必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Kota Kinabalu

省份(region): Sabah

国家(country): Malaysia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '1.9.0.0 - 1.9.255.255'

% Abuse contact for '1.9.0.0 - 1.9.255.255' is 'abuse@tm.com.my'

inetnum:        1.9.0.0 - 1.9.255.255
netname:        TTSSB-MY
descr:          TM TECHNOLOGY SERVICES SDN. BHD.
descr:          Internet Service Provider
descr:          Kuala Lumpur, Malaysia
country:        MY
org:            ORG-WDSB1-AP
admin-c:        ICO1-AP
tech-c:         ICO1-AP
abuse-c:        AM2355-AP
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
status:         ALLOCATED PORTABLE
mnt-by:         APNIC-HM
mnt-lower:      MAINT-MY-WEBE
mnt-routes:     MAINT-MY-WEBE
mnt-irt:        IRT-MY-WEBE
last-modified:  2023-06-30T00:01:26Z
source:         APNIC

irt:            IRT-MY-WEBE
address:        Menara TM, Jalan Pantai Baharu,
address:        59100 Kuala Lumpur, Wilayah Persekutuan Kuala Lumpur
address:        Malaysia
phone:          +601110001000
e-mail:         abuse@tm.com.my
abuse-mailbox:  abuse@tm.com.my
admin-c:        ICO1-AP
tech-c:         ICO1-AP
auth:           # Filtered
remarks:        TM AS4788 had recently installed RPKI validator and will be dropping the ????????????Invalid???????????? route by November 2023. Please update your ROA accordingly.
remarks:        abuse@tm.com.my was validated on 2025-12-17
mnt-by:         MAINT-MY-WEBE
last-modified:  2026-01-08T02:19:24Z
source:         APNIC

organisation:   ORG-WDSB1-AP
org-name:       TM TECHNOLOGY SERVICES SDN BHD
org-type:       LIR
country:        MY
address:        Level 49 South Wing, Menara TM
phone:          +6013-3128147
fax-no:         +603-89963711
e-mail:         iptac@tm.com.my
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2024-07-16T12:57:21Z
source:         APNIC

role:           ABUSE MYWEBE
country:        ZZ
address:        Menara TM, Jalan Pantai Baharu,
address:        59100 Kuala Lumpur, Wilayah Persekutuan Kuala Lumpur
address:        Malaysia
phone:          +601110001000
e-mail:         abuse@tm.com.my
admin-c:        ICO1-AP
tech-c:         ICO1-AP
nic-hdl:        AM2355-AP
remarks:        Generated from irt object IRT-MY-WEBE
remarks:        abuse@tm.com.my was validated on 2025-12-17
abuse-mailbox:  abuse@tm.com.my
mnt-by:         APNIC-ABUSE
last-modified:  2025-12-17T13:15:33Z
source:         APNIC

role:           IP Core Operation
address:        TM NIC, Cyberjaya, 63000 Cyberjaya, Selangor
country:        MY
phone:          +603-74508888
e-mail:         iptac@tm.com.my
admin-c:        ICO1-AP
tech-c:         ICO1-AP
nic-hdl:        ICO1-AP
mnt-by:         MAINT-MY-WEBE
last-modified:  2026-02-25T07:15:04Z
source:         APNIC

% Information related to '1.9.206.0/24AS4788'

