必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       198.145.121.0 - 198.145.121.255
CIDR:           198.145.121.0/24
NetName:        DATAR-6
NetHandle:      NET-198-145-121-0-1
Parent:         NET198 (NET-198-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Data Room, Inc (DATAR-6)
RegDate:        2023-05-30
Updated:        2024-08-26
Ref:            https://rdap.arin.net/registry/ip/198.145.121.0


OrgName:        Data Room, Inc
OrgId:          DATAR-6
Address:        3418 Northern Blvd, Suite 408
City:           Long Island City
StateProv:      NY
PostalCode:     11101
Country:        US
RegDate:        2006-02-06
Updated:        2021-09-15
Ref:            https://rdap.arin.net/registry/entity/DATAR-6


OrgAbuseHandle: NETWO1108-ARIN
OrgAbuseName:   Network Operations
OrgAbusePhone:  +1-646-201-4076 
OrgAbuseEmail:  support@serverroom.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/NETWO1108-ARIN

OrgTechHandle: NETWO1108-ARIN
OrgTechName:   Network Operations
OrgTechPhone:  +1-646-201-4076 
OrgTechEmail:  support@serverroom.net
OrgTechRef:    https://rdap.arin.net/registry/entity/NETWO1108-ARIN

OrgDNSHandle: SBO58-ARIN
OrgDNSName:   Botez, Stefan 
OrgDNSPhone:  +40751257259 
OrgDNSEmail:  stefan@serverroom.net
OrgDNSRef:    https://rdap.arin.net/registry/entity/SBO58-ARIN

OrgDNSHandle: COCEI-ARIN
OrgDNSName:   Cocei, Andi 
OrgDNSPhone:  +40770437239 
OrgDNSEmail:  andi@serverroom.net
OrgDNSRef:    https://rdap.arin.net/registry/entity/COCEI-ARIN

OrgNOCHandle: NETWO1108-ARIN
OrgNOCName:   Network Operations
OrgNOCPhone:  +1-646-201-4076 
OrgNOCEmail:  support@serverroom.net
OrgNOCRef:    https://rdap.arin.net/registry/entity/NETWO1108-ARIN

OrgRoutingHandle: COCEI-ARIN
OrgRoutingName:   Cocei, Andi 
OrgRoutingPhone:  +40770437239 
OrgRoutingEmail:  andi@serverroom.net
OrgRoutingRef:    https://rdap.arin.net/registry/entity/COCEI-ARIN

OrgRoutingHandle: SBO58-ARIN
OrgRoutingName:   Botez, Stefan 
OrgRoutingPhone:  +40751257259 
OrgRoutingEmail:  stefan@serverroom.net
OrgRoutingRef:    https://rdap.arin.net/registry/entity/SBO58-ARIN

OrgTechHandle: COCEI-ARIN
OrgTechName:   Cocei, Andi 
OrgTechPhone:  +40770437239 
OrgTechEmail:  andi@serverroom.net
OrgTechRef:    https://rdap.arin.net/registry/entity/COCEI-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.145.121.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5030
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;198.145.121.150.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026020500 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 05 21:23:36 CST 2026
;; MSG SIZE  rcvd: 108
HOST信息:
150.121.145.198.in-addr.arpa domain name pointer enforce.de.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
150.121.145.198.in-addr.arpa	name = enforce.de.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
111.19.179.149 attack
111.19.179.149 was recorded 5 times by 5 hosts attempting to connect to the following ports: 21. Incident counter (4h, 24h, all-time): 5, 5, 5
2019-11-21 21:05:53
51.15.229.114 attack
CloudCIX Reconnaissance Scan Detected, PTR: 114-229-15-51.rev.cloud.scaleway.com.
2019-11-21 20:42:58
107.170.190.16 attackspambots
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-11-21 20:54:26
193.56.28.177 attack
Nov 21 13:18:04 srv01 postfix/smtpd\[2883\]: warning: unknown\[193.56.28.177\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 21 13:35:39 srv01 postfix/smtpd\[7960\]: warning: unknown\[193.56.28.177\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 21 13:35:45 srv01 postfix/smtpd\[7960\]: warning: unknown\[193.56.28.177\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 21 13:35:55 srv01 postfix/smtpd\[7960\]: warning: unknown\[193.56.28.177\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 21 13:37:29 srv01 postfix/smtpd\[9002\]: warning: unknown\[193.56.28.177\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-21 21:18:51
74.58.106.15 attackspambots
Automatic report - SSH Brute-Force Attack
2019-11-21 21:07:44
109.184.152.173 attackbotsspam
Port 1433 Scan
2019-11-21 20:56:35
158.69.31.36 attack
$f2bV_matches
2019-11-21 21:26:16
222.186.180.17 attack
Nov 21 02:54:20 auw2 sshd\[17709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17  user=root
Nov 21 02:54:22 auw2 sshd\[17709\]: Failed password for root from 222.186.180.17 port 9140 ssh2
Nov 21 02:54:41 auw2 sshd\[17736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17  user=root
Nov 21 02:54:44 auw2 sshd\[17736\]: Failed password for root from 222.186.180.17 port 25192 ssh2
Nov 21 02:55:04 auw2 sshd\[17765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17  user=root
2019-11-21 21:04:51
129.204.23.5 attackspambots
Nov 21 13:56:41 v22018086721571380 sshd[13503]: Failed password for invalid user mysql from 129.204.23.5 port 56888 ssh2
Nov 21 14:08:23 v22018086721571380 sshd[13843]: Failed password for invalid user host from 129.204.23.5 port 43028 ssh2
2019-11-21 21:08:47
193.188.22.229 attack
Invalid user service from 193.188.22.229 port 26315
2019-11-21 21:03:06
124.251.110.147 attackbots
Nov 21 14:08:40 vps691689 sshd[24252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.251.110.147
Nov 21 14:08:42 vps691689 sshd[24252]: Failed password for invalid user saboorian from 124.251.110.147 port 53282 ssh2
...
2019-11-21 21:23:29
62.234.91.173 attackbotsspam
5x Failed Password
2019-11-21 20:52:37
112.175.184.45 attack
Automatic report - XMLRPC Attack
2019-11-21 21:24:31
54.38.241.162 attackspambots
Nov 21 13:30:37 vps691689 sshd[23515]: Failed password for root from 54.38.241.162 port 38602 ssh2
Nov 21 13:37:24 vps691689 sshd[23655]: Failed password for root from 54.38.241.162 port 53852 ssh2
...
2019-11-21 20:46:23
36.189.253.226 attackspam
Nov  2 09:11:51 odroid64 sshd\[30241\]: User root from 36.189.253.226 not allowed because not listed in AllowUsers
Nov  2 09:11:51 odroid64 sshd\[30241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.189.253.226  user=root
...
2019-11-21 20:54:59

最近上报的IP列表

118.232.255.41 47.99.78.223 85.217.161.247 45.145.66.82
176.120.22.61 101.236.211.26 47.77.235.0 20.220.62.160
185.93.89.75 38.244.66.157 10.40.3.254 10.40.3.71
213.209.159.175 213.176.16.157 39.173.107.62 20.231.128.65
18.203.221.131 120.235.44.94 161.118.250.115 111.250.107.10