必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Oliveros

省份(region): Santa Fe

国家(country): Argentina

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       45.230.16.0 - 45.231.205.255
CIDR:           45.231.128.0/18, 45.230.16.0/20, 45.230.64.0/18, 45.231.0.0/17, 45.231.200.0/22, 45.231.204.0/23, 45.230.32.0/19, 45.230.128.0/17, 45.231.192.0/21
NetName:        LACNIC
NetHandle:      NET-45-230-16-0-1
Parent:         NET45 (NET-45-0-0-0-0)
NetType:        Transferred to LACNIC
OriginAS:       
Organization:   Latin American and Caribbean IP address Regional Registry (LACNIC)
RegDate:        2014-09-05
Updated:        2022-07-06
Ref:            https://rdap.arin.net/registry/ip/45.230.16.0

ResourceLink:  http://lacnic.net/cgi-bin/lacnic/whois
ResourceLink:  whois.lacnic.net


OrgName:        Latin American and Caribbean IP address Regional Registry
OrgId:          LACNIC
Address:        Rambla Republica de Mexico 6125
City:           Montevideo
StateProv:      
PostalCode:     11400
Country:        UY
RegDate:        2002-07-27
Updated:        2018-03-15
Ref:            https://rdap.arin.net/registry/entity/LACNIC

ReferralServer:  whois://whois.lacnic.net
ResourceLink:  http://lacnic.net/cgi-bin/lacnic/whois

OrgTechHandle: LACNIC-ARIN
OrgTechName:   LACNIC Whois Info
OrgTechPhone:  +598-2604-2222 
OrgTechEmail:  whois-contact@lacnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/LACNIC-ARIN

OrgAbuseHandle: LWI100-ARIN
OrgAbuseName:   LACNIC Whois Info
OrgAbusePhone:  +598-2604-2222 
OrgAbuseEmail:  abuse@lacnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/LWI100-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.lacnic.net.

% IP Client: 124.223.158.242
 
% Joint Whois - whois.lacnic.net
%  This server accepts single ASN, IPv4 or IPv6 queries

% LACNIC resource: whois.lacnic.net


% Copyright LACNIC lacnic.net
%  The data below is provided for information purposes
%  and to assist persons in obtaining information about or
%  related to AS and IP numbers registrations
%  By submitting a whois query, you agree to use this data
%  only for lawful purposes.
%  2026-04-30 20:30:38 (-03 -03:00)

inetnum:     45.230.64.0/22
status:      allocated
aut-num:     AS266702
owner:       MEGALINK S.R.L.
ownerid:     AR-MESR19-LACNIC
responsible: Martín Bruno
address:     Dorrego 1639 Rosario AR, , Piso 8 Dpto B
address:     2000 - Rosario - Santa Fe
country:     AR
phone:       +54 0341 4265523
owner-c:     VAC50
tech-c:      VAC50
abuse-c:     VAC50
inetrev:     45.230.64.0/24
nserver:     NS1.MEGALINK.COM.AR
nsstat:      20260426 AA
nslastaa:    20260426
nserver:     NS1.TICNORTE.COM.AR
nsstat:      20260426 AA
nslastaa:    20260426
inetrev:     45.230.65.0/24
nserver:     NS1.MEGALINK.COM.AR
nsstat:      20260426 AA
nslastaa:    20260426
nserver:     NS1.TICNORTE.COM.AR
nsstat:      20260426 AA
nslastaa:    20260426
inetrev:     45.230.66.0/24
nserver:     NS1.MEGALINK.COM.AR
nsstat:      20260428 AA
nslastaa:    20260428
nserver:     NS1.TICNORTE.COM.AR
nsstat:      20260428 AA
nslastaa:    20260428
inetrev:     45.230.67.0/24
nserver:     NS1.MEGALINK.COM.AR
nsstat:      20260428 AA
nslastaa:    20260428
nserver:     NS1.TICNORTE.COM.AR
nsstat:      20260428 AA
nslastaa:    20260428
created:     20180118
changed:     20180118

nic-hdl:     VAC50
person:      Valeria Colome
e-mail:      emachuca@optilogic.com.ar
address:     Candiotti, 567, -
address:     2535 - El Trebol - Santa Fe
country:     AR
phone:       +54  3401401912 [0000]
created:     20171017
changed:     20260409

% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.230.66.123
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28072
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.230.66.123.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026043002 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 01 07:30:39 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
b'123.66.230.45.in-addr.arpa domain name pointer 123-nred66.megalink.com.ar.
'
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
123.66.230.45.in-addr.arpa	name = 123-nred66.megalink.com.ar.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
182.162.101.80 attackspam
2019-07-15T21:15:03.365901abusebot-5.cloudsearch.cf sshd\[26347\]: Invalid user ita from 182.162.101.80 port 55068
2019-07-16 05:15:38
188.166.60.205 attackspam
60001/tcp 5500/tcp...
[2019-07-07/15]9pkt,2pt.(tcp)
2019-07-16 05:04:36
82.114.89.130 attack
445/tcp 445/tcp 445/tcp...
[2019-05-25/07-15]15pkt,1pt.(tcp)
2019-07-16 05:36:34
223.244.247.91 attack
[Aegis] @ 2019-07-15 17:53:16  0100 -> Attempt to use mail server as relay (550: Requested action not taken).
2019-07-16 05:01:02
188.254.0.160 attackspambots
Jul 15 22:26:19 core01 sshd\[1579\]: Invalid user fmaster from 188.254.0.160 port 60378
Jul 15 22:26:19 core01 sshd\[1579\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.160
...
2019-07-16 04:51:01
172.104.112.244 attack
1080/tcp 1080/tcp 1080/tcp...
[2019-05-17/07-15]74pkt,1pt.(tcp)
2019-07-16 05:33:42
195.154.251.114 attackspam
5060/udp 5060/udp 5060/udp...
[2019-06-26/07-15]11pkt,1pt.(udp)
2019-07-16 05:06:10
141.255.32.27 attack
Caught in portsentry honeypot
2019-07-16 05:17:48
45.118.217.16 attack
Automatic report - Port Scan Attack
2019-07-16 05:03:31
180.163.220.42 attackspambots
22/tcp 23/tcp 10010/tcp...
[2019-06-13/07-15]6pkt,5pt.(tcp)
2019-07-16 05:02:38
219.233.49.39 attackspambots
2019-07-15T20:22:48.663693+01:00 suse sshd[31352]: User root from 219.233.49.39 not allowed because not listed in AllowUsers
2019-07-15T20:22:51.541886+01:00 suse sshd[31352]: error: PAM: Authentication failure for illegal user root from 219.233.49.39
2019-07-15T20:22:48.663693+01:00 suse sshd[31352]: User root from 219.233.49.39 not allowed because not listed in AllowUsers
2019-07-15T20:22:51.541886+01:00 suse sshd[31352]: error: PAM: Authentication failure for illegal user root from 219.233.49.39
2019-07-15T20:22:48.663693+01:00 suse sshd[31352]: User root from 219.233.49.39 not allowed because not listed in AllowUsers
2019-07-15T20:22:51.541886+01:00 suse sshd[31352]: error: PAM: Authentication failure for illegal user root from 219.233.49.39
2019-07-15T20:22:51.566427+01:00 suse sshd[31352]: Failed keyboard-interactive/pam for invalid user root from 219.233.49.39 port 55956 ssh2
...
2019-07-16 05:10:44
35.137.135.252 attackspambots
Jul 15 21:56:42 core01 sshd\[23636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.137.135.252  user=root
Jul 15 21:56:44 core01 sshd\[23636\]: Failed password for root from 35.137.135.252 port 52736 ssh2
...
2019-07-16 05:14:04
112.117.112.19 attackspambots
[Aegis] @ 2019-07-15 17:52:34  0100 -> Attempt to use mail server as relay (550: Requested action not taken).
2019-07-16 05:21:55
128.199.145.205 attack
2019-07-15T20:38:33.038084abusebot-2.cloudsearch.cf sshd\[30068\]: Invalid user ek from 128.199.145.205 port 58177
2019-07-16 05:10:11
103.1.94.21 attackspambots
Jul 15 23:06:21 lnxded63 sshd[13185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.1.94.21
Jul 15 23:06:21 lnxded63 sshd[13185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.1.94.21
2019-07-16 05:07:37

最近上报的IP列表

2606:4700:10::6814:6558 2606:4700:10::6814:6199 52.6.113.215 50.16.169.122
42.200.193.83 170.106.75.142 2606:4700:10::6816:3995 2606:4700:10::ac43:2884
2606:4700:20::681a:200 66.132.186.206 45.142.193.24 173.9.237.169
2606:4700:10::6814:7576 109.162.246.49 57.141.14.33 5.61.209.224
3.255.202.180 2606:4700:10::6816:3818 2606:4700:10::ac43:1658 2606:4700:10::6816:893