必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Banqiao

省份(region): New Taipei

国家(country): Taiwan, China

运营商(isp): Chunghwa

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '114.32.0.0 - 114.47.255.255'

% Abuse contact for '114.32.0.0 - 114.47.255.255' is 'abuse@hinet.net'

inetnum:        114.32.0.0 - 114.47.255.255
netname:        HINET-NET
descr:          Data Communication Business Group,
descr:          Chunghwa Telecom Co.,Ltd.
descr:          No.21, Sec.1, Xinyi Rd., Taipei City
descr:          10048, Taiwan
country:        TW
admin-c:        HN27-AP
tech-c:         HN27-AP
abuse-c:        AT939-AP
status:         ALLOCATED PORTABLE
mnt-by:         MAINT-TW-TWNIC
mnt-irt:        IRT-HINET-1-TW
last-modified:  2023-11-30T03:46:59Z
source:         APNIC

irt:            IRT-HINET-1-TW
address:        Data Communication Business Group,
address:        Chunghwa Telecom Co.,Ltd.
address:        No.21, Sec.1, Xinyi Rd., Taipei City
address:        10048, Taiwan
e-mail:         abuse@hinet.net
abuse-mailbox:  abuse@hinet.net
admin-c:        HN27-AP
tech-c:         HN27-AP
auth:           # Filtered
mnt-by:         MAINT-TW-TWNIC
last-modified:  2025-11-18T00:37:21Z
source:         APNIC

role:           ABUSE TWNICAP
country:        ZZ
address:        3F., No. 123, Sec. 4, Bade Rd., Songshan Dist., Taipei 105, Taiwan
phone:          +000000000
e-mail:         hostmaster@twnic.tw
admin-c:        TWA2-AP
tech-c:         TWA2-AP
nic-hdl:        AT939-AP
remarks:        Generated from irt object IRT-TWNIC-AP
remarks:        hostmaster@twnic.tw was validated on 2025-05-23
abuse-mailbox:  hostmaster@twnic.tw
mnt-by:         APNIC-ABUSE
last-modified:  2025-05-23T00:02:10Z
source:         APNIC

person:         HINET Network-Adm
address:        CHTD, Chunghwa Telecom Co., Ltd.
address:        No. 21, Sec. 21, Hsin-Yi Rd.,
address:        Taipei Taiwan 100
country:        TW
phone:          +886 2 2322 3495
phone:          +886 2 2322 3442
phone:          +886 2 2344 3007
fax-no:         +886 2 2344 2513
fax-no:         +886 2 2395 5671
e-mail:         network-adm@hinet.net
nic-hdl:        HN27-AP
remarks:        (hid:HN184-TW)
mnt-by:         MAINT-TW-TWNIC
last-modified:  2025-08-28T07:34:45Z
source:         APNIC

% Information related to '114.45.0.0 - 114.45.255.255'

inetnum:        114.45.0.0 - 114.45.255.255
netname:        HINET-NET
descr:          Chunghwa Telecom Data Communication Business Group
descr:          No.21, Hsin-Yi Rd., sec. 1
descr:          Taipei Taiwan
country:        TW
admin-c:        HN184-TW
tech-c:         HN184-TW
mnt-by:         MAINT-TW-TWNIC
changed:        network-adm@hinet.net 20080421
status:         ASSIGNED NON-PORTABLE
remarks:        Residential ADSL/FTTB
remarks:        This information has been partially mirrored by APNIC from
remarks:        TWNIC. To obtain more specific information, please use the
remarks:        TWNIC whois server at whois.twnic.net.
source:         TWNIC

person:         HINET Network-Adm
address:        Changhua Telecom Co., Ltd.
address:        No. 21, Sec. 21, Hsin-Yi Rd.
address:        Taipei Taiwan
country:        TW
phone:          +886-2-2322-3495
fax-no:         +886-2-2344-2513
e-mail:         network-adm@hinet.net
nic-hdl:        HN184-TW
changed:        hostmaster@twnic.net 20130307
remarks:        This information has been partially mirrored by APNIC from
remarks:        TWNIC. To obtain more specific information, please use the
remarks:        TWNIC whois server at whois.twnic.net.
source:         TWNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.45.192.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8707
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.45.192.212.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026051500 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 15 17:29:50 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
212.192.45.114.in-addr.arpa domain name pointer 114-45-192-212.dynamic-ip.hinet.net.
NSLOOKUP信息:
b'212.192.45.114.in-addr.arpa	name = 114-45-192-212.dynamic-ip.hinet.net.

