必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): St. Louis

省份(region): Missouri

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '94.72.112.0 - 94.72.127.255'

% Abuse contact for '94.72.112.0 - 94.72.127.255' is 'abuse@contabo.de'

inetnum:        94.72.112.0 - 94.72.127.255
netname:        TT-20240214
descr:          Contabo GmbH
country:        DE
org:            ORG-CG316-RIPE
admin-c:        MH7476-RIPE
tech-c:         MH7476-RIPE
abuse-c:        MH12453-RIPE
status:         ASSIGNED PA
mnt-by:         MNT-CONTABO
created:        2024-02-14T12:37:11Z
last-modified:  2024-02-16T11:58:27Z
source:         RIPE

organisation:   ORG-CG316-RIPE
org-name:       Contabo GmbH
org-type:       other
remarks:        * Please direct all complaints about Internet abuse like Spam, hacking or scans *
remarks:        * to abuse@contabo.de . This will guarantee fastest processing possible. *
address:        Welfenstrasse 22
address:        81541
address:        Munchen
address:        GERMANY
phone:          +498921268372
fax-no:         +498921665862
abuse-c:        MH12453-RIPE
mnt-ref:        MNT-CONTABO
mnt-ref:        de-net1-1-mnt
mnt-by:         MNT-CONTABO
mnt-ref:        TERRATRANSIT-MNT
mnt-by:         TERRATRANSIT-MNT
mnt-by:         de-net1-1-mnt
mnt-ref:        de-tt1data-1-mnt
created:        2021-11-09T22:12:54Z
last-modified:  2025-11-26T16:26:17Z
source:         RIPE # Filtered

person:         Johannes Selg
address:        Contabo GmbH
address:        Welfenstr. 22
address:        81541 Mnchen
phone:          +49 89 21268372
fax-no:         +49 89 21665862
nic-hdl:        MH7476-RIPE
mnt-by:         MNT-CONTABO
mnt-by:         MNT-GIGA-HOSTING
created:        2010-01-04T10:41:37Z
last-modified:  2025-12-05T12:12:21Z
source:         RIPE

% Information related to '94.72.112.0/21AS40021'

route:          94.72.112.0/21
origin:         AS40021
mnt-by:         MNT-CONTABO
created:        2024-02-16T12:01:28Z
last-modified:  2024-02-16T12:01:28Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.72.114.183
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9211
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.72.114.183.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041001 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 11 12:00:36 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
183.114.72.94.in-addr.arpa domain name pointer vmi2706879.contaboserver.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
183.114.72.94.in-addr.arpa	name = vmi2706879.contaboserver.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
137.74.80.36 attackbots
2019-11-13T17:20:50.760384abusebot-2.cloudsearch.cf sshd\[1052\]: Invalid user miyagaki from 137.74.80.36 port 38634
2019-11-14 03:29:56
100.32.176.179 attack
Automatic report - Port Scan Attack
2019-11-14 03:30:42
168.205.179.108 attackspambots
Unauthorized connection attempt from IP address 168.205.179.108 on Port 445(SMB)
2019-11-14 03:00:40
106.208.140.252 attackspambots
Unauthorized connection attempt from IP address 106.208.140.252 on Port 445(SMB)
2019-11-14 03:02:03
111.242.25.96 attackspambots
scan z
2019-11-14 03:39:44
1.55.164.104 attackspam
Unauthorized connection attempt from IP address 1.55.164.104 on Port 445(SMB)
2019-11-14 03:35:33
218.248.5.2 attackspam
Unauthorized connection attempt from IP address 218.248.5.2 on Port 445(SMB)
2019-11-14 03:22:25
190.216.245.177 attackspambots
Unauthorized connection attempt from IP address 190.216.245.177 on Port 445(SMB)
2019-11-14 03:12:27
190.186.19.162 attackspam
Nov 13 13:45:45 mecmail postfix/smtpd[27129]: NOQUEUE: reject: RCPT from static-ip-adsl-190.186.19.162.cotas.com.bo[190.186.19.162]: 554 5.7.1 : Relay access denied; from= to= proto=ESMTP helo=
Nov 13 13:46:11 mecmail postfix/smtpd[611]: NOQUEUE: reject: RCPT from static-ip-adsl-190.186.19.162.cotas.com.bo[190.186.19.162]: 554 5.7.1 : Relay access denied; from= to= proto=ESMTP helo=
Nov 13 13:46:30 mecmail postfix/smtpd[611]: NOQUEUE: reject: RCPT from static-ip-adsl-190.186.19.162.cotas.com.bo[190.186.19.162]: 554 5.7.1 : Relay access denied; from= to= proto=ESMTP helo=
Nov 13 13:46:43 mecmail postfix/smtpd[324
...
2019-11-14 03:00:59
196.52.43.65 attack
3389BruteforceFW21
2019-11-14 03:24:20
41.175.151.62 attackspam
Unauthorized connection attempt from IP address 41.175.151.62 on Port 445(SMB)
2019-11-14 03:37:08
201.47.217.98 attack
Unauthorized connection attempt from IP address 201.47.217.98 on Port 445(SMB)
2019-11-14 03:02:55
51.38.238.22 attackspam
Nov 13 18:29:21 OPSO sshd\[8204\]: Invalid user desa from 51.38.238.22 port 43600
Nov 13 18:29:21 OPSO sshd\[8204\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.238.22
Nov 13 18:29:23 OPSO sshd\[8204\]: Failed password for invalid user desa from 51.38.238.22 port 43600 ssh2
Nov 13 18:32:56 OPSO sshd\[9040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.238.22  user=root
Nov 13 18:32:58 OPSO sshd\[9040\]: Failed password for root from 51.38.238.22 port 52368 ssh2
2019-11-14 03:25:06
123.234.219.226 attackspam
2019-11-13T13:29:10.3762691495-001 sshd\[55881\]: Invalid user git from 123.234.219.226 port 55026
2019-11-13T13:29:10.3835461495-001 sshd\[55881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.234.219.226
2019-11-13T13:29:11.9698811495-001 sshd\[55881\]: Failed password for invalid user git from 123.234.219.226 port 55026 ssh2
2019-11-13T13:33:41.4092901495-001 sshd\[56039\]: Invalid user postgres from 123.234.219.226 port 18107
2019-11-13T13:33:41.4125641495-001 sshd\[56039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.234.219.226
2019-11-13T13:33:43.2039651495-001 sshd\[56039\]: Failed password for invalid user postgres from 123.234.219.226 port 18107 ssh2
...
2019-11-14 03:21:41
78.188.235.66 attack
Unauthorized connection attempt from IP address 78.188.235.66 on Port 445(SMB)
2019-11-14 03:08:10

最近上报的IP列表

2606:4700:10::6814:7643 2606:4700:10::6814:9048 2606:4700:10::6814:7053 2606:4700:10::6816:2819
2606:4700:10::6816:4351 2606:4700:10::6814:5316 2606:4700:10::6814:4810 2606:4700:10::ac43:1754
2606:4700:10::6814:7253 2606:4700:10::6816:2113 2606:4700:10::6816:1731 2606:4700:10::6816:3605
121.8.28.43 2606:4700:10::6814:5303 106.54.223.106 172.105.152.245
146.148.122.35 121.237.149.190 134.35.157.55 2606:4700:10::ac43:152e