必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Bến Tre

省份(region): unknown

国家(country): Vietnam

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
113.163.214.201 attackbots
Honeypot attack, port: 81, PTR: static.vnpt.vn.
2020-07-15 04:04:13
113.163.214.128 attackbotsspam
20/3/17@04:40:26: FAIL: Alarm-Network address from=113.163.214.128
20/3/17@04:40:27: FAIL: Alarm-Network address from=113.163.214.128
...
2020-03-18 00:44:39
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '113.160.0.0 - 113.191.255.255'

% Abuse contact for '113.160.0.0 - 113.191.255.255' is 'hm-changed@vnnic.vn'

inetnum:        113.160.0.0 - 113.191.255.255
netname:        VNPT-VN
descr:          Vietnam Posts and Telecommunications Group
descr:          No 57, Huynh Thuc Khang Street, Lang Ha ward, Dong Da district, Ha Noi City
country:        VN
admin-c:        PTH13-AP
tech-c:         PTH13-AP
remarks:        for admin contact mail to Nguyen Xuan Cuong NXC1-AP
remarks:        for Tech contact mail to Nguyen Hien Khanh KNH1-AP
status:         ALLOCATED PORTABLE
mnt-by:         MAINT-VN-VNNIC
mnt-lower:      MAINT-VN-VNPT
mnt-routes:     MAINT-VN-VNPT
last-modified:  2018-01-25T03:55:17Z
mnt-irt:        IRT-VNNIC-AP
source:         APNIC

irt:            IRT-VNNIC-AP
address:        Ha Noi, VietNam
phone:          +84-24-35564944
fax-no:         +84-24-37821462
e-mail:         hm-changed@vnnic.vn
abuse-mailbox:  hm-changed@vnnic.vn
admin-c:        NTTT1-AP
tech-c:         NTTT1-AP
auth:           # Filtered
mnt-by:         MAINT-VN-VNNIC
last-modified:  2026-04-06T06:49:37Z
source:         APNIC

person:         Pham Tien Huy
address:        VNPT-VN
country:        VN
phone:          +84-24-37741604
e-mail:         huypt@vnpt.vn
nic-hdl:        PTH13-AP
mnt-by:         MAINT-VN-VNPT
last-modified:  2017-11-19T07:06:20Z
source:         APNIC

% Information related to '113.163.192.0/19AS45899'

route:          113.163.192.0/19
descr:          VietNam Post and Telecom Corporation (VNPT)
descr:          VNPT-AS-AP
country:        VN
origin:         AS45899
remarks:        mailto: noc@vnn.vn
notify:         hm-changed@vnnic.net.vn
mnt-by:         MAINT-VN-VNPT
last-modified:  2010-08-10T08:20:03Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.163.214.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20240
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.163.214.207.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041200 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 12 21:05:57 CST 2026
;; MSG SIZE  rcvd: 108
HOST信息:
207.214.163.113.in-addr.arpa domain name pointer static.vnpt.vn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
207.214.163.113.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
213.32.16.127 attackbotsspam
Oct  8 07:43:44 SilenceServices sshd[1272]: Failed password for root from 213.32.16.127 port 49274 ssh2
Oct  8 07:48:04 SilenceServices sshd[2488]: Failed password for root from 213.32.16.127 port 32774 ssh2
2019-10-08 14:05:58
222.186.173.238 attackspambots
Oct  8 07:51:36 s64-1 sshd[28897]: Failed password for root from 222.186.173.238 port 54714 ssh2
Oct  8 07:51:52 s64-1 sshd[28897]: error: maximum authentication attempts exceeded for root from 222.186.173.238 port 54714 ssh2 [preauth]
Oct  8 07:52:04 s64-1 sshd[28904]: Failed password for root from 222.186.173.238 port 32768 ssh2
...
2019-10-08 14:02:12
109.75.34.152 attackspambots
email spam
2019-10-08 14:19:48
152.169.172.48 attackbots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/152.169.172.48/ 
 AR - 1H : (27)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : AR 
 NAME ASN : ASN10318 
 
