必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Rwanda

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to  the following terms of Use. See https://afrinic.net/whois/terms

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '197.234.244.0 - 197.234.247.255'

% No abuse contact registered for 197.234.244.0 - 197.234.247.255

inetnum:        197.234.244.0 - 197.234.247.255
netname:        ISPA
descr:          ISPA Ltd
country:        RW
org:            ORG-IL25-AFRINIC
admin-c:        Sk20-AFRINIC
tech-c:         YK10-AFRINIC
status:         ALLOCATED PA
mnt-by:         AFRINIC-HM-MNT
mnt-lower:      ISPA-MNT
mnt-domains:    ISPA-MNT
source:         AFRINIC # Filtered
parent:         197.0.0.0 - 197.255.255.255

organisation:   ORG-IL25-AFRINIC
org-name:       ISPA Ltd
org-type:       LIR
country:        RW
address:        360 Boulevard Umuganda
address:        Kigali 360
phone:          tel:+250-788-303-181
phone:          tel:+250-788-303-181
admin-c:        Sk20-AFRINIC
tech-c:         YK10-AFRINIC
mnt-ref:        AFRINIC-HM-MNT
mnt-ref:        ISPA-MNT
mnt-by:         AFRINIC-HM-MNT
source:         AFRINIC # Filtered

person:         Serguei Kisselev
address:        Kigali 360
address:        RW
phone:          tel:+250-788-563-046
nic-hdl:        SK20-AFRINIC
mnt-by:         GENERATED-FKZXJW2FQGJSVZDKR5OMININP2S3QAPT-MNT
source:         AFRINIC # Filtered

person:         Yvon Kaningu
address:        360 Airport Road, Kigali
phone:          tel:+250-788-303-181
nic-hdl:        YK10-AFRINIC
mnt-by:         GENERATED-BMKBENEUOVE2XRE5MME5PD1PLNYDSGI0-MNT
source:         AFRINIC # Filtered

% Information related to '197.234.244.0/22AS37547'

route:          197.234.244.0/22
descr:          ISPA-Rwanda
origin:         AS37547
mnt-by:         ISPA-MNT
source:         AFRINIC # Filtered
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.234.245.250
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1425
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;197.234.245.250.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032501 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 26 03:47:44 CST 2026
;; MSG SIZE  rcvd: 108
HOST信息:
Host 250.245.234.197.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 250.245.234.197.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
3.130.31.31 attackbotsspam
Aug 14 04:09:33 XXX sshd[41460]: Invalid user sn0wcat from 3.130.31.31 port 47494
2019-08-14 14:52:40
147.135.95.253 attack
HTTP/80/443 Probe, BF, WP, Hack -
2019-08-14 14:52:59
46.254.241.205 attackspam
Unauthorized connection attempt from IP address 46.254.241.205 on Port 445(SMB)
2019-08-14 14:45:06
103.60.126.65 attack
Aug 14 07:03:29 v22018076622670303 sshd\[12257\]: Invalid user meng from 103.60.126.65 port 18635
Aug 14 07:03:29 v22018076622670303 sshd\[12257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.60.126.65
Aug 14 07:03:31 v22018076622670303 sshd\[12257\]: Failed password for invalid user meng from 103.60.126.65 port 18635 ssh2
...
2019-08-14 14:00:53
103.55.215.49 attackspambots
Unauthorized connection attempt from IP address 103.55.215.49 on Port 445(SMB)
2019-08-14 14:25:27
190.226.43.250 attackspam
Unauthorized connection attempt from IP address 190.226.43.250 on Port 445(SMB)
2019-08-14 14:41:31
14.177.239.123 attackbotsspam
Unauthorized connection attempt from IP address 14.177.239.123 on Port 445(SMB)
2019-08-14 14:04:05
40.86.231.125 attackbotsspam
Aug 14 07:47:26 mail sshd\[12444\]: Invalid user ronald from 40.86.231.125
Aug 14 07:47:26 mail sshd\[12444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.86.231.125
Aug 14 07:47:28 mail sshd\[12444\]: Failed password for invalid user ronald from 40.86.231.125 port 1152 ssh2
...
2019-08-14 14:27:27
209.242.223.133 attackspam
Automatic report - Banned IP Access
2019-08-14 14:29:54
167.71.229.187 attackspambots
:
2019-08-14 14:40:16
157.230.178.211 attack
Aug 14 08:42:02 yabzik sshd[26360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.178.211
Aug 14 08:42:04 yabzik sshd[26360]: Failed password for invalid user memuser from 157.230.178.211 port 51010 ssh2
Aug 14 08:46:52 yabzik sshd[27986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.178.211
Aug 14 08:46:54 yabzik sshd[27986]: Failed password for invalid user admin from 157.230.178.211 port 43582 ssh2
2019-08-14 14:13:05
51.38.186.47 attack
Aug 14 07:17:55 SilenceServices sshd[16290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.47
Aug 14 07:17:57 SilenceServices sshd[16290]: Failed password for invalid user bash from 51.38.186.47 port 58266 ssh2
Aug 14 07:22:32 SilenceServices sshd[19470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.47
2019-08-14 14:32:08
103.24.75.162 attack
Unauthorized connection attempt from IP address 103.24.75.162 on Port 445(SMB)
2019-08-14 14:46:36
211.252.19.254 attack
Invalid user cinema from 211.252.19.254 port 40952
2019-08-14 14:16:55
82.221.131.71 attack
(sshd) Failed SSH login from 82.221.131.71 (-): 5 in the last 3600 secs
2019-08-14 14:12:21

最近上报的IP列表

134.35.157.124 2606:4700:10::ac43:1664 2606:4700:10::6814:4818 2606:4700:10::ac43:2904
2606:4700:10::6814:7172 2606:4700:10::6816:248 2606:4700:10::6814:6556 2606:4700:10::6816:4583
2606:4700:10::6816:4012 2606:4700:10::6816:304 8.218.108.185 45.85.216.150
46.101.82.104 205.169.39.29 202.58.242.20 66.132.186.202
120.124.229.26 44.204.184.42 44.202.13.116 3.90.5.174