必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Ho Chi Minh City

省份(region): unknown

国家(country): Vietnam

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '113.160.0.0 - 113.191.255.255'

% Abuse contact for '113.160.0.0 - 113.191.255.255' is 'hm-changed@vnnic.vn'

inetnum:        113.160.0.0 - 113.191.255.255
netname:        VNPT-VN
descr:          Vietnam Posts and Telecommunications Group
descr:          No 57, Huynh Thuc Khang Street, Lang Ha ward, Dong Da district, Ha Noi City
country:        VN
admin-c:        PTH13-AP
tech-c:         PTH13-AP
remarks:        for admin contact mail to Nguyen Xuan Cuong NXC1-AP
remarks:        for Tech contact mail to Nguyen Hien Khanh KNH1-AP
status:         ALLOCATED PORTABLE
mnt-by:         MAINT-VN-VNNIC
mnt-lower:      MAINT-VN-VNPT
mnt-routes:     MAINT-VN-VNPT
last-modified:  2018-01-25T03:55:17Z
mnt-irt:        IRT-VNNIC-AP
source:         APNIC

irt:            IRT-VNNIC-AP
address:        Ha Noi, VietNam
phone:          +84-24-35564944
fax-no:         +84-24-37821462
e-mail:         hm-changed@vnnic.vn
abuse-mailbox:  hm-changed@vnnic.vn
admin-c:        NTTT1-AP
tech-c:         NTTT1-AP
auth:           # Filtered
mnt-by:         MAINT-VN-VNNIC
last-modified:  2025-11-17T23:08:34Z
source:         APNIC

person:         Pham Tien Huy
address:        VNPT-VN
country:        VN
phone:          +84-24-37741604
e-mail:         huypt@vnpt.vn
nic-hdl:        PTH13-AP
mnt-by:         MAINT-VN-VNPT
last-modified:  2017-11-19T07:06:20Z
source:         APNIC

% Information related to '113.160.0.0/11AS45899'

route:          113.160.0.0/11
descr:          VNPT
origin:         AS45899
mnt-by:         MAINT-VN-VNPT
last-modified:  2022-07-29T15:07:44Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.187.86.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63165
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.187.86.121.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032901 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 15:07:01 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
121.86.187.113.in-addr.arpa domain name pointer static.vnpt.vn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
121.86.187.113.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
217.13.220.30 attackspambots
[portscan] Port scan
2019-08-02 04:05:39
103.218.240.17 attackspambots
2019-08-01T19:28:52.824932abusebot-6.cloudsearch.cf sshd\[23132\]: Invalid user resin from 103.218.240.17 port 49752
2019-08-02 03:49:10
183.57.248.43 attack
Aug  1 15:18:25 mail kernel: \[1926745.710296\] \[UFW BLOCK\] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=183.57.248.43 DST=91.205.173.180 LEN=44 TOS=0x00 PREC=0x00 TTL=51 ID=52537 PROTO=TCP SPT=34834 DPT=23 WINDOW=29938 RES=0x00 SYN URGP=0 
Aug  1 15:18:29 mail kernel: \[1926749.392178\] \[UFW BLOCK\] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=183.57.248.43 DST=91.205.173.180 LEN=44 TOS=0x00 PREC=0x00 TTL=51 ID=52537 PROTO=TCP SPT=34834 DPT=23 WINDOW=29938 RES=0x00 SYN URGP=0 
Aug  1 15:19:24 mail kernel: \[1926805.011691\] \[UFW BLOCK\] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=183.57.248.43 DST=91.205.173.180 LEN=44 TOS=0x00 PREC=0x00 TTL=51 ID=52537 PROTO=TCP SPT=34834 DPT=23 WINDOW=29938 RES=0x00 SYN URGP=0
2019-08-02 03:38:36
184.105.247.203 attack
Honeypot attack, port: 23, PTR: scan-14b.shadowserver.org.
2019-08-02 03:36:04
45.224.161.151 attackbotsspam
Brute force SMTP login attempts.
2019-08-02 03:50:51
129.213.153.229 attack
Aug  1 19:34:58 MK-Soft-VM5 sshd\[6800\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.153.229  user=root
Aug  1 19:35:00 MK-Soft-VM5 sshd\[6800\]: Failed password for root from 129.213.153.229 port 35987 ssh2
Aug  1 19:41:27 MK-Soft-VM5 sshd\[6807\]: Invalid user fred from 129.213.153.229 port 61500
...
2019-08-02 04:08:46
111.197.228.12 attack
Automatic report - Port Scan Attack
2019-08-02 03:32:34
91.205.46.142 attack
[portscan] Port scan
2019-08-02 03:50:33
61.82.104.236 attackbots
19/8/1@10:32:22: FAIL: Alarm-SSH address from=61.82.104.236
...
2019-08-02 04:19:08
182.61.166.179 attackbotsspam
Aug  1 21:27:31 v22018076622670303 sshd\[30386\]: Invalid user angie from 182.61.166.179 port 56610
Aug  1 21:27:31 v22018076622670303 sshd\[30386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.166.179
Aug  1 21:27:33 v22018076622670303 sshd\[30386\]: Failed password for invalid user angie from 182.61.166.179 port 56610 ssh2
...
2019-08-02 04:15:21
108.211.226.221 attackbotsspam
Aug  1 20:26:35 mail sshd\[8226\]: Invalid user tester from 108.211.226.221 port 18448
Aug  1 20:26:35 mail sshd\[8226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.211.226.221
...
2019-08-02 03:52:07
104.152.52.31 attackbotsspam
Automatic report - Port Scan Attack
2019-08-02 03:42:16
104.248.254.51 attackbotsspam
Aug  1 15:05:19 localhost sshd\[21070\]: Invalid user test from 104.248.254.51 port 52550
Aug  1 15:05:19 localhost sshd\[21070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.254.51
Aug  1 15:05:21 localhost sshd\[21070\]: Failed password for invalid user test from 104.248.254.51 port 52550 ssh2
...
2019-08-02 03:57:14
181.48.7.146 attackbotsspam
2019-08-01T15:19:40.323218 X postfix/smtpd[60575]: NOQUEUE: reject: RCPT from unknown[181.48.7.146]: 554 5.7.1 Service unavailable; Client host [181.48.7.146] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/181.48.7.146 / https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=
2019-08-02 03:34:09
201.148.247.142 attackbotsspam
Try access to SMTP/POP/IMAP server.
2019-08-02 04:18:30

最近上报的IP列表

113.187.86.110 2606:4700:10::6816:2452 2606:4700:10::6816:500 2606:4700:10::6814:5924
2606:4700:10::6816:4063 128.242.104.43 2606:4700:10::6814:8744 2606:4700:10::ac43:2621
2606:4700:10::6814:7663 2606:4700:10::6816:1011 2606:4700:10::6816:2500 134.35.157.163
2606:4700:10::6814:8142 2606:4700:10::ac43:1024 2606:4700:10::6814:6566 2606:4700:10::6814:5930
2606:4700:10::6816:4153 216.51.144.105 50.26.175.199 216.167.81.18