必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Edison

省份(region): New Jersey

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       192.109.137.0 - 192.109.148.255
CIDR:           192.109.140.0/22, 192.109.144.0/22, 192.109.137.0/24, 192.109.148.0/24, 192.109.138.0/23
NetName:        RIPE-ERX-192-109-121-0
NetHandle:      NET-192-109-137-0-1
Parent:         NET192 (NET-192-0-0-0-0)
NetType:        Early Registrations, Transferred to RIPE NCC
OriginAS:       
Organization:   RIPE Network Coordination Centre (RIPE)
RegDate:        2005-01-31
Updated:        2025-02-10
Comment:        These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref:            https://rdap.arin.net/registry/ip/192.109.137.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois.ripe.net


OrgName:        RIPE Network Coordination Centre
OrgId:          RIPE
Address:        P.O. Box 10096
City:           Amsterdam
StateProv:      
PostalCode:     1001EB
Country:        NL
RegDate:        
Updated:        2013-07-29
Ref:            https://rdap.arin.net/registry/entity/RIPE

ReferralServer:  whois.ripe.net
ResourceLink:  https://apps.db.ripe.net/db-web-ui/query

OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName:   Abuse Contact
OrgAbusePhone:  +31205354444 
OrgAbuseEmail:  abuse@ripe.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE3850-ARIN

OrgTechHandle: RNO29-ARIN
OrgTechName:   RIPE NCC Operations
OrgTechPhone:  +31 20 535 4444 
OrgTechEmail:  hostmaster@ripe.net
OrgTechRef:    https://rdap.arin.net/registry/entity/RNO29-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 192.109.139.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18853
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;192.109.139.196.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031002 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 11 12:00:21 CST 2026
;; MSG SIZE  rcvd: 108
HOST信息:
196.139.109.192.in-addr.arpa domain name pointer politicaltoad.ptr.network.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
196.139.109.192.in-addr.arpa	name = politicaltoad.ptr.network.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.83.65.34 attackspam
Port probing on unauthorized port 53
2020-08-02 02:24:35
150.136.40.83 attackspambots
SSH Brute Force
2020-08-02 02:31:41
31.154.9.174 attackbots
Bruteforce detected by fail2ban
2020-08-02 02:21:58
49.233.189.161 attackbotsspam
Automatic report - Banned IP Access
2020-08-02 02:07:31
132.145.216.7 attack
Aug  1 20:12:43 ip40 sshd[1687]: Failed password for root from 132.145.216.7 port 41470 ssh2
...
2020-08-02 02:31:54
79.176.2.157 attackbots
Email rejected due to spam filtering
2020-08-02 02:17:45
129.204.74.158 attackbots
sshd
2020-08-02 02:01:24
206.189.194.249 attackbots
Aug  1 14:37:57 prod4 sshd\[5919\]: Failed password for root from 206.189.194.249 port 38794 ssh2
Aug  1 14:43:18 prod4 sshd\[8664\]: Failed password for root from 206.189.194.249 port 36310 ssh2
Aug  1 14:47:40 prod4 sshd\[11045\]: Failed password for root from 206.189.194.249 port 49176 ssh2
...
2020-08-02 02:04:37
177.40.244.73 attackspam
1596304478 - 08/02/2020 00:54:38 Host: 177.40.244.73.static.host.gvt.net.br/177.40.244.73 Port: 23 TCP Blocked
...
2020-08-02 02:31:25
117.50.107.175 attackspam
$f2bV_matches
2020-08-02 02:23:56
180.249.173.245 attackspam
Unauthorized connection attempt from IP address 180.249.173.245 on Port 445(SMB)
2020-08-02 02:02:46
176.236.76.136 attackspam
Email rejected due to spam filtering
2020-08-02 02:22:38
95.82.123.85 attack
Email rejected due to spam filtering
2020-08-02 02:16:31
187.115.154.74 attackspambots
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 60
2020-08-02 02:38:59
123.9.80.34 attack
 TCP (SYN) 123.9.80.34:38545 -> port 8080, len 40
2020-08-02 02:32:27

最近上报的IP列表

188.63.26.252 106.114.32.215 198.235.24.222 104.248.248.6
157.245.96.91 139.59.36.115 114.236.93.69 177.190.67.44
172.210.9.172 2.58.115.100 149.52.75.129 43.128.81.242
44.245.225.158 142.93.213.36 193.112.190.192 183.36.34.69
121.231.113.168 203.25.78.220 43.230.8.77 45.88.91.106