必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Bangkok

省份(region): Bangkok

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
110.78.138.66 attackspam
"Test Inject  em'a=0"
2020-10-06 03:15:47
110.78.138.66 attack
"Test Inject  em'a=0"
2020-10-05 19:07:41
110.78.138.13 attack
Invalid user admin from 110.78.138.13 port 40951
2020-04-21 22:21:50
110.78.138.155 attack
Brute force SMTP login attempted.
...
2020-04-01 08:18:23
110.78.138.64 attackbotsspam
Chat Spam
2019-09-08 08:44:13
110.78.138.120 attackspambots
Access to Microsoft account
2019-07-15 15:50:25
110.78.138.36 attackbotsspam
Jul  8 01:02:21 vpn01 sshd\[3827\]: Invalid user admin from 110.78.138.36
Jul  8 01:02:21 vpn01 sshd\[3827\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.78.138.36
Jul  8 01:02:23 vpn01 sshd\[3827\]: Failed password for invalid user admin from 110.78.138.36 port 35765 ssh2
2019-07-08 12:10:33
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '110.78.128.0 - 110.78.191.255'

% Abuse contact for '110.78.128.0 - 110.78.191.255' is 'pitoon.p@ntplc.co.th'

inetnum:        110.78.128.0 - 110.78.191.255
netname:        CAT-BB-NET
descr:          10 Fl. 72. CAT TELECOM TOWER Bangrak Bangkok Thailand
country:        TH
admin-c:        TU38-AP
tech-c:         WP273-AP
tech-c:         PD452-AP
tech-c:         CB840-AP
abuse-c:        AN3307-AP
status:         ALLOCATED NON-PORTABLE
remarks:        Personal contact # PS474-AP WP273-AP AS1145-AP
notify:         pankaew@cat.net.th
mnt-by:         MAINT-NTPCL-TH
mnt-lower:      MAINT-NTPCL-TH
mnt-routes:     MAINT-NTPCL-TH
mnt-irt:        IRT-NTPCL-TH
last-modified:  2025-11-19T23:59:29Z
source:         APNIC

irt:            IRT-NTPCL-TH
address:        99 Chaengwattana Road, Thung Song Hong Subdistrict, Luk Si, Luksi Bangkok 10210
e-mail:         pitoon.p@ntplc.co.th
abuse-mailbox:  pitoon.p@ntplc.co.th
admin-c:        NTPC2-AP
tech-c:         NTPC2-AP
auth:           # Filtered
mnt-by:         MAINT-NTPCL-TH
last-modified:  2026-02-02T07:21:59Z
source:         APNIC

role:           ABUSE NTPCLTH
country:        ZZ
address:        99 Chaengwattana Road, Thung Song Hong Subdistrict, Luk Si, Luksi Bangkok 10210
phone:          +000000000
e-mail:         pitoon.p@ntplc.co.th
admin-c:        NTPC2-AP
tech-c:         NTPC2-AP
nic-hdl:        AN3307-AP
remarks:        Generated from irt object IRT-NTPCL-TH
abuse-mailbox:  pitoon.p@ntplc.co.th
mnt-by:         APNIC-ABUSE
last-modified:  2025-11-19T01:51:42Z
source:         APNIC

person:         CAT Broadband
address:        10 Fl. 72. CAT TELECOM TOWER Bangrak Bangkok Thailand
country:        TH
phone:          +66-261-42138
e-mail:         nmc@cat.net.th
nic-hdl:        CB840-AP
mnt-by:         MAINT-TH-THIX-CAT
last-modified:  2018-02-07T08:56:35Z
source:         APNIC

person:         Passanon dumsood
address:        10 Fl. 72. CAT TELECOM TOWER Bangrak Bangkok Thailand
country:        TH
phone:          +66-261-42138
e-mail:         passanon.d@cat.net.th
nic-hdl:        PD452-AP
mnt-by:         MAINT-TH-THIX-CAT
last-modified:  2017-06-13T04:19:50Z
source:         APNIC

person:         Theerachai Udomkitpanya
address:        10 Fl. 72. CAT TELECOM TOWER Bangrak Bangkok
country:        TH
phone:          +66-261-42918
e-mail:         theerachai.u@cattelecom.com
nic-hdl:        TU38-AP
mnt-by:         MAINT-TH-THIX-CAT
last-modified:  2017-11-23T10:20:25Z
source:         APNIC

person:         Weerapong Pankaew
nic-hdl:        WP273-AP
e-mail:         pankaew@cat.net.th
address:        CAT-BB-NET
address:        10 Fl. 72. CAT TELECOM TOWER Bangrak Bangkok Thailand
phone:          +66-261-42138
fax-no:         +66-261-42682
country:        TH
mnt-by:         MAINT-NEW
last-modified:  2008-09-25T12:45:58Z
source:         APNIC

