必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Oslo

省份(region): Oslo

国家(country): Norway

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '194.71.22.0 - 194.71.23.255'

% Abuse contact for '194.71.22.0 - 194.71.23.255' is 'support@internetvikings.com'

inetnum:        194.71.22.0 - 194.71.23.255
netname:        INTERNETBOLAGET-NO
descr:          Internetbolaget Hosting in Norway
org:            ORG-ABUS1196-RIPE
country:        NO
admin-c:        INBO1-RIPE
tech-c:         INBO1-RIPE
status:         ASSIGNED PA
mnt-by:         RESILANS-MNT
mnt-routes:     ETTNET-LIR
created:        2014-10-06T07:47:58Z
last-modified:  2017-07-10T09:08:42Z
source:         RIPE # Filtered

organisation:   ORG-ABUS1196-RIPE
org-name:       Internetbolaget Sweden AB
org-type:       OTHER
address:        Internetbolaget Sweden AB
address:        Birkagatan 28
address:        SE-100 31 Stockholm
address:        Sweden
abuse-c:        INBO1-RIPE
mnt-ref:        RESILANS-MNT
mnt-by:         RESILANS-MNT
created:        2013-03-14T13:51:02Z
last-modified:  2014-05-06T13:43:53Z
source:         RIPE # Filtered

role:           Internetbolaget Registry
address:        Internetbolaget Sweden AB
address:        Birkagatan 28
address:        SE-100 31 Stockholm
address:        Sweden
admin-c:        FB9451-RIPE
tech-c:         FB9451-RIPE
nic-hdl:        INBO1-RIPE
abuse-mailbox:  support@internetvikings.com
mnt-by:         RESILANS-MNT
created:        2012-11-28T18:12:40Z
last-modified:  2015-09-16T13:39:37Z
source:         RIPE # Filtered

% Information related to '194.71.22.0/23AS51747'

route:          194.71.22.0/23
descr:          Internetbolaget
origin:         AS51747
mnt-by:         ETTNET-LIR
created:        2015-09-29T12:16:57Z
last-modified:  2015-09-29T12:16:57Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.120 (ABERDEEN)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.71.23.24
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62158
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.71.23.24.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026021900 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 19 22:31:14 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
Host 24.23.71.194.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
server can't find 194.71.23.24.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
195.54.160.180 attack
Sep  6 00:22:11 jumpserver sshd[3875]: Invalid user tgproxy from 195.54.160.180 port 59093
Sep  6 00:22:13 jumpserver sshd[3875]: Failed password for invalid user tgproxy from 195.54.160.180 port 59093 ssh2
Sep  6 00:22:15 jumpserver sshd[3877]: Invalid user vbox from 195.54.160.180 port 12005
...
2020-09-06 08:26:15
186.167.64.162 attackspam
Attempted connection to port 445.
2020-09-06 08:38:39
190.255.222.73 attackspam
Sep  5 16:58:20 pixelmemory sshd[3944700]: Failed password for root from 190.255.222.73 port 52740 ssh2
Sep  5 17:01:04 pixelmemory sshd[3945004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.255.222.73  user=root
Sep  5 17:01:06 pixelmemory sshd[3945004]: Failed password for root from 190.255.222.73 port 38688 ssh2
Sep  5 17:03:49 pixelmemory sshd[3945311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.255.222.73  user=root
Sep  5 17:03:51 pixelmemory sshd[3945311]: Failed password for root from 190.255.222.73 port 52872 ssh2
...
2020-09-06 08:49:27
114.219.90.252 attack
Aug 31 07:42:30 georgia postfix/smtpd[36598]: connect from unknown[114.219.90.252]
Aug 31 07:42:32 georgia postfix/smtpd[36598]: warning: unknown[114.219.90.252]: SASL LOGIN authentication failed: authentication failure
Aug 31 07:42:32 georgia postfix/smtpd[36598]: lost connection after AUTH from unknown[114.219.90.252]
Aug 31 07:42:32 georgia postfix/smtpd[36598]: disconnect from unknown[114.219.90.252] ehlo=1 auth=0/1 commands=1/2
Aug 31 07:42:33 georgia postfix/smtpd[36598]: connect from unknown[114.219.90.252]
Aug 31 07:42:43 georgia postfix/smtpd[36598]: warning: unknown[114.219.90.252]: SASL LOGIN authentication failed: authentication failure
Aug 31 07:42:43 georgia postfix/smtpd[36598]: lost connection after AUTH from unknown[114.219.90.252]
Aug 31 07:42:43 georgia postfix/smtpd[36598]: disconnect from unknown[114.219.90.252] ehlo=1 auth=0/1 commands=1/2
Aug 31 07:42:44 georgia postfix/smtpd[36598]: connect from unknown[114.219.90.252]
Aug 31 07:42:53 georgia pos........
-------------------------------
2020-09-06 08:14:53
2.92.159.63 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-06 08:33:56
103.194.242.254 attackbotsspam
Dovecot Invalid User Login Attempt.
2020-09-06 08:29:04
121.241.244.92 attackspam
Sep  6 00:55:39 * sshd[23590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.241.244.92
Sep  6 00:55:40 * sshd[23590]: Failed password for invalid user password from 121.241.244.92 port 43494 ssh2
2020-09-06 08:44:01
201.63.60.170 attackspam
Unauthorized connection attempt from IP address 201.63.60.170 on Port 445(SMB)
2020-09-06 08:21:09
121.52.150.219 attackbotsspam
Honeypot attack, port: 445, PTR: uettaxila.edu.pk/chakwal.
2020-09-06 08:29:41
70.44.236.57 attack
Honeypot attack, port: 5555, PTR: 70.44.236.57.res-cmts.hzl2.ptd.net.
2020-09-06 08:15:53
49.234.123.171 attack
SSH Invalid Login
2020-09-06 08:20:47
220.135.116.247 attackspam
" "
2020-09-06 08:52:10
185.220.101.215 attackbots
Sep  6 01:39:39 vm0 sshd[3549]: Failed password for root from 185.220.101.215 port 20902 ssh2
Sep  6 01:39:49 vm0 sshd[3549]: error: maximum authentication attempts exceeded for root from 185.220.101.215 port 20902 ssh2 [preauth]
...
2020-09-06 08:24:31
209.141.41.103 attack
Sep 6 01:41:44 *hidden* sshd[38662]: Failed password for *hidden* from 209.141.41.103 port 37633 ssh2 Sep 6 01:41:48 *hidden* sshd[38662]: Failed password for *hidden* from 209.141.41.103 port 37633 ssh2 Sep 6 01:41:52 *hidden* sshd[38662]: Failed password for *hidden* from 209.141.41.103 port 37633 ssh2
2020-09-06 08:25:48
190.39.30.148 attack
1599324387 - 09/05/2020 18:46:27 Host: 190.39.30.148/190.39.30.148 Port: 445 TCP Blocked
2020-09-06 08:31:49

最近上报的IP列表

77.83.39.167 103.208.104.238 121.169.175.5 5.133.192.199
185.12.151.99 159.65.148.196 27.46.75.11 147.185.133.26
135.225.84.187 81.17.103.232 176.236.102.232 44.204.228.85
85.239.235.152 185.76.57.123 147.185.133.53 64.176.34.33
14.212.61.235 111.20.134.120 111.0.0.76 39.154.6.203