必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): London

省份(region): England

国家(country): United Kingdom

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '195.140.214.16 - 195.140.214.31'

% Abuse contact for '195.140.214.16 - 195.140.214.31' is 'abuse@infrawat.ch'

inetnum:        195.140.214.16 - 195.140.214.31
netname:        INFRAWATCH
remarks:        -----------------------------------------------------
remarks:        Real time internet intelligence data
remarks:        infrawat.ch
remarks:        -----------------------------------------------------
country:        GB
geoloc:         51.494840911758295 -0.018682268947961784
org:            ORG-IL948-RIPE
admin-c:        LD7399-RIPE
tech-c:         LD7399-RIPE
status:         ASSIGNED PA
created:        2026-03-26T04:41:57Z
last-modified:  2026-03-27T02:01:08Z
source:         RIPE
mnt-by:         HYDRA-MNT

organisation:   ORG-IL948-RIPE
org-name:       Infrawatch Limited
org-type:       OTHER
address:        128 City Road
address:        London
address:        EC1V 2NX
country:        GB
abuse-c:        ACRO64026-RIPE
mnt-ref:        HYDRA-MNT
created:        2026-03-26T04:32:13Z
last-modified:  2026-03-26T04:32:13Z
source:         RIPE # Filtered
mnt-by:         HYDRA-MNT

person:         Lloyd Davies
address:        128 City Road
address:        London
address:        EC1V 2NX
address:        United Kingdom
phone:          +448000803330
nic-hdl:        LD7399-RIPE
created:        2026-03-26T04:34:31Z
last-modified:  2026-03-26T04:34:31Z
source:         RIPE # Filtered
mnt-by:         HYDRA-MNT

% Information related to '195.140.212.0/22AS25369'

route:          195.140.212.0/22
origin:         AS25369
mnt-by:         HYDRA-MNT
created:        2018-06-28T01:47:08Z
last-modified:  2018-06-28T01:47:08Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.140.214.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26808
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;195.140.214.21.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040201 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 03 07:00:33 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
21.214.140.195.in-addr.arpa domain name pointer 21.214.140.195.infrawat.ch.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.214.140.195.in-addr.arpa	name = 21.214.140.195.infrawat.ch.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
116.112.181.53 attackbots
Automatic report - Port Scan Attack
2019-07-25 04:52:54
216.244.66.232 attack
20 attempts against mh-misbehave-ban on ice.magehost.pro
2019-07-25 04:27:24
51.68.174.177 attackspam
Jul 24 21:37:28 nextcloud sshd\[9259\]: Invalid user config from 51.68.174.177
Jul 24 21:37:28 nextcloud sshd\[9259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.174.177
Jul 24 21:37:30 nextcloud sshd\[9259\]: Failed password for invalid user config from 51.68.174.177 port 40068 ssh2
...
2019-07-25 04:35:36
177.36.58.182 attack
2019-07-24T17:45:02.656349abusebot-2.cloudsearch.cf sshd\[3734\]: Invalid user tan from 177.36.58.182 port 50278
2019-07-25 04:34:49
121.21.218.207 attack
5500/tcp
[2019-07-24]1pkt
2019-07-25 04:19:46
36.73.193.132 attackspam
445/tcp
[2019-07-24]1pkt
2019-07-25 04:29:23
212.252.116.58 attackspam
" "
2019-07-25 04:39:14
124.187.201.199 attackspam
5555/tcp
[2019-07-24]1pkt
2019-07-25 04:21:13
81.22.45.148 attack
24.07.2019 20:22:31 Connection to port 9652 blocked by firewall
2019-07-25 04:36:29
46.101.237.212 attack
Jul 24 22:44:41 herz-der-gamer sshd[8659]: Failed password for invalid user gamma from 46.101.237.212 port 58879 ssh2
...
2019-07-25 04:50:48
45.228.119.99 attackbotsspam
22/tcp 22/tcp
[2019-07-24]2pkt
2019-07-25 04:34:10
61.0.121.21 attackbots
22/tcp
[2019-07-24]1pkt
2019-07-25 04:28:47
179.83.148.175 attackbotsspam
81/tcp
[2019-07-24]1pkt
2019-07-25 04:42:58
185.97.132.14 attackspambots
2019-07-24T18:43:33.557788 X postfix/smtpd[32434]: NOQUEUE: reject: RCPT from unknown[185.97.132.14]: 554 5.7.1 Service unavailable; Client host [185.97.132.14] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/185.97.132.14; from= to= proto=ESMTP helo=
2019-07-25 04:20:04
223.204.65.55 attackbotsspam
DATE:2019-07-24 22:25:01, IP:223.204.65.55, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2019-07-25 04:48:30

最近上报的IP列表

2606:4700:10::6814:5625 2606:4700:10::6814:5590 2606:4700:10::6814:5988 2606:4700:10::6814:7656
2606:4700:10::6816:3758 2606:4700:10::ac43:1793 2606:4700:10::ac43:978 2606:4700:10::6816:4827
2606:4700:10::6814:5576 164.155.74.133 2606:4700:10::6816:4381 2606:4700:10::6814:5794
2606:4700:10::6814:4665 2606:4700:10::6814:4477 2606:4700:10::6814:5017 2606:4700:10::6816:4184
121.230.89.42 59.40.77.59 31.46.248.246 66.132.195.114