必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Hong Kong

运营商(isp): CSL Limited

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '112.121.160.0 - 112.121.191.255'

% Abuse contact for '112.121.160.0 - 112.121.191.255' is 'abuse@netsec.com'

inetnum:        112.121.160.0 - 112.121.191.255
netname:        NETSEC-HK
descr:          Netsec Limited
country:        HK
org:            ORG-NASS1-AP
admin-c:        NN541-AP
tech-c:         NN541-AP
status:         ALLOCATED PORTABLE
abuse-c:        AH1002-AP
mnt-by:         APNIC-HM
mnt-lower:      MAINT-NETSEC-HK
mnt-routes:     MAINT-NETSEC-HK
mnt-irt:        IRT-HK-NETSEC
last-modified:  2025-03-14T06:45:21Z
source:         APNIC

irt:            IRT-HK-NETSEC
address:        RM 2607-08, 26/F, Billion Plaza, 8 Cheung Yue St, Cheung Sha Wan, Kowloon, Hong Kong
e-mail:         noc@netsec.com
abuse-mailbox:  abuse@netsec.com
admin-c:        NN411-AP
tech-c:         NN411-AP
auth:           # Filtered
remarks:        abuse@netsec.com was validated on 2025-09-18
remarks:        noc@netsec.com was validated on 2025-11-25
mnt-by:         MAINT-HK-NETSEC
last-modified:  2025-11-25T06:20:12Z
source:         APNIC

organisation:   ORG-NASS1-AP
org-name:       Netsec Limited
org-type:       LIR
country:        HK
address:        RM 2607-08, 26/F, Billion Plaza, 8 Cheung Yue St, Cheung Sha
phone:          +852-27511100
fax-no:         +852-27511199
e-mail:         noc@netsec.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:15:31Z
source:         APNIC

role:           ABUSE HKNETSEC
country:        ZZ
address:        RM 2607-08, 26/F, Billion Plaza, 8 Cheung Yue St, Cheung Sha Wan, Kowloon, Hong Kong
phone:          +000000000
e-mail:         noc@netsec.com
admin-c:        NN411-AP
tech-c:         NN411-AP
nic-hdl:        AH1002-AP
remarks:        Generated from irt object IRT-HK-NETSEC
remarks:        abuse@netsec.com was validated on 2025-09-18
remarks:        noc@netsec.com was validated on 2025-11-25
abuse-mailbox:  abuse@netsec.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-11-25T06:20:44Z
source:         APNIC

role:           NETSEC NOC
address:        Suite 1007, 10/F, The Bay Hub, 17 Kai Cheung Rd, Kowloon Bay
country:        HK
phone:          +85227511100
e-mail:         noc@netsec.com
admin-c:        NN541-AP
tech-c:         NN541-AP
nic-hdl:        NN541-AP
mnt-by:         MAINT-NETSEC-HK
last-modified:  2025-03-14T05:55:40Z
source:         APNIC

% Information related to '112.121.183.0/24AS45753'

route:          112.121.183.0/24
origin:         AS45753
descr:          Netsec Limited
                RM 2607-08, 26/F, Billion Plaza, 8 Cheung Yue St, Cheung Sha
mnt-by:         MAINT-NETSEC-HK
last-modified:  2021-11-29T08:43:25Z
source:         APNIC

% Information related to '112.121.183.0/24AS9744'

