必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Tsuen Wan

省份(region): Tsuen Wan New Territories

国家(country): Hong Kong

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to  the following terms of Use. See https://afrinic.net/whois/terms

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '102.164.58.0 - 102.164.58.255'

% No abuse contact registered for 102.164.58.0 - 102.164.58.255

inetnum:        102.164.58.0 - 102.164.58.255
netname:        YUNJIE_COMMUNICATION
descr:          Abuse contact:  abuse@larus.net
country:        HK
admin-c:        LA48-AFRINIC
tech-c:         LA48-AFRINIC
status:         ASSIGNED PA
mnt-by:         DSL5-MNT
mnt-by:         LARUS-SERVICE-MNT
source:         AFRINIC # Filtered
parent:         102.164.56.0 - 102.164.59.255

person:         LARUS ADMIN
address:        Flat A3,11/F,TML Tower,Tsuen Wan,HK
phone:          tel:+852-2988-8918
abuse-mailbox:  abuse@larus.help
nic-hdl:        LA48-AFRINIC
mnt-by:         LARUS-SERVICE-MNT
source:         AFRINIC # Filtered

% Information related to '102.164.58.0/23AS328298'

route:          102.164.58.0/23
descr:          Duara Systems Ltd
origin:         AS328298
mnt-by:         DSL5-MNT
source:         AFRINIC # Filtered
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.164.58.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34346
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;102.164.58.119.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026020400 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 04 16:01:22 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 119.58.164.102.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 119.58.164.102.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
132.232.132.103 attackbotsspam
Unauthorized connection attempt detected from IP address 132.232.132.103 to port 2220 [J]
2020-01-19 03:52:30
93.186.254.22 attack
Unauthorized connection attempt detected from IP address 93.186.254.22 to port 2220 [J]
2020-01-19 04:04:02
207.154.234.102 attackbots
Jan 18 12:39:51 Tower sshd[22624]: Connection from 207.154.234.102 port 49952 on 192.168.10.220 port 22 rdomain ""
Jan 18 12:39:52 Tower sshd[22624]: Invalid user mary from 207.154.234.102 port 49952
Jan 18 12:39:52 Tower sshd[22624]: error: Could not get shadow information for NOUSER
Jan 18 12:39:52 Tower sshd[22624]: Failed password for invalid user mary from 207.154.234.102 port 49952 ssh2
Jan 18 12:39:52 Tower sshd[22624]: Received disconnect from 207.154.234.102 port 49952:11: Bye Bye [preauth]
Jan 18 12:39:52 Tower sshd[22624]: Disconnected from invalid user mary 207.154.234.102 port 49952 [preauth]
2020-01-19 03:41:16
118.96.136.150 attackspambots
Invalid user admin from 118.96.136.150 port 43866
2020-01-19 03:55:28
106.52.16.54 attack
Unauthorized connection attempt detected from IP address 106.52.16.54 to port 2220 [J]
2020-01-19 04:00:07
222.186.30.145 attack
Jan 18 20:35:16 MK-Soft-Root1 sshd[1621]: Failed password for root from 222.186.30.145 port 24122 ssh2
Jan 18 20:35:19 MK-Soft-Root1 sshd[1621]: Failed password for root from 222.186.30.145 port 24122 ssh2
...
2020-01-19 03:38:00
219.146.247.82 attack
Invalid user admin from 219.146.247.82 port 45605
2020-01-19 03:39:00
187.109.172.154 attackspam
Invalid user admin from 187.109.172.154 port 54584
2020-01-19 03:45:45
49.233.153.71 attackspambots
$f2bV_matches
2020-01-19 04:11:40
45.73.12.221 attackspam
Invalid user ftp02 from 45.73.12.221 port 53714
2020-01-19 03:35:29
104.248.126.170 attackspam
Unauthorized connection attempt detected from IP address 104.248.126.170 to port 2220 [J]
2020-01-19 04:01:42
212.91.77.226 attack
Jan 18 17:12:36 h2812830 sshd[23434]: Invalid user test from 212.91.77.226 port 38850
Jan 18 17:12:36 h2812830 sshd[23434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.91.77.226
Jan 18 17:12:36 h2812830 sshd[23434]: Invalid user test from 212.91.77.226 port 38850
Jan 18 17:12:38 h2812830 sshd[23434]: Failed password for invalid user test from 212.91.77.226 port 38850 ssh2
Jan 18 17:16:02 h2812830 sshd[23557]: Invalid user test from 212.91.77.226 port 42672
...
2020-01-19 03:39:38
222.252.57.79 attack
Invalid user admin from 222.252.57.79 port 45321
2020-01-19 03:37:42
139.155.71.154 attackspam
Unauthorized connection attempt detected from IP address 139.155.71.154 to port 2220 [J]
2020-01-19 03:52:14
66.168.202.127 attack
Unauthorized connection attempt detected from IP address 66.168.202.127 to port 2220 [J]
2020-01-19 04:08:14

最近上报的IP列表

47.237.7.154 47.84.97.157 36.74.229.17 251.1.146.131
157.73.41.229 251.0.147.119 61.130.103.90 92.217.69.209
92.217.69.12 10.111.255.1 54.38.243.56 185.247.137.155
34.206.74.121 178.239.151.221 146.112.4.203 38.71.115.7
154.26.246.25 109.234.38.142 223.160.210.129 36.140.28.93