 IP : 152.169.172.48 
 
 CIDR : 152.169.160.0/19 
 
 PREFIX COUNT : 262 
 
 UNIQUE IP COUNT : 2114560 
 
 
 WYKRYTE ATAKI Z ASN10318 :  
  1H - 3 
  3H - 3 
  6H - 3 
 12H - 3 
 24H - 6 
 
 DateTime : 2019-10-08 05:57:32 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-08 13:45:11
185.220.101.69 attackspam
Unauthorized access detected from banned ip
2019-10-08 14:27:44
68.183.2.210 attackspambots
\[2019-10-08 02:02:20\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-08T02:02:20.444-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011970599704264",SessionID="0x7fc3acc3d768",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/68.183.2.210/50068",ACLName="no_extension_match"
\[2019-10-08 02:04:43\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-08T02:04:43.214-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011970599704264",SessionID="0x7fc3ac92d138",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/68.183.2.210/55411",ACLName="no_extension_match"
\[2019-10-08 02:06:56\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-08T02:06:56.637-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9970599704264",SessionID="0x7fc3ac4bb188",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/68.183.2.210/59660",ACLName="no_extensi
2019-10-08 14:08:18
59.153.74.43 attackspam
2019-10-08T00:53:19.4322331495-001 sshd\[39920\]: Failed password for invalid user Sigmal from 59.153.74.43 port 11855 ssh2
2019-10-08T01:05:09.3464391495-001 sshd\[40951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.153.74.43  user=root
2019-10-08T01:05:11.2040671495-001 sshd\[40951\]: Failed password for root from 59.153.74.43 port 4638 ssh2
2019-10-08T01:09:12.0881331495-001 sshd\[41323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.153.74.43  user=root
2019-10-08T01:09:14.3064141495-001 sshd\[41323\]: Failed password for root from 59.153.74.43 port 4991 ssh2
2019-10-08T01:13:06.7492541495-001 sshd\[41531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.153.74.43  user=root
...
2019-10-08 13:49:00
218.234.206.107 attackspam
Oct  8 01:45:29 xtremcommunity sshd\[302792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.234.206.107  user=root
Oct  8 01:45:31 xtremcommunity sshd\[302792\]: Failed password for root from 218.234.206.107 port 40218 ssh2
Oct  8 01:50:12 xtremcommunity sshd\[302932\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.234.206.107  user=root
Oct  8 01:50:13 xtremcommunity sshd\[302932\]: Failed password for root from 218.234.206.107 port 51960 ssh2
Oct  8 01:54:53 xtremcommunity sshd\[303019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.234.206.107  user=root
...
2019-10-08 14:05:44
93.145.35.210 attack
Tue Oct  8 06:58:17 2019 \[pid 22939\] \[lexgold\] FTP response: Client "93.145.35.210", "530 Permission denied."
Tue Oct  8 06:58:19 2019 \[pid 22941\] \[lexgold\] FTP response: Client "93.145.35.210", "530 Permission denied."
Tue Oct  8 06:58:21 2019 \[pid 22946\] \[lexgold\] FTP response: Client "93.145.35.210", "530 Permission denied."
2019-10-08 13:51:52
222.186.52.124 attack
Unauthorized access to SSH at 8/Oct/2019:06:04:55 +0000.
Received:  (SSH-2.0-PUTTY)
2019-10-08 14:07:04
192.227.136.67 attack
2019-10-08T07:02:15.498328  sshd[24522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.136.67  user=root
2019-10-08T07:02:17.802620  sshd[24522]: Failed password for root from 192.227.136.67 port 59760 ssh2
2019-10-08T07:09:25.384163  sshd[24576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.136.67  user=root
2019-10-08T07:09:27.387032  sshd[24576]: Failed password for root from 192.227.136.67 port 55764 ssh2
2019-10-08T07:16:24.662667  sshd[24693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.136.67  user=root
2019-10-08T07:16:26.520013  sshd[24693]: Failed password for root from 192.227.136.67 port 51558 ssh2
...
2019-10-08 13:48:18
112.170.78.118 attackbots
Oct  8 07:11:16 eventyay sshd[26182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.170.78.118
Oct  8 07:11:19 eventyay sshd[26182]: Failed password for invalid user 123456789qwertyuio from 112.170.78.118 port 54394 ssh2
Oct  8 07:15:47 eventyay sshd[26250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.170.78.118
...
2019-10-08 13:29:30
46.45.160.75 attackbotsspam
WordPress wp-login brute force :: 46.45.160.75 0.048 BYPASS [08/Oct/2019:14:57:02  1100] [censored_4] "POST /wp-login.php HTTP/1.1" 200 3989 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-08 14:13:53
68.183.91.25 attackbotsspam
Oct  7 19:24:05 eddieflores sshd\[8897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.91.25  user=root
Oct  7 19:24:08 eddieflores sshd\[8897\]: Failed password for root from 68.183.91.25 port 52205 ssh2
Oct  7 19:28:45 eddieflores sshd\[9290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.91.25  user=root
Oct  7 19:28:46 eddieflores sshd\[9290\]: Failed password for root from 68.183.91.25 port 43984 ssh2
Oct  7 19:33:31 eddieflores sshd\[9695\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.91.25  user=root
2019-10-08 13:43:54
61.37.82.220 attack
2019-10-08T05:05:05.579604abusebot-4.cloudsearch.cf sshd\[22311\]: Invalid user Testing@2017 from 61.37.82.220 port 53304
2019-10-08 14:03:09

最近上报的IP列表

23.165.40.135 220.167.104.53 190.194.63.159 190.194.63.86
20.220.147.82 192.241.222.196 192.168.1.240 121.8.28.79
2606:4700:10::6814:6541 2606:4700:10::6816:4461 2606:4700:10::6816:648 2606:4700:10::6816:394
2606:4700:10::6816:1852 2606:4700:10::ac43:1434 2606:4700:10::6814:4555 2606:4700:10::6816:3505
195.178.110.103 104.187.62.77 134.35.157.180 110.78.156.87