必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Bangladesh

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '114.130.0.0 - 114.130.127.255'

% Abuse contact for '114.130.0.0 - 114.130.127.255' is 'abuse@mango.com.bd'

inetnum:        114.130.0.0 - 114.130.127.255
netname:        MANGOTELESERVICE-BD
descr:          Mango Teleservices, IIG of Bangladesh
country:        BD
org:            ORG-MTL1-AP
admin-c:        MTLn1-AP
tech-c:         MMH18-AP
abuse-c:        AM2825-AP
status:         ALLOCATED PORTABLE
remarks:        -+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+
remarks:        Send SPAM & HACKING reports to abuse@mango.com.bd
remarks:        Reports are not accepted by phone, fax or mobile
remarks:        Email with logs including accurate UTC timestamp
remarks:        -+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+
mnt-by:         APNIC-HM
mnt-lower:      MAINT-MANGOTELESERVICE-BD
mnt-lower:      MAINT-MANGONET-BD
mnt-routes:     MAINT-MANGONET-BD
mnt-routes:     MAINT-MANGOTELESERVICE-BD
mnt-routes:     MAINT-BD-MANGO-ROUTE
mnt-irt:        IRT-MANGOTELESERVICE-BD
last-modified:  2022-09-18T07:58:17Z
source:         APNIC

irt:            IRT-MANGOTELESERVICE-BD
address:        82, Mohakhali Tower,Level-12, Dhaka-1212,Bangladesh
e-mail:         abuse@mango.com.bd
abuse-mailbox:  abuse@mango.com.bd
admin-c:        MA285-AP
tech-c:         MA285-AP
auth:           # Filtered
remarks:        abuse@mango.com.bd was validated on 2025-11-27
mnt-by:         MAINT-BD-MANGO
last-modified:  2026-01-25T15:14:57Z
source:         APNIC

organisation:   ORG-MTL1-AP
org-name:       Mango Teleservices Limited
org-type:       LIR
country:        BD
address:        Police Plaza Concord ( 7th Floor ), Tower-2, Road-144, Gulshan-1,
phone:          +880-2-8814507
fax-no:         +880-2-58814537
e-mail:         support@mango.com.bd
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:15:22Z
source:         APNIC

role:           ABUSE MANGOTELESERVICEBD
country:        ZZ
address:        82, Mohakhali Tower,Level-12, Dhaka-1212,Bangladesh
phone:          +000000000
e-mail:         abuse@mango.com.bd
admin-c:        MA285-AP
tech-c:         MA285-AP
nic-hdl:        AM2825-AP
remarks:        Generated from irt object IRT-MANGOTELESERVICE-BD
remarks:        abuse@mango.com.bd was validated on 2025-11-27
abuse-mailbox:  abuse@mango.com.bd
mnt-by:         APNIC-ABUSE
last-modified:  2025-11-27T11:58:31Z
source:         APNIC

role:           MANGO TELESERVICES LIMITED - network administrator
address:        Police Plaza Concord , 7th Floor, Tower-2, Gulshan-1, Dhaka-1212, Bangladesh
country:        BD
phone:          +880-2-8818830
fax-no:         +880-2-9884381
e-mail:         support@mango.com.bd
admin-c:        MTLn1-AP
tech-c:         MTLn1-AP
nic-hdl:        MTLN1-AP
mnt-by:         MAINT-MANGOTELESERVICE-BD
last-modified:  2024-01-19T03:15:39Z
abuse-mailbox:  abuse@mango.com.bd
remarks:        Please call +880173008810 for any kind of information and support.
source:         APNIC

person:         Mohammad Mahfuzul Hasan
address:        82 Mohakhali C/A, 12th Floor, Dhaka-1212, Bangladesh
country:        BD
phone:          +880-1755515883
e-mail:         mahfuzul.hasan@mango.com.bd
nic-hdl:        MMH18-AP
mnt-by:         MAINT-MANGOTELESERVICE-BD
last-modified:  2021-03-26T18:37:27Z
source:         APNIC

