必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): India

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '202.141.0.0 - 202.141.127.255'

% Abuse contact for '202.141.0.0 - 202.141.127.255' is 'abuse@railtelindia.com'

inetnum:        202.141.0.0 - 202.141.127.255
netname:        RAILTEL-IN
descr:          RailTel Corporation is an Internet Service Provider.
country:        IN
admin-c:        NA1011-AP
tech-c:         NA1011-AP
status:         ALLOCATED PORTABLE
mnt-by:         MAINT-IN-IRINN
mnt-lower:      MAINT-IN-RAILTEL
mnt-lower:      MAINT-IN-IRINN
mnt-routes:     MAINT-IN-RAILTEL
mnt-routes:     MAINT-IN-IRINN
mnt-irt:        IRT-RAILTEL-IN
last-modified:  2025-12-04T06:50:27Z
source:         APNIC

irt:            IRT-RAILTEL-IN
address:        Plot No, 143
address:        Sector 44 ,Gurugram
address:        Haryana ,122003
e-mail:         abuse@railtelindia.com
abuse-mailbox:  abuse@railtelindia.com
admin-c:        NA1011-AP
tech-c:         NA1011-AP
auth:           # Filtered
mnt-by:         MAINT-IN-RAILTEL
mnt-by:         MAINT-IN-IRINN
last-modified:  2026-02-10T04:57:40Z
source:         APNIC

person:         Network Administrator
address:        Plate-A, 6th Floor, Office Block Tower-2,
address:        East Kidwai Nagar, New Delhi-110023
country:        IN
phone:          +91 11 22900600
e-mail:         ipadmin@railtel.in
nic-hdl:        NA1011-AP
mnt-by:         MAINT-IN-RAILTEL
mnt-by:         MAINT-IN-IRINN
fax-no:         +91 11 22900699
last-modified:  2025-09-27T09:36:11Z
source:         APNIC

% Information related to '202.141.39.0/24AS24186'

route:          202.141.39.0/24
origin:         AS24186
descr:          NIXI
                B-901, 9th Floor, Tower B,
                World Trade Centre,
                Nauroji nagar
mnt-by:         MAINT-IN-IRINN
mnt-routes:     MAINT-IN-IRINN
last-modified:  2026-01-08T22:44:34Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.141.39.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65133
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;202.141.39.29.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040300 1800 900 604800 86400

;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 03 16:31:09 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 29.39.141.202.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
b'29.39.141.202.in-addr.arpa	name = ws29-39.141.202.rcil.gov.in.

Authoritative answers can be found from:

