必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Si Sa Ket

省份(region): Si Sa Ket

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '1.1.192.0 - 1.1.255.255'

% Abuse contact for '1.1.192.0 - 1.1.255.255' is 'abuse@totisp.net'

inetnum:        1.1.192.0 - 1.1.255.255
netname:        TOTNET
descr:          Dynamic IP Address for residential Broadband Customers
country:        TH
admin-c:        AG100-AP
tech-c:         AG100-AP
abuse-c:        AT950-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-TH-TOT
mnt-lower:      MAINT-TH-TOT
mnt-routes:     MAINT-TH-TOT
mnt-routes:     MAINT-TH-TOT-ISP
mnt-irt:        IRT-TOT-TH
last-modified:  2021-01-27T13:26:42Z
source:         APNIC

irt:            IRT-TOT-TH
address:        TOT Public Company Limited
address:        89/2 Moo 3 Chaengwattana Rd, Laksi,Bangkok 10210 THAILAND
e-mail:         apipolg@nt.ntplc.co.th
abuse-mailbox:  abuse@totisp.net
admin-c:        ira3-ap
tech-c:         ira3-ap
auth:           # Filtered
remarks:        apipolg@nt.ntplc.co.th was validated on 2025-11-17
remarks:        abuse@totisp.net was validated on 2026-01-22
mnt-by:         MAINT-TH-TOT
last-modified:  2026-01-22T04:00:58Z
source:         APNIC

role:           ABUSE TOTTH
country:        ZZ
address:        TOT Public Company Limited
address:        89/2 Moo 3 Chaengwattana Rd, Laksi,Bangkok 10210 THAILAND
phone:          +000000000
e-mail:         apipolg@nt.ntplc.co.th
admin-c:        ira3-ap
tech-c:         ira3-ap
nic-hdl:        AT950-AP
remarks:        Generated from irt object IRT-TOT-TH
remarks:        apipolg@nt.ntplc.co.th was validated on 2025-11-17
remarks:        abuse@totisp.net was validated on 2026-01-22
abuse-mailbox:  abuse@totisp.net
mnt-by:         APNIC-ABUSE
last-modified:  2026-01-22T04:01:40Z
source:         APNIC

person:         Apipol Gunabhibal
nic-hdl:        AG100-AP
e-mail:         abuse@totidc.net
address:        TOT Public Company Limited
address:        89/2 Moo 3 Chaengwattana Rd, Laksi, Bangkok 10210 THAILAND
phone:          +66-2574-9178
country:        TH
mnt-by:         MAINT-TH-TOT
last-modified:  2022-08-29T04:23:40Z
source:         APNIC

% Information related to '1.1.223.0/24AS23969'

route:          1.1.223.0/24
origin:         AS23969
descr:          TOT Public Company Limited
                National Telecom Public Company Limited
                Chaengwattana Office
                89/2 Chaengwatthana Road
                Thoongsonghong
mnt-by:         MAINT-TH-TOT
last-modified:  2025-12-09T07:20:29Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.1.223.180
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43931
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.1.223.180.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026021802 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 19 11:00:37 CST 2026
;; MSG SIZE  rcvd: 104
HOST信息:
180.223.1.1.in-addr.arpa domain name pointer node-iwk.pool-1-1.dynamic.nt-isp.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
180.223.1.1.in-addr.arpa	name = node-iwk.pool-1-1.dynamic.nt-isp.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
182.61.175.36 attackspam
Jun 13 06:42:53 web8 sshd\[13896\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.175.36  user=root
Jun 13 06:42:56 web8 sshd\[13896\]: Failed password for root from 182.61.175.36 port 49222 ssh2
Jun 13 06:46:45 web8 sshd\[15832\]: Invalid user help from 182.61.175.36
Jun 13 06:46:45 web8 sshd\[15832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.175.36
Jun 13 06:46:46 web8 sshd\[15832\]: Failed password for invalid user help from 182.61.175.36 port 51878 ssh2
2020-06-13 16:09:40
131.100.47.32 attack
Automatic report - Banned IP Access
2020-06-13 16:32:30
103.130.60.3 attackbots
port scan and connect, tcp 8080 (http-proxy)
2020-06-13 16:37:10
177.184.69.253 attack
 TCP (SYN) 177.184.69.253:29442 -> port 8080, len 44
2020-06-13 16:02:10
51.38.189.138 attack
$f2bV_matches
2020-06-13 16:40:15
139.199.228.154 attack
$f2bV_matches
2020-06-13 16:16:57
210.97.40.34 attackbotsspam
Invalid user jc2server from 210.97.40.34 port 52382
2020-06-13 16:36:12
213.183.101.89 attackspam
Jun 12 19:46:46 wbs sshd\[10545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=npk-intro.net.tomline.ru  user=root
Jun 12 19:46:48 wbs sshd\[10545\]: Failed password for root from 213.183.101.89 port 34760 ssh2
Jun 12 19:49:36 wbs sshd\[10743\]: Invalid user srv from 213.183.101.89
Jun 12 19:49:36 wbs sshd\[10743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=npk-intro.net.tomline.ru
Jun 12 19:49:37 wbs sshd\[10743\]: Failed password for invalid user srv from 213.183.101.89 port 51912 ssh2
2020-06-13 16:16:13
37.59.48.181 attackspam
Jun 13 08:57:27 home sshd[11265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.48.181
Jun 13 08:57:29 home sshd[11265]: Failed password for invalid user valerie from 37.59.48.181 port 59912 ssh2
Jun 13 09:00:43 home sshd[11668]: Failed password for root from 37.59.48.181 port 35848 ssh2
...
2020-06-13 16:02:54
139.198.121.63 attackspambots
Invalid user niao from 139.198.121.63 port 52731
2020-06-13 16:38:46
49.235.244.115 attackspam
$f2bV_matches
2020-06-13 16:30:51
120.27.98.166 attack
Jun 13 07:06:39 lukav-desktop sshd\[10488\]: Invalid user cpanelrrdtool from 120.27.98.166
Jun 13 07:06:39 lukav-desktop sshd\[10488\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.27.98.166
Jun 13 07:06:41 lukav-desktop sshd\[10488\]: Failed password for invalid user cpanelrrdtool from 120.27.98.166 port 49454 ssh2
Jun 13 07:07:55 lukav-desktop sshd\[29307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.27.98.166  user=root
Jun 13 07:07:57 lukav-desktop sshd\[29307\]: Failed password for root from 120.27.98.166 port 62086 ssh2
2020-06-13 16:06:14
122.51.234.86 attackspam
Invalid user reseauchat from 122.51.234.86 port 54860
2020-06-13 16:25:38
101.89.150.171 attackbotsspam
Invalid user test from 101.89.150.171 port 35416
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.150.171
Failed password for invalid user test from 101.89.150.171 port 35416 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.150.171  user=root
Failed password for root from 101.89.150.171 port 42872 ssh2
2020-06-13 16:35:37
114.24.132.50 attack
Port Scan detected!
...
2020-06-13 16:05:50

最近上报的IP列表

35.215.116.130 45.156.129.127 45.156.129.126 52.167.144.212
101.67.49.53 39.171.169.69 193.37.32.151 14.212.61.1
180.153.236.152 57.129.81.224 20.168.120.251 20.111.62.157
45.156.129.88 74.222.3.103 1.1.223.204 172.236.30.166
223.160.123.22 43.110.36.191 3.148.197.255 61.239.240.254