必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Singapore

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '111.221.45.0 - 111.221.47.255'

% Abuse contact for '111.221.45.0 - 111.221.47.255' is 'abuse@axgn.com.sg'

inetnum:        111.221.45.0 - 111.221.47.255
netname:        AsiaServerHost
descr:          asiaServerHost.com
descr:          sales@asiaserverhost.com
country:        SG
admin-c:        AJ28-AP
tech-c:         AJ28-AP
abuse-c:        AA1661-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-AXGNDOTCOMDOTSG-SG-SG
mnt-lower:      MAINT-AXGNDOTCOMDOTSG-SG-SG
mnt-routes:     MAINT-AXGNDOTCOMDOTSG-SG-SG
mnt-irt:        IRT-AXGNDOTCOMDOTSG-SG-SG
last-modified:  2021-06-29T20:16:13Z
source:         APNIC

irt:            IRT-AXGNDOTCOMDOTSG-SG-SG
address:        paypal@raymond247.com
e-mail:         abuse@axgn.com.sg
abuse-mailbox:  abuse@axgn.com.sg
admin-c:        AJ28-AP
tech-c:         AJ28-AP
auth:           # Filtered
remarks:        abuse@axgn.com.sg is invalid
mnt-by:         MAINT-AXGNDOTCOMDOTSG-SG-SG
last-modified:  2025-11-18T00:26:28Z
source:         APNIC

role:           ABUSE AXGNDOTCOMDOTSGSGSG
country:        ZZ
address:        paypal@raymond247.com
phone:          +000000000
e-mail:         abuse@axgn.com.sg
admin-c:        AJ28-AP
tech-c:         AJ28-AP
nic-hdl:        AA1661-AP
remarks:        Generated from irt object IRT-AXGNDOTCOMDOTSG-SG-SG
remarks:        abuse@axgn.com.sg is invalid
abuse-mailbox:  abuse@axgn.com.sg
mnt-by:         APNIC-ABUSE
last-modified:  2025-06-04T13:06:28Z
source:         APNIC

role:           AXGN - Jacky
address:        VBOX 888431    Singapore 919191
country:        SG
phone:          +6593836790
e-mail:         sales@axgn.com.sg
admin-c:        AJ28-AP
tech-c:         AJ28-AP
nic-hdl:        AJ28-AP
mnt-by:         MAINT-AXGNDOTCOMDOTSG-SG-SG
last-modified:  2009-07-16T01:44:11Z
source:         APNIC

% Information related to '111.221.45.0/24AS38001'