'
相关IP信息:
最新评论:
IP 类型 评论内容 时间
139.155.82.119 attack
Dec 22 16:26:08 *** sshd[2422]: Invalid user tucher from 139.155.82.119
2019-12-23 01:04:46
106.75.61.203 attackspambots
Honeypot attack, port: 139, PTR: PTR record not found
2019-12-23 00:20:46
46.101.139.105 attackspam
Dec 22 06:27:15 eddieflores sshd\[19665\]: Invalid user hein from 46.101.139.105
Dec 22 06:27:15 eddieflores sshd\[19665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.139.105
Dec 22 06:27:17 eddieflores sshd\[19665\]: Failed password for invalid user hein from 46.101.139.105 port 52682 ssh2
Dec 22 06:33:00 eddieflores sshd\[20161\]: Invalid user test4 from 46.101.139.105
Dec 22 06:33:00 eddieflores sshd\[20161\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.139.105
2019-12-23 00:38:08
170.82.40.69 attackspam
Dec 22 17:23:53 sd-53420 sshd\[434\]: Invalid user louis from 170.82.40.69
Dec 22 17:23:53 sd-53420 sshd\[434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.82.40.69
Dec 22 17:23:55 sd-53420 sshd\[434\]: Failed password for invalid user louis from 170.82.40.69 port 33320 ssh2
Dec 22 17:29:41 sd-53420 sshd\[2796\]: User www-data from 170.82.40.69 not allowed because none of user's groups are listed in AllowGroups
Dec 22 17:29:41 sd-53420 sshd\[2796\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.82.40.69  user=www-data
...
2019-12-23 00:36:21
139.217.96.76 attackspambots
Dec 22 06:01:40 php1 sshd\[988\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.217.96.76  user=root
Dec 22 06:01:41 php1 sshd\[988\]: Failed password for root from 139.217.96.76 port 58382 ssh2
Dec 22 06:06:59 php1 sshd\[1604\]: Invalid user warmuth from 139.217.96.76
Dec 22 06:06:59 php1 sshd\[1604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.217.96.76
Dec 22 06:07:01 php1 sshd\[1604\]: Failed password for invalid user warmuth from 139.217.96.76 port 56350 ssh2
2019-12-23 00:40:51
115.94.204.156 attackbots
Dec 22 20:56:32 gw1 sshd[32041]: Failed password for root from 115.94.204.156 port 41116 ssh2
...
2019-12-23 00:27:57
106.12.218.60 attackbots
Dec 22 17:27:23 vps691689 sshd[27435]: Failed password for root from 106.12.218.60 port 33184 ssh2
Dec 22 17:34:02 vps691689 sshd[27596]: Failed password for root from 106.12.218.60 port 54534 ssh2
...
2019-12-23 00:35:22
182.61.14.224 attack
$f2bV_matches
2019-12-23 00:55:46
107.170.235.19 attackspambots
Dec 22 17:29:38 sd-53420 sshd\[2767\]: Invalid user sarmento from 107.170.235.19
Dec 22 17:29:38 sd-53420 sshd\[2767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.235.19
Dec 22 17:29:41 sd-53420 sshd\[2767\]: Failed password for invalid user sarmento from 107.170.235.19 port 53346 ssh2
Dec 22 17:35:38 sd-53420 sshd\[5279\]: Invalid user brouthillier from 107.170.235.19
Dec 22 17:35:38 sd-53420 sshd\[5279\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.235.19
...
2019-12-23 00:38:45
222.186.180.6 attackbots
Dec 22 17:09:48 legacy sshd[30401]: Failed password for root from 222.186.180.6 port 14932 ssh2
Dec 22 17:10:01 legacy sshd[30401]: error: maximum authentication attempts exceeded for root from 222.186.180.6 port 14932 ssh2 [preauth]
Dec 22 17:10:07 legacy sshd[30412]: Failed password for root from 222.186.180.6 port 27694 ssh2
...
2019-12-23 00:25:21
152.136.203.208 attackbots
Dec 22 17:01:22 root sshd[7149]: Failed password for root from 152.136.203.208 port 33218 ssh2
Dec 22 17:09:59 root sshd[7314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.203.208 
Dec 22 17:10:01 root sshd[7314]: Failed password for invalid user dovecot from 152.136.203.208 port 39514 ssh2
...
2019-12-23 00:23:07
187.199.88.157 attack
2019-12-22T16:02:29.788126shield sshd\[24110\]: Invalid user pf from 187.199.88.157 port 33352
2019-12-22T16:02:29.795038shield sshd\[24110\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.199.88.157
2019-12-22T16:02:31.550742shield sshd\[24110\]: Failed password for invalid user pf from 187.199.88.157 port 33352 ssh2
2019-12-22T16:08:57.771933shield sshd\[26685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.199.88.157  user=mail
2019-12-22T16:08:59.471573shield sshd\[26685\]: Failed password for mail from 187.199.88.157 port 38348 ssh2
2019-12-23 00:19:47
178.33.234.234 attackbots
Dec 22 16:56:14 [host] sshd[3277]: Invalid user test from 178.33.234.234
Dec 22 16:56:14 [host] sshd[3277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.234.234
Dec 22 16:56:16 [host] sshd[3277]: Failed password for invalid user test from 178.33.234.234 port 58114 ssh2
2019-12-23 00:27:42
51.77.195.1 attack
Dec 22 11:17:46 plusreed sshd[3415]: Invalid user Heslo from 51.77.195.1
...
2019-12-23 00:25:35
198.108.67.108 attackbots
Portscan or hack attempt detected by psad/fwsnort
2019-12-23 00:34:12

最近上报的IP列表

108.85.203.251 50.7.158.114 80.95.207.198 147.226.234.22
20.29.58.2 120.169.152.189 110.78.156.132 2606:4700:10::6816:1701
2606:4700:10::6814:9575 110.77.248.160 2606:4700:10::6816:4942 2606:4700:10::6814:8190
2606:4700:10::6816:1584 2606:4700:10::6816:998 121.234.219.138 2606:4700:10::6816:2140
164.155.74.48 2606:4700:10::ac43:823 109.162.246.59 2606:4700:10::6816:3935