route:          1.9.206.0/24
origin:         AS4788
descr:          Tmnet, Telekom Malaysia Bhd.
                Telekom Malaysia Berhad
                44th Floor, Global Data Marketing, TM Global
                Jalan Pantai Baharu
mnt-by:         MAINT-MY-WEBE
last-modified:  2023-07-01T06:29:20Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.9.206.253
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64712
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.9.206.253.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026022802 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 01 02:07:09 CST 2026
;; MSG SIZE  rcvd: 104
HOST信息:
Host 253.206.9.1.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 253.206.9.1.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.12.82.70 attackbotsspam
Automatic report - Banned IP Access
2019-12-24 19:19:28
157.230.226.7 attackbotsspam
Dec 24 11:28:34 localhost sshd\[102085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.226.7  user=root
Dec 24 11:28:36 localhost sshd\[102085\]: Failed password for root from 157.230.226.7 port 51004 ssh2
Dec 24 11:30:44 localhost sshd\[102164\]: Invalid user wolf from 157.230.226.7 port 45366
Dec 24 11:30:44 localhost sshd\[102164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.226.7
Dec 24 11:30:46 localhost sshd\[102164\]: Failed password for invalid user wolf from 157.230.226.7 port 45366 ssh2
...
2019-12-24 19:32:55
193.112.74.137 attackspambots
Dec 24 09:04:53 localhost sshd\[99123\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.74.137  user=root
Dec 24 09:04:55 localhost sshd\[99123\]: Failed password for root from 193.112.74.137 port 52911 ssh2
Dec 24 09:08:35 localhost sshd\[99200\]: Invalid user postgres from 193.112.74.137 port 34715
Dec 24 09:08:35 localhost sshd\[99200\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.74.137
Dec 24 09:08:36 localhost sshd\[99200\]: Failed password for invalid user postgres from 193.112.74.137 port 34715 ssh2
...
2019-12-24 19:17:42
182.253.251.252 attackspambots
1577171806 - 12/24/2019 08:16:46 Host: 182.253.251.252/182.253.251.252 Port: 445 TCP Blocked
2019-12-24 19:10:23
117.220.246.10 attackspam
Unauthorized connection attempt detected from IP address 117.220.246.10 to port 445
2019-12-24 19:18:01
27.72.97.204 attack
Unauthorized connection attempt from IP address 27.72.97.204 on Port 445(SMB)
2019-12-24 19:18:27
117.73.2.103 attack
Automatic report - Banned IP Access
2019-12-24 19:11:32
182.61.34.101 attackbotsspam
Unauthorized connection attempt from IP address 182.61.34.101 on Port 445(SMB)
2019-12-24 19:10:38
166.62.80.109 attack
166.62.80.109 - - \[24/Dec/2019:08:16:14 +0100\] "POST /wp-login.php HTTP/1.0" 200 7544 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
166.62.80.109 - - \[24/Dec/2019:08:16:16 +0100\] "POST /wp-login.php HTTP/1.0" 200 7411 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
166.62.80.109 - - \[24/Dec/2019:08:16:18 +0100\] "POST /wp-login.php HTTP/1.0" 200 7407 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-12-24 19:40:11
202.166.207.211 attackbotsspam
Unauthorized connection attempt from IP address 202.166.207.211 on Port 445(SMB)
2019-12-24 19:41:44
188.72.116.17 attackbots
Unauthorized connection attempt from IP address 188.72.116.17 on Port 445(SMB)
2019-12-24 19:35:04
35.203.155.125 attackspam
WordPress login Brute force / Web App Attack on client site.
2019-12-24 19:30:58
45.136.108.120 attackspambots
Dec 24 11:58:56 debian-2gb-nbg1-2 kernel: \[837876.892606\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.136.108.120 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=33888 PROTO=TCP SPT=44118 DPT=1615 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-24 19:22:48
90.102.193.193 attackspambots
Unauthorized connection attempt from IP address 90.102.193.193 on Port 445(SMB)
2019-12-24 19:37:20
123.207.8.86 attackbotsspam
Invalid user home from 123.207.8.86 port 34792
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.8.86
Failed password for invalid user home from 123.207.8.86 port 34792 ssh2
Invalid user dajour from 123.207.8.86 port 60906
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.8.86
2019-12-24 19:06:45

最近上报的IP列表

221.131.2.3 100.83.140.80 198.54.100.19 45.207.139.44
160.25.71.114 211.142.118.106 202.156.27.103 87.106.187.78
144.202.21.16 144.202.21.45 148.153.56.145 148.153.56.18
154.29.145.39 13.71.191.191 152.42.181.232 20.151.11.236
171.118.61.12 116.172.249.34 82.180.147.64 103.39.221.249