% Information related to '110.78.138.0/24AS131090'

route:          110.78.138.0/24
origin:         AS131090
descr:          CAT Telecom Public Company Limited
                13th CAT TELECOM TOWER
                NEW ROAD SRIPHRAYA BANGRAK
                BANGKOK
                THAILAND
mnt-by:         MAINT-NTPCL-TH
last-modified:  2025-11-19T01:51:53Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 110.78.138.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62559
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;110.78.138.129.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032600 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 26 21:07:09 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 129.138.78.110.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
server can't find 110.78.138.129.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
157.230.240.34 attack
Nov  1 16:45:23 gw1 sshd[20902]: Failed password for root from 157.230.240.34 port 46192 ssh2
Nov  1 16:49:39 gw1 sshd[20992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.240.34
...
2019-11-02 00:09:36
62.48.150.175 attack
Nov  1 13:39:30 sd-53420 sshd\[9324\]: Invalid user guigui748!@ from 62.48.150.175
Nov  1 13:39:30 sd-53420 sshd\[9324\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.48.150.175
Nov  1 13:39:32 sd-53420 sshd\[9324\]: Failed password for invalid user guigui748!@ from 62.48.150.175 port 39476 ssh2
Nov  1 13:43:55 sd-53420 sshd\[9643\]: Invalid user Alexis from 62.48.150.175
Nov  1 13:43:55 sd-53420 sshd\[9643\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.48.150.175
...
2019-11-01 23:29:10
123.161.205.21 attack
firewall-block, port(s): 1433/tcp
2019-11-01 23:46:37
185.200.118.72 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-02 00:08:56
106.13.133.80 attack
Nov  1 14:41:22 meumeu sshd[31869]: Failed password for root from 106.13.133.80 port 60510 ssh2
Nov  1 14:47:53 meumeu sshd[32733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.133.80 
Nov  1 14:47:55 meumeu sshd[32733]: Failed password for invalid user president from 106.13.133.80 port 45382 ssh2
...
2019-11-02 00:03:22
50.197.162.169 attack
2019-11-01 H=50-197-162-169-static.hfc.comcastbusiness.net \[50.197.162.169\] F=\ rejected RCPT \: Mail not accepted. 50.197.162.169 is listed at a DNSBL.
2019-11-01 H=50-197-162-169-static.hfc.comcastbusiness.net \[50.197.162.169\] F=\ rejected RCPT \: Mail not accepted. 50.197.162.169 is listed at a DNSBL.
2019-11-01 H=50-197-162-169-static.hfc.comcastbusiness.net \[50.197.162.169\] F=\ rejected RCPT \<**REMOVED**@**REMOVED**.de\>: Mail not accepted. 50.197.162.169 is listed at a DNSBL.
2019-11-01 23:33:36
195.206.60.214 attackbots
firewall-block, port(s): 445/tcp
2019-11-01 23:27:18
39.43.73.90 attack
" "
2019-11-01 23:37:08
110.35.167.16 attack
Multiple failed RDP login attempts
2019-11-02 00:02:23
182.74.211.94 attackspambots
Nov  1 12:32:07 mxgate1 postfix/postscreen[21104]: CONNECT from [182.74.211.94]:60695 to [176.31.12.44]:25
Nov  1 12:32:07 mxgate1 postfix/dnsblog[21241]: addr 182.74.211.94 listed by domain zen.spamhaus.org as 127.0.0.4
Nov  1 12:32:07 mxgate1 postfix/dnsblog[21240]: addr 182.74.211.94 listed by domain cbl.abuseat.org as 127.0.0.2
Nov  1 12:32:07 mxgate1 postfix/dnsblog[21238]: addr 182.74.211.94 listed by domain b.barracudacentral.org as 127.0.0.2
Nov  1 12:32:07 mxgate1 postfix/postscreen[21104]: PREGREET 22 after 0.18 from [182.74.211.94]:60695: EHLO [182.74.211.94]

Nov  1 12:32:07 mxgate1 postfix/postscreen[21104]: DNSBL rank 4 for [182.74.211.94]:60695
Nov x@x
Nov  1 12:32:08 mxgate1 postfix/postscreen[21104]: HANGUP after 0.62 from [182.74.211.94]:60695 in tests after SMTP handshake
Nov  1 12:32:08 mxgate1 postfix/postscreen[21104]: DISCONNECT [182.74.211.94]:60695


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=182.74.211.94
2019-11-01 23:34:30
181.48.134.65 attackspambots
Nov  1 13:07:27 dedicated sshd[7089]: Invalid user pope from 181.48.134.65 port 53554
2019-11-02 00:07:16
58.221.60.145 attack
Nov  1 16:26:38 vps691689 sshd[27997]: Failed password for root from 58.221.60.145 port 60400 ssh2
Nov  1 16:32:15 vps691689 sshd[28093]: Failed password for root from 58.221.60.145 port 50009 ssh2
...
2019-11-01 23:35:23
183.220.246.228 attackspam
6381/tcp
[2019-11-01]1pkt
2019-11-02 00:03:57
122.152.214.172 attackbotsspam
SSH bruteforce
2019-11-01 23:36:17
51.255.168.127 attackspambots
Nov  1 13:02:02 srv01 sshd[30819]: Invalid user vrbetic from 51.255.168.127
Nov  1 13:02:02 srv01 sshd[30819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=127.ip-51-255-168.eu
Nov  1 13:02:02 srv01 sshd[30819]: Invalid user vrbetic from 51.255.168.127
Nov  1 13:02:03 srv01 sshd[30819]: Failed password for invalid user vrbetic from 51.255.168.127 port 54584 ssh2
Nov  1 13:05:56 srv01 sshd[31033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=127.ip-51-255-168.eu  user=root
Nov  1 13:05:59 srv01 sshd[31033]: Failed password for root from 51.255.168.127 port 37286 ssh2
...
2019-11-01 23:31:12

最近上报的IP列表

2606:4700:10::ac43:2500 177.37.127.166 163.254.224.1 13.234.207.198
192.252.183.219 103.47.185.226 122.192.203.78 122.193.247.71
110.77.226.11 2606:4700:10::ac43:2839 110.78.150.142 2606:4700:10::6814:6688
2606:4700:10::ac43:2650 2606:4700:10::6814:8754 110.77.248.127 2606:4700:10::ac43:1251
138.199.167.219 251.148.24.133 185.241.137.230 160.119.76.17