP brute forcing (r)
2020-09-21 04:23:53
185.39.11.109 attackbots
Too many connection attempt to nonexisting ports
2020-09-21 04:14:40
27.7.148.115 attackbotsspam
Tried our host z.
2020-09-21 04:33:16

最近上报的IP列表

209.38.39.234 159.203.176.26 206.189.139.116 78.107.216.39
2606:4700:10::6814:8520 2606:4700:10::6814:8617 2606:4700:10::ac43:2428 2606:4700:10::ac43:2393
2606:4700:10::6814:9824 122.192.203.69 2606:4700:10::6814:6889 2606:4700:10::ac43:1315
2606:4700:10::6814:6928 47.92.143.56 47.92.35.184 39.98.86.162
39.103.132.239 2606:4700:10::6816:2108 2606:4700:10::6814:7710 2606:4700:10::ac43:639