必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Huelva

省份(region): Comunidad Autónoma de Andalucía

国家(country): Spain

运营商(isp): Vodafone

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '85.137.48.0 - 85.137.48.255'

% Abuse contact for '85.137.48.0 - 85.137.48.255' is 'abuse-ams@v-sys.org'

inetnum:        85.137.48.0 - 85.137.48.255
netname:        VSYS-AMS
country:        NL
admin-c:        VS10657-RIPE
tech-c:         VSAA1-RIPE
abuse-c:        VSAA1-RIPE
geofeed:        https://vsys.host/geofeed.csv
status:         SUB-ALLOCATED PA
created:        2026-03-06T15:36:21Z
last-modified:  2026-03-06T15:36:21Z
source:         RIPE
mnt-by:         VSYS-MNT

role:           Virtual Systems Amsterdam Abuse Department
address:        Amsterdaam, The Netherlands
address:        Haarlem, Lucasweg 35
abuse-mailbox:  abuse-ams@v-sys.org
nic-hdl:        VSAA1-RIPE
mnt-by:         VSYS-MNT
created:        2023-12-22T10:16:19Z
last-modified:  2023-12-22T10:48:55Z
source:         RIPE # Filtered

person:         Vyacheslav Smyrnov
address:        Laboratorna 33/37
address:        03150
address:        Kiyv
address:        UKRAINE
phone:          +380981968199
nic-hdl:        VS10657-RIPE
mnt-by:         VSYS-MNT
created:        2019-01-23T14:51:44Z
last-modified:  2020-12-24T12:00:56Z
source:         RIPE

% Information related to '85.137.48.0/24AS43641'

route:          85.137.48.0/24
origin:         AS43641
created:        2026-03-06T15:36:47Z
last-modified:  2026-03-06T15:36:47Z
source:         RIPE
mnt-by:         VSYS-MNT

% This query was served by the RIPE Database Query Service version 1.121 (SHETLAND)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.137.48.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54973
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.137.48.194.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031401 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 15 04:00:06 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
194.48.137.85.in-addr.arpa domain name pointer dedicated.vsys.host.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
194.48.137.85.in-addr.arpa	name = dedicated.vsys.host.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.100.209.174 attackbotsspam
Unauthorized connection attempt detected from IP address 103.100.209.174 to port 2220 [J]
2020-01-28 20:24:42
5.63.15.176 attackbots
unauthorized connection attempt
2020-01-28 20:28:24
183.82.251.48 attackspam
unauthorized connection attempt
2020-01-28 20:20:58
125.26.176.99 attackbotsspam
unauthorized connection attempt
2020-01-28 21:02:54
220.130.215.200 attackbotsspam
unauthorized connection attempt
2020-01-28 20:51:53
89.250.223.138 attackbotsspam
unauthorized connection attempt
2020-01-28 20:57:39
183.131.83.207 attackspambots
unauthorized connection attempt
2020-01-28 20:41:06
186.232.176.50 attackbots
unauthorized connection attempt
2020-01-28 20:52:57
39.189.32.119 attackbots
unauthorized connection attempt
2020-01-28 20:59:13
177.125.115.204 attackbotsspam
unauthorized connection attempt
2020-01-28 21:07:46
183.131.184.14 attackspambots
unauthorized connection attempt
2020-01-28 20:40:30
222.186.52.86 attackbotsspam
Jan 28 07:15:50 ny01 sshd[31592]: Failed password for root from 222.186.52.86 port 24970 ssh2
Jan 28 07:17:03 ny01 sshd[31683]: Failed password for root from 222.186.52.86 port 32075 ssh2
2020-01-28 20:29:30
2.184.221.181 attackbots
Unauthorized connection attempt detected from IP address 2.184.221.181 to port 80 [J]
2020-01-28 21:00:40
45.5.202.231 attackbotsspam
unauthorized connection attempt
2020-01-28 20:26:18
122.116.112.194 attackbotsspam
Unauthorized connection attempt detected from IP address 122.116.112.194 to port 23 [J]
2020-01-28 20:46:42

最近上报的IP列表

121.63.130.51 111.230.213.46 87.106.91.226 58.212.237.253
180.153.236.71 180.153.236.104 124.117.193.63 58.19.107.14
46.35.171.233 123.178.210.99 85.217.149.40 54.160.155.146
3.89.218.222 18.206.252.118 107.20.126.125 20.65.219.131
36.21.235.11 116.77.75.251 37.27.132.170 14.212.92.97