必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): Buenos Aires Province

国家(country): Argentina

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% IP Client: 124.223.158.242
 
% Joint Whois - whois.lacnic.net
%  This server accepts single ASN, IPv4 or IPv6 queries

% LACNIC resource: whois.lacnic.net


% Copyright LACNIC lacnic.net
%  The data below is provided for information purposes
%  and to assist persons in obtaining information about or
%  related to AS and IP numbers registrations
%  By submitting a whois query, you agree to use this data
%  only for lawful purposes.
%  2026-03-20 23:36:25 (-03 -03:00)

inetnum:     190.30.99.0/24
status:      reallocated
aut-num:     AS7303
owner:       Apolo -Gold-Telecom-Per
ownerid:     AR-APGO-LACNIC
responsible: Aseguramiento de Datos
address:     Dorrego, 2520, piso 3°
address:     1425 - Capital Federal - 
country:     AR
phone:       +54 11 4968-7975
owner-c:     ADI2
tech-c:      ADI2
abuse-c:     ADI2
created:     20061124
changed:     20241226
inetnum-up:  190.30.0.0/16

nic-hdl:     ADI2
person:      Administrador IP
e-mail:      abuse@teco.com.ar
address:     Dorrego, 2502, piso 11
address:     1425 - Buenos Aires - 
country:     AR
phone:       +54 11 4968 [4975]
created:     20020909
changed:     20211227

% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 190.30.99.229
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44676
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;190.30.99.229.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032002 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 21 10:36:25 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
b'229.99.30.190.in-addr.arpa domain name pointer host229.190-30-99.telecom.net.ar.
'
NSLOOKUP信息:
b'229.99.30.190.in-addr.arpa	name = host229.190-30-99.telecom.net.ar.

Authoritative answers can be found from:

'
相关IP信息:
最新评论:
IP 类型 评论内容 时间
1.34.161.190 attack
Honeypot attack, port: 4567, PTR: 1-34-161-190.HINET-IP.hinet.net.
2020-02-26 04:02:35
180.97.30.196 attackspam
22/tcp
[2020-02-25]1pkt
2020-02-26 03:49:28
182.72.178.114 attackspam
Feb 25 08:36:46 mockhub sshd[15251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.178.114
Feb 25 08:36:48 mockhub sshd[15251]: Failed password for invalid user telnet from 182.72.178.114 port 26086 ssh2
...
2020-02-26 03:39:25
219.78.137.108 attack
Honeypot attack, port: 5555, PTR: n219078137108.netvigator.com.
2020-02-26 03:41:34
36.81.171.78 attackspam
Automatic report - Port Scan Attack
2020-02-26 03:29:12
123.182.255.52 attackspambots
suspicious action Tue, 25 Feb 2020 13:36:41 -0300
2020-02-26 03:47:15
178.137.91.185 attackbots
Honeypot attack, port: 5555, PTR: 178-137-91-185.broadband.kyivstar.net.
2020-02-26 03:39:49
139.199.45.89 attackbots
suspicious action Tue, 25 Feb 2020 13:36:46 -0300
2020-02-26 03:43:33
142.44.211.179 attackbotsspam
52869/tcp 52869/tcp 52869/tcp...
[2019-12-27/2020-02-25]1647pkt,1pt.(tcp)
2020-02-26 03:40:29
190.85.34.203 attackspambots
Feb 25 20:42:20 sd-53420 sshd\[21099\]: Invalid user cisco from 190.85.34.203
Feb 25 20:42:20 sd-53420 sshd\[21099\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.34.203
Feb 25 20:42:22 sd-53420 sshd\[21099\]: Failed password for invalid user cisco from 190.85.34.203 port 53206 ssh2
Feb 25 20:51:57 sd-53420 sshd\[21846\]: Invalid user rstudio-server from 190.85.34.203
Feb 25 20:51:57 sd-53420 sshd\[21846\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.34.203
...
2020-02-26 03:58:16
104.140.188.14 attackspam
RDP brute force attack detected by fail2ban
2020-02-26 03:58:46
220.246.26.51 attackspam
Feb 25 19:50:45 MK-Soft-Root1 sshd[26662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.246.26.51 
Feb 25 19:50:47 MK-Soft-Root1 sshd[26662]: Failed password for invalid user gitlab-psql from 220.246.26.51 port 45327 ssh2
...
2020-02-26 03:28:05
116.90.227.180 attackspam
445/tcp 1433/tcp
[2020-02-23/25]2pkt
2020-02-26 03:38:44
80.253.20.94 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-26 04:04:40
77.247.110.88 attackbots
[2020-02-25 14:47:33] NOTICE[1148] chan_sip.c: Registration from '' failed for '77.247.110.88:51748' - Wrong password
[2020-02-25 14:47:33] SECURITY[1163] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-02-25T14:47:33.696-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="7590",SessionID="0x7fd82c081638",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.88/51748",Challenge="45a4731b",ReceivedChallenge="45a4731b",ReceivedHash="ac3b1b1c7acf8599a4888dbfc292dcb7"
[2020-02-25 14:47:33] NOTICE[1148] chan_sip.c: Registration from '' failed for '77.247.110.88:51749' - Wrong password
[2020-02-25 14:47:33] SECURITY[1163] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-02-25T14:47:33.699-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="7590",SessionID="0x7fd82c3a9c28",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.88/51749",Chal
...
2020-02-26 04:03:21

最近上报的IP列表

42.193.36.38 19.53.104.159 2606:4700:10::6814:6574 2606:4700:10::6814:6389
2606:4700:10::6816:4103 2606:4700:10::6814:6034 2606:4700:10::6814:4861 2606:4700:10::ac43:1131
2606:4700:10::6816:1618 2606:4700:10::6816:128 2606:4700:10::6816:844 2606:4700:10::6814:7536
2606:4700:10::6816:129 110.78.138.233 172.16.125.150 13.212.174.23
110.77.187.18 2606:4700:10::6814:4992 2606:4700:10::6816:95 2606:4700:10::6814:8588