必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Ust’-Abakan

省份(region): Khakassia

国家(country): Russia

运营商(isp): +7Telecom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '90.189.122.0 - 90.189.127.255'

% Abuse contact for '90.189.122.0 - 90.189.127.255' is 'abuse@rt.ru'

inetnum:        90.189.122.0 - 90.189.127.255
netname:        WEBSTREAM
descr:          OJSC "Sibirtelecom"
remarks:        Khakassia branch
remarks:        broadband service
country:        RU
remarks:
remarks:        NCC # 2007091972
remarks:        INFRA-AW
remarks:
admin-c:        VAS28-RIPE
tech-c:         VAS28-RIPE
tech-c:         VVP8-RIPE
mnt-by:         ROSTELECOM-MNT
status:         ASSIGNED PA
remarks:
remarks:        Direct reference for the general info on spam
remarks:        In unsoluble cases for the general info on spam,
remarks:        abusing & hacking complaints email abuse@sinor.ru
remarks:
created:        2008-07-21T04:33:09Z
last-modified:  2025-07-02T08:17:42Z
source:         RIPE # Filtered

person:         Vladimir A Sobolev
address:        Sovetsksja st, 45
address:        Abakan, Russia
address:        662600
phone:          + 7 39022 51273
phone:          + 7 39022 01415
nic-hdl:        VAS28-RIPE
created:        1970-01-01T00:00:00Z
last-modified:  2020-06-04T10:25:15Z
source:         RIPE # Filtered
mnt-by:         ROSTELECOM-MNT

person:         Vladimir V. Poludintsev
address:        "ABAKAN INTERNATIONAL TELEPHONE & TELEGRAPH STATION"
address:        Sovetskaya st. # 45
address:        662600 Abakan
address:        Russia
phone:          +7 39022 01445
phone:          +7 39022 51273
nic-hdl:        VVP8-RIPE
created:        1970-01-01T00:00:00Z
last-modified:  2016-04-05T16:00:44Z
mnt-by:         RIPE-NCC-LOCKED-MNT
source:         RIPE # Filtered

% Information related to '90.189.112.0/20AS12389'

route:          90.189.112.0/20
origin:         AS12389
mnt-by:         ROSTELECOM-MNT
created:        2025-06-21T08:58:44Z
last-modified:  2025-06-21T08:58:44Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 90.189.127.61
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51573
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;90.189.127.61.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041900 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 19 21:17:43 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 61.127.189.90.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 61.127.189.90.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.53.168.96 attack
Exploited Host.
2020-07-28 06:16:41
148.72.171.88 attackbots
Trying to unlawfully gain access with request like below, recorded and archived:
148.72.171.88 - -  "GET /login/ HTTP/1.1" 404 459 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows 98)"
2020-07-28 06:38:00
36.91.38.31 attackbots
Invalid user bingo from 36.91.38.31 port 38523
2020-07-28 06:43:02
45.78.43.205 attack
sshd jail - ssh hack attempt
2020-07-28 06:36:27
222.186.15.115 attackbotsspam
Jul 28 00:20:24 abendstille sshd\[7870\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.115  user=root
Jul 28 00:20:26 abendstille sshd\[7870\]: Failed password for root from 222.186.15.115 port 21094 ssh2
Jul 28 00:20:33 abendstille sshd\[7933\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.115  user=root
Jul 28 00:20:35 abendstille sshd\[7933\]: Failed password for root from 222.186.15.115 port 36063 ssh2
Jul 28 00:20:38 abendstille sshd\[7933\]: Failed password for root from 222.186.15.115 port 36063 ssh2
...
2020-07-28 06:30:38
159.65.136.241 attackspambots
Jul 27 21:03:54 XXXXXX sshd[40676]: Invalid user omura from 159.65.136.241 port 42824
2020-07-28 06:49:28
45.173.196.174 attack
20/7/27@16:12:03: FAIL: Alarm-Network address from=45.173.196.174
...
2020-07-28 06:41:01
111.26.172.222 attackbots
(smtpauth) Failed SMTP AUTH login from 111.26.172.222 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-07-28 03:01:46 login authenticator failed for (USER) [111.26.172.222]: 535 Incorrect authentication data (set_id=info@golkaran.co)
2020-07-28 06:39:34
139.155.22.165 attack
Jul 28 03:24:33 gw1 sshd[23170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.22.165
Jul 28 03:24:35 gw1 sshd[23170]: Failed password for invalid user guozp from 139.155.22.165 port 39606 ssh2
...
2020-07-28 06:40:40
122.51.130.21 attack
2020-07-27T22:18:48+0200 Failed SSH Authentication/Brute Force Attack. (Server 5)
2020-07-28 06:16:04
178.32.205.2 attack
Jul 27 19:16:12 vps46666688 sshd[3211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.205.2
Jul 27 19:16:14 vps46666688 sshd[3211]: Failed password for invalid user fengqinlin from 178.32.205.2 port 57554 ssh2
...
2020-07-28 06:49:13
118.194.132.112 attack
Automatic report BANNED IP
2020-07-28 06:24:10
195.97.75.174 attackspam
2020-07-27 23:29:34,234 fail2ban.actions: WARNING [ssh] Ban 195.97.75.174
2020-07-28 06:21:08
122.51.17.106 attackspambots
Jul 27 23:53:53 OPSO sshd\[4868\]: Invalid user zxd from 122.51.17.106 port 43190
Jul 27 23:53:53 OPSO sshd\[4868\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.17.106
Jul 27 23:53:55 OPSO sshd\[4868\]: Failed password for invalid user zxd from 122.51.17.106 port 43190 ssh2
Jul 27 23:58:20 OPSO sshd\[6328\]: Invalid user hefeng from 122.51.17.106 port 38444
Jul 27 23:58:20 OPSO sshd\[6328\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.17.106
2020-07-28 06:26:39
37.187.21.81 attackbotsspam
Jul 27 23:17:41 vpn01 sshd[11021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.21.81
Jul 27 23:17:42 vpn01 sshd[11021]: Failed password for invalid user zp from 37.187.21.81 port 57973 ssh2
...
2020-07-28 06:12:12

最近上报的IP列表

2606:4700:10::6816:1389 35.233.21.145 176.65.139.50 122.193.247.193
2606:4700:10::6816:967 2606:4700:10::6814:4528 2606:4700:10::6816:262 2606:4700:10::ac43:1395
2606:4700:10::ac43:2731 2606:4700:10::6814:8192 2606:4700:10::6816:4558 2606:4700:10::6814:8303
216.73.217.140 20.115.45.115 110.77.248.191 2606:4700:10::6814:5828
2606:4700:10::6816:1433 2606:4700:10::ac43:1772 2606:4700:10::ac43:2814 216.36.83.123