必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Oliveros

省份(region): Santa Fe

国家(country): Argentina

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       45.230.16.0 - 45.231.205.255
CIDR:           45.231.128.0/18, 45.230.32.0/19, 45.231.0.0/17, 45.230.64.0/18, 45.231.200.0/22, 45.230.16.0/20, 45.231.192.0/21, 45.231.204.0/23, 45.230.128.0/17
NetName:        LACNIC
NetHandle:      NET-45-230-16-0-1
Parent:         NET45 (NET-45-0-0-0-0)
NetType:        Transferred to LACNIC
OriginAS:       
Organization:   Latin American and Caribbean IP address Regional Registry (LACNIC)
RegDate:        2014-09-05
Updated:        2022-07-06
Ref:            https://rdap.arin.net/registry/ip/45.230.16.0

ResourceLink:  http://lacnic.net/cgi-bin/lacnic/whois
ResourceLink:  whois.lacnic.net


OrgName:        Latin American and Caribbean IP address Regional Registry
OrgId:          LACNIC
Address:        Rambla Republica de Mexico 6125
City:           Montevideo
StateProv:      
PostalCode:     11400
Country:        UY
RegDate:        2002-07-27
Updated:        2018-03-15
Ref:            https://rdap.arin.net/registry/entity/LACNIC

ReferralServer:  whois://whois.lacnic.net
ResourceLink:  http://lacnic.net/cgi-bin/lacnic/whois

OrgTechHandle: LACNIC-ARIN
OrgTechName:   LACNIC Whois Info
OrgTechPhone:  +598-2604-2222 
OrgTechEmail:  whois-contact@lacnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/LACNIC-ARIN

OrgAbuseHandle: LWI100-ARIN
OrgAbuseName:   LACNIC Whois Info
OrgAbusePhone:  +598-2604-2222 
OrgAbuseEmail:  abuse@lacnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/LWI100-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.lacnic.net.

% IP Client: 124.223.158.242
 
% Joint Whois - whois.lacnic.net
%  This server accepts single ASN, IPv4 or IPv6 queries

% LACNIC resource: whois.lacnic.net


% Copyright LACNIC lacnic.net
%  The data below is provided for information purposes
%  and to assist persons in obtaining information about or
%  related to AS and IP numbers registrations
%  By submitting a whois query, you agree to use this data
%  only for lawful purposes.
%  2026-01-23 14:30:10 (-03 -03:00)

inetnum:     45.230.64.0/22
status:      allocated
aut-num:     AS266702
owner:       MEGALINK S.R.L.
ownerid:     AR-MESR19-LACNIC
responsible: Martín Bruno
address:     Dorrego 1639 Rosario AR, , Piso 8 Dpto B
address:     2000 - Rosario - Santa Fe
country:     AR
phone:       +54 0341 4265523
owner-c:     VAC50
tech-c:      VAC50
abuse-c:     VAC50
inetrev:     45.230.64.0/24
nserver:     NS1.MEGALINK.COM.AR
nsstat:      20260123 AA
nslastaa:    20260123
nserver:     NS1.TICNORTE.COM.AR
nsstat:      20260123 AA
nslastaa:    20260123
inetrev:     45.230.65.0/24
nserver:     NS1.MEGALINK.COM.AR
nsstat:      20260123 AA
nslastaa:    20260123
nserver:     NS1.TICNORTE.COM.AR
nsstat:      20260123 AA
nslastaa:    20260123
inetrev:     45.230.66.0/24
nserver:     NS1.MEGALINK.COM.AR
nsstat:      20260122 AA
nslastaa:    20260122
nserver:     NS1.TICNORTE.COM.AR
nsstat:      20260122 AA
nslastaa:    20260122
inetrev:     45.230.67.0/24
nserver:     NS1.MEGALINK.COM.AR
nsstat:      20260122 AA
nslastaa:    20260122
nserver:     NS1.TICNORTE.COM.AR
nsstat:      20260122 AA
nslastaa:    20260122
created:     20180118
changed:     20180118

nic-hdl:     VAC50
person:      Valeria Colome
e-mail:      operaciones@nodonorte.net.ar
address:     Candiotti, 567, -
address:     2535 - El Trebol - Santa Fe
country:     AR
phone:       +54  3401401912 [0000]
created:     20171017
changed:     20221108

% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.230.66.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42366
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.230.66.125.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026012300 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 24 01:30:11 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
125.66.230.45.in-addr.arpa domain name pointer 125-nred66.megalink.com.ar.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
125.66.230.45.in-addr.arpa	name = 125-nred66.megalink.com.ar.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
200.31.106.2 attack
1598225271 - 08/24/2020 01:27:51 Host: 200.31.106.2/200.31.106.2 Port: 445 TCP Blocked
2020-08-24 08:52:33
121.204.153.151 attackbots
Time:     Mon Aug 24 00:23:34 2020 +0000
IP:       121.204.153.151 (-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Aug 24 00:03:50 ca-18-ede1 sshd[5616]: Invalid user sistema from 121.204.153.151 port 54874
Aug 24 00:03:52 ca-18-ede1 sshd[5616]: Failed password for invalid user sistema from 121.204.153.151 port 54874 ssh2
Aug 24 00:17:21 ca-18-ede1 sshd[7225]: Invalid user zhengnq from 121.204.153.151 port 46766
Aug 24 00:17:23 ca-18-ede1 sshd[7225]: Failed password for invalid user zhengnq from 121.204.153.151 port 46766 ssh2
Aug 24 00:23:32 ca-18-ede1 sshd[7929]: Invalid user ftpwww from 121.204.153.151 port 49828
2020-08-24 09:07:21
162.142.125.17 attack
 TCP (SYN) 162.142.125.17:42279 -> port 80, len 44
2020-08-24 08:40:16
196.223.154.116 attack
Unauthorized connection attempt from IP address 196.223.154.116 on Port 445(SMB)
2020-08-24 08:49:29
220.250.0.252 attackspam
Aug 23 21:46:17 onepixel sshd[3163775]: Invalid user csserver from 220.250.0.252 port 33511
Aug 23 21:46:17 onepixel sshd[3163775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.250.0.252 
Aug 23 21:46:17 onepixel sshd[3163775]: Invalid user csserver from 220.250.0.252 port 33511
Aug 23 21:46:20 onepixel sshd[3163775]: Failed password for invalid user csserver from 220.250.0.252 port 33511 ssh2
Aug 23 21:47:39 onepixel sshd[3164022]: Invalid user oracle from 220.250.0.252 port 41588
2020-08-24 08:59:27
167.71.235.133 attackbots
Lines containing failures of 167.71.235.133 (max 1000)
Aug 18 15:47:42 HOSTNAME sshd[23842]: User r.r from 167.71.235.133 not allowed because not listed in AllowUsers
Aug 18 15:47:42 HOSTNAME sshd[23842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.235.133  user=r.r
Aug 18 15:47:44 HOSTNAME sshd[23842]: Failed password for invalid user r.r from 167.71.235.133 port 34562 ssh2
Aug 18 15:47:44 HOSTNAME sshd[23842]: Received disconnect from 167.71.235.133 port 34562:11: Bye Bye [preauth]
Aug 18 15:47:44 HOSTNAME sshd[23842]: Disconnected from 167.71.235.133 port 34562 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=167.71.235.133
2020-08-24 08:41:56
185.234.218.82 attackbotsspam
Aug 24 01:18:20 web01.agentur-b-2.de postfix/smtpd[4151781]: warning: unknown[185.234.218.82]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 24 01:18:20 web01.agentur-b-2.de postfix/smtpd[4151781]: lost connection after AUTH from unknown[185.234.218.82]
Aug 24 01:23:44 web01.agentur-b-2.de postfix/smtpd[4151232]: warning: unknown[185.234.218.82]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 24 01:23:44 web01.agentur-b-2.de postfix/smtpd[4151232]: lost connection after AUTH from unknown[185.234.218.82]
Aug 24 01:24:09 web01.agentur-b-2.de postfix/smtpd[4150394]: warning: unknown[185.234.218.82]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-08-24 08:50:59
106.250.199.244 attack
Unauthorized connection attempt from IP address 106.250.199.244 on Port 445(SMB)
2020-08-24 09:10:59
178.128.121.137 attack
Aug 23 16:58:47 ny01 sshd[14244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.121.137
Aug 23 16:58:49 ny01 sshd[14244]: Failed password for invalid user zzk from 178.128.121.137 port 46622 ssh2
Aug 23 17:02:50 ny01 sshd[14753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.121.137
2020-08-24 09:11:32
62.80.178.74 attackbotsspam
SSH brute force
2020-08-24 09:13:56
54.36.162.121 attack
prod8
...
2020-08-24 09:11:58
85.209.0.252 attackbots
Scanned 13 times in the last 24 hours on port 22
2020-08-24 08:38:21
45.129.33.5 attackspam
ET DROP Dshield Block Listed Source group 1 - port: 5103 proto: tcp cat: Misc Attackbytes: 60
2020-08-24 09:16:29
117.48.227.152 attackbotsspam
Aug 24 02:46:10 server sshd[14658]: Failed password for invalid user serena from 117.48.227.152 port 37840 ssh2
Aug 24 02:46:43 server sshd[14882]: Failed password for root from 117.48.227.152 port 43862 ssh2
Aug 24 02:47:24 server sshd[15238]: Failed password for invalid user plex from 117.48.227.152 port 49886 ssh2
2020-08-24 09:02:15
93.80.27.138 attackbots
Unauthorized connection attempt from IP address 93.80.27.138 on Port 445(SMB)
2020-08-24 09:06:27

最近上报的IP列表

138.68.45.44 192.241.159.109 159.65.217.21 216.180.246.165
204.48.23.79 159.65.223.227 157.245.240.222 27.46.125.162
165.227.90.199 1.12.229.45 180.153.236.169 103.17.242.173
151.242.152.180 91.230.168.89 91.230.168.215 47.92.222.82
185.247.137.103 211.121.247.232 116.76.38.223 217.154.69.208