route:          112.121.183.0/24
origin:         AS9744
descr:          Netsec Limited
                RM 2607-08, 26/F, Billion Plaza, 8 Cheung Yue St, Cheung Sha
mnt-by:         MAINT-NETSEC-HK
last-modified:  2021-11-29T08:32:24Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.121.183.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45330
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.121.183.114.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025113000 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 30 21:00:43 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 114.183.121.112.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 114.183.121.112.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.169.192 attack
Nov  2 10:31:29 herz-der-gamer sshd[19897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192  user=root
Nov  2 10:31:31 herz-der-gamer sshd[19897]: Failed password for root from 222.186.169.192 port 28346 ssh2
...
2019-11-02 17:43:16
195.69.135.78 attack
email spam
2019-11-02 17:22:53
5.135.232.8 attack
Nov  2 01:30:15 debian sshd\[17667\]: Invalid user beagleindex from 5.135.232.8 port 35730
Nov  2 01:30:15 debian sshd\[17667\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.232.8
Nov  2 01:30:17 debian sshd\[17667\]: Failed password for invalid user beagleindex from 5.135.232.8 port 35730 ssh2
...
2019-11-02 17:41:43
124.123.104.209 attackbots
Unauthorized connection attempt from IP address 124.123.104.209 on Port 445(SMB)
2019-11-02 17:39:01
188.225.46.124 attack
2019-11-02T09:06:19.679579shield sshd\[14279\]: Invalid user maisa from 188.225.46.124 port 52022
2019-11-02T09:06:19.685158shield sshd\[14279\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.225.46.124
2019-11-02T09:06:21.401325shield sshd\[14279\]: Failed password for invalid user maisa from 188.225.46.124 port 52022 ssh2
2019-11-02T09:09:58.996925shield sshd\[14816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.225.46.124  user=root
2019-11-02T09:10:00.778342shield sshd\[14816\]: Failed password for root from 188.225.46.124 port 34880 ssh2
2019-11-02 17:18:10
118.96.241.22 attackspambots
Unauthorized connection attempt from IP address 118.96.241.22 on Port 445(SMB)
2019-11-02 17:36:30
222.186.180.8 attackbotsspam
Nov  2 09:35:10 ip-172-31-1-72 sshd\[28840\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.8  user=root
Nov  2 09:35:12 ip-172-31-1-72 sshd\[28840\]: Failed password for root from 222.186.180.8 port 46252 ssh2
Nov  2 09:35:40 ip-172-31-1-72 sshd\[28842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.8  user=root
Nov  2 09:35:42 ip-172-31-1-72 sshd\[28842\]: Failed password for root from 222.186.180.8 port 58970 ssh2
Nov  2 09:35:46 ip-172-31-1-72 sshd\[28842\]: Failed password for root from 222.186.180.8 port 58970 ssh2
2019-11-02 17:42:04
1.53.176.157 attack
Unauthorized connection attempt from IP address 1.53.176.157 on Port 445(SMB)
2019-11-02 17:33:01
159.138.135.76 attackspambots
Nov  2 06:46:19 server sshd\[26960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.138.135.76  user=root
Nov  2 06:46:20 server sshd\[26960\]: Failed password for root from 159.138.135.76 port 48482 ssh2
Nov  2 06:46:21 server sshd\[26961\]: Received disconnect from 159.138.135.76: 3: com.jcraft.jsch.JSchException: Auth fail
Nov  2 06:46:22 server sshd\[26976\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.138.135.76  user=root
Nov  2 06:46:24 server sshd\[26976\]: Failed password for root from 159.138.135.76 port 48592 ssh2
...
2019-11-02 17:15:19
42.117.229.20 attackspam
Unauthorized connection attempt from IP address 42.117.229.20 on Port 445(SMB)
2019-11-02 17:36:11
189.160.155.138 attack
Unauthorized connection attempt from IP address 189.160.155.138 on Port 445(SMB)
2019-11-02 17:41:02
14.167.7.240 attack
Unauthorized connection attempt from IP address 14.167.7.240 on Port 445(SMB)
2019-11-02 17:20:54
120.29.155.122 attack
2019-11-02T04:49:58.016052abusebot-5.cloudsearch.cf sshd\[20098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.29.155.122  user=root
2019-11-02 17:19:09
50.63.165.245 attack
Wordpress bruteforce
2019-11-02 17:27:18
117.7.205.110 attackspam
Unauthorized connection attempt from IP address 117.7.205.110 on Port 445(SMB)
2019-11-02 17:17:40

最近上报的IP列表

205.210.31.206 20.83.27.89 113.14.255.169 112.121.183.78
182.104.90.211 183.7.145.207 35.197.120.140 172.20.32.52
149.119.33.10 50.16.56.56 117.198.15.221 34.10.233.154
144.126.236.140 197.55.114.104 156.227.148.1 34.48.151.73
93.170.170.13 63.33.66.89 167.99.81.88 45.150.54.62