必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Lithuania

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '89.124.8.0 - 89.124.11.255'

% Abuse contact for '89.124.8.0 - 89.124.11.255' is 'abuse.lt@delska.com'

inetnum:        89.124.8.0 - 89.124.11.255
netname:        LT-DLC-20060308
country:        LT
org:            ORG-DLCL1-RIPE
admin-c:        DS19492-RIPE
tech-c:         DS19492-RIPE
status:         ALLOCATED PA
mnt-by:         MNT-DATALOGISTICS
mnt-by:         RIPE-NCC-HM-MNT
created:        2025-10-31T13:58:47Z
last-modified:  2025-10-31T13:58:47Z
source:         RIPE

organisation:   ORG-DLCL1-RIPE
org-name:       UAB Delska Lithuania
country:        LT
org-type:       LIR
address:        A. Juozapaviciaus 13
address:        LT-09311
address:        Vilnius
address:        LITHUANIA
phone:          +37061827222
phone:          +37061844445
abuse-c:        AC28029-RIPE
mnt-ref:        RIPE-NCC-HM-MNT
mnt-ref:        MNT-DATALOGISTICS
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         MNT-DATALOGISTICS
created:        2014-12-17T15:05:21Z
last-modified:  2025-12-02T12:25:50Z
source:         RIPE # Filtered

person:         Donatas Sinickas
address:        Delska Lithuania UAB
address:        A. Juozapaviciaus 13, Vilnius, Lithuania
phone:          +370 6184 4445
nic-hdl:        DS19492-RIPE
mnt-by:         MNT-DATALOGISTICS
created:        2016-11-02T14:15:23Z
last-modified:  2025-10-30T14:10:21Z
source:         RIPE # Filtered

% Information related to '89.124.8.0/24AS201201'

route:          89.124.8.0/24
origin:         AS201201
mnt-by:         MNT-DATALOGISTICS
created:        2025-11-06T12:49:19Z
last-modified:  2025-11-06T12:49:19Z
source:         RIPE

% Information related to '89.124.8.0/24AS215373'

route:          89.124.8.0/24
origin:         AS215373
mnt-by:         MNT-DATALOGISTICS
created:        2025-11-07T17:47:06Z
last-modified:  2025-11-07T17:47:06Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.124.8.33
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19481
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;89.124.8.33.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041201 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 13 13:38:16 CST 2026
;; MSG SIZE  rcvd: 104
HOST信息:
Host 33.8.124.89.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 33.8.124.89.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.249.48.21 attackbots
Aug 19 21:56:52 * sshd[22647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.249.48.21
Aug 19 21:56:55 * sshd[22647]: Failed password for invalid user sway from 45.249.48.21 port 42940 ssh2
2019-08-20 06:33:19
92.63.194.26 attackspam
Invalid user admin from 92.63.194.26 port 38558
2019-08-20 06:07:04
185.234.219.85 attackbotsspam
*Port Scan* detected from 185.234.219.85 (IE/Ireland/-). 4 hits in the last 215 seconds
2019-08-20 06:17:55
148.70.45.134 attack
Aug 20 00:08:00 vps691689 sshd[4189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.45.134
Aug 20 00:08:02 vps691689 sshd[4189]: Failed password for invalid user uda from 148.70.45.134 port 41986 ssh2
...
2019-08-20 06:14:58
188.166.158.33 attack
Aug 20 00:26:23 arianus sshd\[20585\]: Invalid user webmaster from 188.166.158.33 port 33840
...
2019-08-20 06:32:36
115.84.112.98 attack
Aug 19 12:00:48 hcbb sshd\[11978\]: Invalid user oracle from 115.84.112.98
Aug 19 12:00:48 hcbb sshd\[11978\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ftth.laotel.com
Aug 19 12:00:50 hcbb sshd\[11978\]: Failed password for invalid user oracle from 115.84.112.98 port 57912 ssh2
Aug 19 12:05:38 hcbb sshd\[12403\]: Invalid user photon from 115.84.112.98
Aug 19 12:05:38 hcbb sshd\[12403\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ftth.laotel.com
2019-08-20 06:19:02
117.196.229.58 attack
fail2ban honeypot
2019-08-20 06:33:03
159.65.149.131 attack
2019-08-20T05:32:22.530652enmeeting.mahidol.ac.th sshd\[3860\]: Invalid user oracle4 from 159.65.149.131 port 58803
2019-08-20T05:32:22.548031enmeeting.mahidol.ac.th sshd\[3860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.149.131
2019-08-20T05:32:24.189966enmeeting.mahidol.ac.th sshd\[3860\]: Failed password for invalid user oracle4 from 159.65.149.131 port 58803 ssh2
...
2019-08-20 06:35:24
51.77.133.83 attackbotsspam
8083/tcp 8083/tcp
[2019-08-19]2pkt
2019-08-20 06:36:00
106.75.126.42 attackbots
Aug 18 21:00:35 mail sshd[21994]: Invalid user didi from 106.75.126.42
Aug 18 21:00:35 mail sshd[21994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.126.42
Aug 18 21:00:35 mail sshd[21994]: Invalid user didi from 106.75.126.42
Aug 18 21:00:37 mail sshd[21994]: Failed password for invalid user didi from 106.75.126.42 port 58434 ssh2
Aug 18 21:15:04 mail sshd[2092]: Invalid user mopas from 106.75.126.42
...
2019-08-20 06:36:38
119.29.53.107 attackspam
Aug 19 19:56:25 MK-Soft-VM5 sshd\[19589\]: Invalid user protocol from 119.29.53.107 port 48456
Aug 19 19:56:25 MK-Soft-VM5 sshd\[19589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.53.107
Aug 19 19:56:27 MK-Soft-VM5 sshd\[19589\]: Failed password for invalid user protocol from 119.29.53.107 port 48456 ssh2
...
2019-08-20 06:26:49
106.13.98.202 attackspam
Aug 20 00:26:11 mout sshd[26237]: Invalid user wartex from 106.13.98.202 port 46318
2019-08-20 06:38:18
45.230.80.11 attackspambots
SMTP-sasl brute force
...
2019-08-20 06:04:26
196.216.206.2 attackspambots
Invalid user mqm from 196.216.206.2 port 41170
2019-08-20 06:12:43
196.52.43.99 attackspam
Portscan or hack attempt detected by psad/fwsnort
2019-08-20 06:24:17

最近上报的IP列表

85.217.149.24 168.143.104.245 211.95.64.140 92.41.9.27
53.20.112.184 87.244.136.131 110.77.226.46 2606:4700:10::6814:5432
110.78.153.117 2606:4700:10::ac43:2318 2606:4700:10::6814:6794 2606:4700:10::ac43:2394
6.104.232.210 185.23.46.40 208.80.248.225 54.105.246.56
91.65.186.135 31.77.102.54 2606:4700:10::ac43:2019 2606:4700:10::6814:7032