% Information related to '114.130.69.0/24AS17806'

route:          114.130.69.0/24
origin:         AS17806
descr:          Mango Teleservices Limited
                82 Mohakhali C/A ( 12th Floor )
mnt-by:         MAINT-MANGOTELESERVICE-BD
last-modified:  2019-10-23T06:35:03Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.130.69.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60667
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.130.69.241.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026022301 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 24 03:30:33 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 241.69.130.114.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 241.69.130.114.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
200.66.82.250 attack
Sep 13 14:15:25 django-0 sshd[11423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.66.82.250 
Sep 13 14:15:25 django-0 sshd[11423]: Invalid user zxc123 from 200.66.82.250
Sep 13 14:15:27 django-0 sshd[11423]: Failed password for invalid user zxc123 from 200.66.82.250 port 38164 ssh2
...
2020-09-13 22:15:59
178.184.121.232 attackbots
0,41-03/29 [bc02/m23] PostRequest-Spammer scoring: berlin
2020-09-13 21:41:11
222.186.30.112 attack
Sep 13 13:41:38 scw-6657dc sshd[29991]: Failed password for root from 222.186.30.112 port 29048 ssh2
Sep 13 13:41:38 scw-6657dc sshd[29991]: Failed password for root from 222.186.30.112 port 29048 ssh2
Sep 13 13:41:41 scw-6657dc sshd[29991]: Failed password for root from 222.186.30.112 port 29048 ssh2
...
2020-09-13 21:49:37
157.245.64.140 attackspam
Sep 13 13:18:42 ns382633 sshd\[686\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.64.140  user=root
Sep 13 13:18:44 ns382633 sshd\[686\]: Failed password for root from 157.245.64.140 port 55932 ssh2
Sep 13 13:24:34 ns382633 sshd\[1914\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.64.140  user=root
Sep 13 13:24:35 ns382633 sshd\[1914\]: Failed password for root from 157.245.64.140 port 33850 ssh2
Sep 13 13:28:18 ns382633 sshd\[2988\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.64.140  user=root
2020-09-13 22:09:29
14.244.200.128 attack
Icarus honeypot on github
2020-09-13 22:15:35
164.90.190.60 attackbots
" "
2020-09-13 22:00:26
36.82.133.6 attack
Attempt to login to the wordpress admin panel
2020-09-13 21:43:07
138.128.84.166 attack
Unauthorized access detected from black listed ip!
2020-09-13 22:01:35
206.217.128.106 attackbotsspam
Unauthorized access detected from black listed ip!
2020-09-13 21:58:59
103.94.121.206 attackbotsspam
20/9/12@12:58:28: FAIL: Alarm-Network address from=103.94.121.206
...
2020-09-13 21:51:35
167.172.152.143 attackspambots
167.172.152.143 (US/United States/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 13 07:14:35 jbs1 sshd[27366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.152.143  user=root
Sep 13 07:14:31 jbs1 sshd[27250]: Failed password for root from 106.69.228.182 port 39394 ssh2
Sep 13 07:14:26 jbs1 sshd[27224]: Failed password for root from 192.99.59.91 port 58028 ssh2
Sep 13 07:14:15 jbs1 sshd[27159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.45.102.170  user=root
Sep 13 07:14:16 jbs1 sshd[27159]: Failed password for root from 103.45.102.170 port 43628 ssh2

IP Addresses Blocked:
2020-09-13 21:50:16
120.85.61.233 attackbotsspam
Lines containing failures of 120.85.61.233
Sep 11 13:11:47 shared09 sshd[27496]: Invalid user game from 120.85.61.233 port 7444
Sep 11 13:11:47 shared09 sshd[27496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.85.61.233
Sep 11 13:11:50 shared09 sshd[27496]: Failed password for invalid user game from 120.85.61.233 port 7444 ssh2
Sep 11 13:11:50 shared09 sshd[27496]: Received disconnect from 120.85.61.233 port 7444:11: Bye Bye [preauth]
Sep 11 13:11:50 shared09 sshd[27496]: Disconnected from invalid user game 120.85.61.233 port 7444 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=120.85.61.233
2020-09-13 22:19:17
107.175.158.92 attackspam
Unauthorized access detected from black listed ip!
2020-09-13 22:03:32
111.92.52.207 attackspam
Telnet Honeypot -> Telnet Bruteforce / Login
2020-09-13 22:15:21
119.94.102.234 attackspam
spam
2020-09-13 22:08:05

最近上报的IP列表

20.100.193.95 121.43.118.205 192.36.137.155 10.43.208.203
124.239.14.175 95.214.52.209 47.246.174.120 27.46.125.40
124.221.248.247 159.89.51.193 118.78.163.6 20.169.107.229
212.11.61.20 194.26.192.19 43.156.116.171 66.253.5.20
122.10.116.162 34.142.201.109 121.127.34.138 44.203.84.138