route:          111.221.45.0/24
origin:         AS38001
descr:          AXGN
                662B #02-322
                Jurong West Street 64
mnt-by:         MAINT-AXGNDOTCOMDOTSG-SG-SG
last-modified:  2021-09-27T03:11:58Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 111.221.45.79
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38583
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;111.221.45.79.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026020502 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 06 02:14:50 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
79.45.221.111.in-addr.arpa domain name pointer recados.de.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
79.45.221.111.in-addr.arpa	name = recados.de.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.42.155 attackbotsspam
01.03.2020 14:12:09 SSH access blocked by firewall
2020-03-01 22:14:07
92.118.37.99 attackspambots
03/01/2020-08:26:21.221081 92.118.37.99 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-03-01 21:43:33
153.126.185.8 attackbots
$f2bV_matches
2020-03-01 21:46:43
118.140.118.250 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-01 21:51:07
222.186.175.140 attack
Mar  1 16:03:06 ift sshd\[29408\]: Failed password for root from 222.186.175.140 port 44754 ssh2Mar  1 16:03:31 ift sshd\[29431\]: Failed password for root from 222.186.175.140 port 60780 ssh2Mar  1 16:03:35 ift sshd\[29431\]: Failed password for root from 222.186.175.140 port 60780 ssh2Mar  1 16:03:38 ift sshd\[29431\]: Failed password for root from 222.186.175.140 port 60780 ssh2Mar  1 16:03:42 ift sshd\[29431\]: Failed password for root from 222.186.175.140 port 60780 ssh2
...
2020-03-01 22:04:44
222.186.42.75 attackbots
2020-03-01T14:42:30.774425scmdmz1 sshd[18942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.75  user=root
2020-03-01T14:42:33.225026scmdmz1 sshd[18942]: Failed password for root from 222.186.42.75 port 34107 ssh2
2020-03-01T14:42:35.488530scmdmz1 sshd[18942]: Failed password for root from 222.186.42.75 port 34107 ssh2
2020-03-01T14:42:30.774425scmdmz1 sshd[18942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.75  user=root
2020-03-01T14:42:33.225026scmdmz1 sshd[18942]: Failed password for root from 222.186.42.75 port 34107 ssh2
2020-03-01T14:42:35.488530scmdmz1 sshd[18942]: Failed password for root from 222.186.42.75 port 34107 ssh2
2020-03-01T14:42:30.774425scmdmz1 sshd[18942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.75  user=root
2020-03-01T14:42:33.225026scmdmz1 sshd[18942]: Failed password for root from 222.186.42.75 port 34107 ssh2
2020-03-0
2020-03-01 21:48:44
141.98.80.139 attackspambots
Mar  1 15:43:42 mail1 sendmail[6535]: 021Dhcbc006535: [141.98.80.139] did not issue MAIL/EXPN/VRFY/ETRN during connection to TLSMTA
Mar  1 15:43:42 mail1 sendmail[6536]: 021DhctY006536: [141.98.80.139] did not issue MAIL/EXPN/VRFY/ETRN during connection to TLSMTA
Mar  1 15:43:46 mail1 sendmail[6539]: 021Dhgv5006539: [141.98.80.139] did not issue MAIL/EXPN/VRFY/ETRN during connection to TLSMTA
Mar  1 15:43:46 mail1 sendmail[6540]: 021Dhg78006540: [141.98.80.139] did not issue MAIL/EXPN/VRFY/ETRN during connection to TLSMTA
...
2020-03-01 21:56:54
207.81.236.173 attackspam
Automatic report - Port Scan Attack
2020-03-01 21:52:01
47.225.161.219 attackbotsspam
Mar  1 14:26:29 v22018076622670303 sshd\[16263\]: Invalid user mark from 47.225.161.219 port 48950
Mar  1 14:26:29 v22018076622670303 sshd\[16263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.225.161.219
Mar  1 14:26:31 v22018076622670303 sshd\[16263\]: Failed password for invalid user mark from 47.225.161.219 port 48950 ssh2
...
2020-03-01 21:32:51
171.67.70.80 attackbots
port scan and connect, tcp 80 (http)
2020-03-01 21:31:52
185.47.65.30 attack
Mar  1 05:26:19 mockhub sshd[14280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.47.65.30
Mar  1 05:26:21 mockhub sshd[14280]: Failed password for invalid user david from 185.47.65.30 port 37898 ssh2
...
2020-03-01 21:40:20
188.166.172.189 attack
Mar  1 16:49:30 server sshd\[2561\]: Invalid user confluence from 188.166.172.189
Mar  1 16:49:30 server sshd\[2561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.172.189 
Mar  1 16:49:32 server sshd\[2561\]: Failed password for invalid user confluence from 188.166.172.189 port 34258 ssh2
Mar  1 17:01:35 server sshd\[4930\]: Invalid user temp from 188.166.172.189
Mar  1 17:01:35 server sshd\[4930\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.172.189 
...
2020-03-01 22:15:37
79.133.107.248 attackspambots
B: Magento admin pass test (wrong country)
2020-03-01 21:43:59
185.211.245.170 attackspambots
Mar  1 14:40:03 web01.agentur-b-2.de postfix/smtpd[161188]: warning: unknown[185.211.245.170]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar  1 14:40:10 web01.agentur-b-2.de postfix/smtpd[158633]: warning: unknown[185.211.245.170]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar  1 14:45:39 web01.agentur-b-2.de postfix/smtpd[165210]: warning: unknown[185.211.245.170]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-03-01 21:52:20
122.51.114.51 attack
Mar  1 10:17:43 server sshd\[29162\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.114.51 
Mar  1 10:17:46 server sshd\[29162\]: Failed password for invalid user liuzhenfeng from 122.51.114.51 port 55576 ssh2
Mar  1 16:25:52 server sshd\[30921\]: Invalid user dsvmadmin123 from 122.51.114.51
Mar  1 16:25:52 server sshd\[30921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.114.51 
Mar  1 16:25:55 server sshd\[30921\]: Failed password for invalid user dsvmadmin123 from 122.51.114.51 port 46670 ssh2
...
2020-03-01 22:11:07

最近上报的IP列表

66.33.60.193 170.64.239.106 20.163.13.196 10.212.177.214
10.212.177.224 47.32.133.153 113.215.188.193 39.64.208.185
27.40.78.29 27.39.205.120 27.38.206.90 183.251.240.111
123.5.215.28 120.9.189.180 115.63.124.220 115.60.128.187
111.208.78.229 110.18.12.103 101.28.195.235 54.144.193.250