必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Kourou

省份(region): unknown

国家(country): French Guiana

运营商(isp): Orange

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '92.142.8.0 - 92.142.15.255'

% Abuse contact for '92.142.8.0 - 92.142.15.255' is 'gestionip.ft@orange.com'

inetnum:        92.142.8.0 - 92.142.15.255
netname:        IP2000-ADSL-BAS
descr:          POP CAY
country:        GF
admin-c:        WITR1-RIPE
tech-c:         WITR1-RIPE
status:         ASSIGNED PA
remarks:        for hacking, spamming or security problems send mail to
remarks:        abuse@orange.fr
mnt-by:         FT-BRX
created:        2018-11-16T09:19:24Z
last-modified:  2018-11-16T09:56:53Z
source:         RIPE

role:           Wanadoo France Technical Role
address:        FRANCE TELECOM/SCR
address:        48 rue Camille Desmoulins
address:        92791 ISSY LES MOULINEAUX CEDEX 9
address:        FR
phone:          +33 1 58 88 50 00
abuse-mailbox:  abuse@orange.fr
admin-c:        BRX1-RIPE
tech-c:         BRX1-RIPE
nic-hdl:        WITR1-RIPE
mnt-by:         FT-BRX
created:        2001-12-04T17:57:08Z
last-modified:  2013-07-16T14:09:50Z
source:         RIPE # Filtered

% Information related to '92.142.0.0/16AS3215'

route:          92.142.0.0/16
descr:          France Telecom Orange
origin:         AS3215
mnt-by:         RAIN-TRANSPAC
mnt-by:         FT-BRX
created:        2012-11-22T09:05:40Z
last-modified:  2012-11-22T09:05:40Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 92.142.11.188
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2418
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;92.142.11.188.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042601 1800 900 604800 86400

;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 27 13:30:49 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
188.11.142.92.in-addr.arpa domain name pointer lfbn-cay-1-14-188.w92-142.abo.wanadoo.fr.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
188.11.142.92.in-addr.arpa	name = lfbn-cay-1-14-188.w92-142.abo.wanadoo.fr.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.254.49.98 attack
[portscan] tcp/143 [IMAP]
*(RWIN=5840)(11031035)
2019-11-03 16:39:48
40.78.82.103 attack
Nov  3 05:00:37 firewall sshd[26564]: Invalid user yl200899325 from 40.78.82.103
Nov  3 05:00:40 firewall sshd[26564]: Failed password for invalid user yl200899325 from 40.78.82.103 port 36864 ssh2
Nov  3 05:05:14 firewall sshd[26631]: Invalid user ZHUGE1478 from 40.78.82.103
...
2019-11-03 16:11:22
129.204.52.150 attackspam
$f2bV_matches
2019-11-03 16:30:50
222.186.175.217 attack
2019-11-03T08:28:27.284992abusebot-5.cloudsearch.cf sshd\[1087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.217  user=root
2019-11-03 16:33:23
111.231.226.12 attackspam
Nov  3 06:53:01 zooi sshd[29906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.226.12
Nov  3 06:53:03 zooi sshd[29906]: Failed password for invalid user default from 111.231.226.12 port 34760 ssh2
...
2019-11-03 16:20:09
222.186.175.216 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216  user=root
Failed password for root from 222.186.175.216 port 10854 ssh2
Failed password for root from 222.186.175.216 port 10854 ssh2
Failed password for root from 222.186.175.216 port 10854 ssh2
Failed password for root from 222.186.175.216 port 10854 ssh2
2019-11-03 16:40:26
200.29.143.125 attackbotsspam
1433/tcp 445/tcp...
[2019-09-13/11-03]5pkt,2pt.(tcp)
2019-11-03 16:21:46
51.79.70.223 attack
2019-11-03T08:34:50.976686host3.slimhost.com.ua sshd[4057024]: Failed password for bin from 51.79.70.223 port 56300 ssh2
2019-11-03T08:38:47.237723host3.slimhost.com.ua sshd[4059781]: Invalid user service from 51.79.70.223 port 39098
2019-11-03T08:38:47.242423host3.slimhost.com.ua sshd[4059781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=elite-tracker.com
2019-11-03T08:38:47.237723host3.slimhost.com.ua sshd[4059781]: Invalid user service from 51.79.70.223 port 39098
2019-11-03T08:38:49.500611host3.slimhost.com.ua sshd[4059781]: Failed password for invalid user service from 51.79.70.223 port 39098 ssh2
...
2019-11-03 16:06:35
111.231.144.219 attack
Automatic report - Banned IP Access
2019-11-03 16:35:17
114.74.100.236 attackspam
23/tcp 23/tcp
[2019-11-01/02]2pkt
2019-11-03 16:30:19
92.118.37.88 attackspambots
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-11-03 16:09:26
89.248.160.193 attack
11/03/2019-02:53:35.769921 89.248.160.193 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 97
2019-11-03 16:10:55
45.90.32.165 attackspam
$f2bV_matches_ltvn
2019-11-03 16:29:19
116.193.89.47 attackspam
445/tcp 445/tcp 445/tcp
[2019-10-23/11-03]3pkt
2019-11-03 16:02:38
197.28.71.202 attackspambots
Apache Struts Jakarta Multipart Parser Remote Code Execution VulnerabilityCVE-2017-5638, PTR: PTR record not found
2019-11-03 16:12:52

最近上报的IP列表

2606:4700:10::6816:59 18.162.112.93 150.67.140.151 122.193.247.184
2606:4700:10::6816:1303 141.131.1.52 45.239.141.244 24.49.32.101
190.60.36.9 172.1.179.116 223.199.182.20 171.37.191.3
2606:4700:10::ac43:2801 2606:4700:10::6814:9763 2606:4700:10::6816:454d 2606:4700:10::6814:6542
3.90.228.3 2606:4700:10::6816:3868 2606:4700:10::6816:4799 115.78.183.90