Authoritative answers can be found from:

'
相关IP信息:
最新评论:
IP 类型 评论内容 时间
60.210.153.69 attackspam
Port Scan detected
2020-08-27 12:41:44
209.58.147.43 attack
(From info@vafamilychiropractic.com) Hi there

Be Buzz Free! The Original Mosquito Trap.
60% OFF for the next 24 Hours ONLY + FREE Worldwide Shipping
✔️LED Bionic Wave Technology
✔️Eco-Friendly
✔️15 Day Money-Back Guarantee

Shop Now: mosquitotrap.online

Best regards,

Sonak Family Chiropractic. Natural Family Wellness Care, Sterling Pregnancy and Pediatric Chiropractor
2020-08-27 12:38:03
222.186.180.17 attackbots
Aug 27 04:46:10 rush sshd[27540]: Failed password for root from 222.186.180.17 port 33736 ssh2
Aug 27 04:46:24 rush sshd[27540]: error: maximum authentication attempts exceeded for root from 222.186.180.17 port 33736 ssh2 [preauth]
Aug 27 04:46:31 rush sshd[27542]: Failed password for root from 222.186.180.17 port 48824 ssh2
...
2020-08-27 12:46:49
218.92.0.248 attackspam
Aug 27 06:51:51 nextcloud sshd\[22462\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.248  user=root
Aug 27 06:51:53 nextcloud sshd\[22462\]: Failed password for root from 218.92.0.248 port 59384 ssh2
Aug 27 06:51:57 nextcloud sshd\[22462\]: Failed password for root from 218.92.0.248 port 59384 ssh2
2020-08-27 12:53:14
163.172.93.13 attackspambots
163.172.93.13 - - [27/Aug/2020:05:38:36 +0200] "POST /wp-login.php HTTP/1.1" 200 5183 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
163.172.93.13 - - [27/Aug/2020:05:38:41 +0200] "POST /wp-login.php HTTP/1.1" 200 5169 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
163.172.93.13 - - [27/Aug/2020:05:38:42 +0200] "POST /wp-login.php HTTP/1.1" 200 5162 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
163.172.93.13 - - [27/Aug/2020:05:57:08 +0200] "POST /wp-login.php HTTP/1.1" 200 5222 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
163.172.93.13 - - [27/Aug/2020:05:57:18 +0200] "POST /wp-login.php HTTP/1.1" 200 5202 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-27 12:18:54
59.51.65.17 attackbotsspam
Aug 27 05:57:21 vpn01 sshd[23715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.51.65.17
Aug 27 05:57:23 vpn01 sshd[23715]: Failed password for invalid user dev1 from 59.51.65.17 port 56708 ssh2
...
2020-08-27 12:15:52
114.119.162.93 attack
Bad web bot already banned
2020-08-27 12:43:54
222.186.175.148 attackbots
Aug 27 04:33:08 localhost sshd[62809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148  user=root
Aug 27 04:33:10 localhost sshd[62809]: Failed password for root from 222.186.175.148 port 54996 ssh2
Aug 27 04:33:14 localhost sshd[62809]: Failed password for root from 222.186.175.148 port 54996 ssh2
Aug 27 04:33:08 localhost sshd[62809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148  user=root
Aug 27 04:33:10 localhost sshd[62809]: Failed password for root from 222.186.175.148 port 54996 ssh2
Aug 27 04:33:14 localhost sshd[62809]: Failed password for root from 222.186.175.148 port 54996 ssh2
Aug 27 04:33:08 localhost sshd[62809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148  user=root
Aug 27 04:33:10 localhost sshd[62809]: Failed password for root from 222.186.175.148 port 54996 ssh2
Aug 27 04:33:14 localhost sshd[62
...
2020-08-27 12:33:46
66.33.193.163 attackbotsspam
Automatic report - XMLRPC Attack
2020-08-27 12:34:12
114.231.42.74 attackbotsspam
Brute force attempt
2020-08-27 12:32:04
185.229.243.2 attackspambots
Aug 27 05:56:39 mail postfix/smtpd[18556]: lost connection after CONNECT from unknown[185.229.243.2]
2020-08-27 12:31:14
85.209.0.103 attackspam
...
2020-08-27 12:48:31
222.186.190.14 attack
Aug 27 00:58:36 plusreed sshd[32022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.14  user=root
Aug 27 00:58:37 plusreed sshd[32022]: Failed password for root from 222.186.190.14 port 10984 ssh2
...
2020-08-27 12:59:46
206.189.221.212 attackbots
$f2bV_matches
2020-08-27 12:17:14
167.71.13.196 attackspam
Unwanted checking 80 or 443 port
...
2020-08-27 12:23:25

最近上报的IP列表

109.166.36.99 43.156.67.44 121.234.219.166 106.120.7.251
103.202.61.162 2606:4700:10::ac43:1470 2606:4700:10::6814:8138 2606:4700:10::ac43:1615
2606:4700:10::6816:1496 46.172.192.160 203.160.80.9 103.62.0.113
34.81.132.210 2606:4700:10::6816:3347 88.101.166.91 2606:4700:10::6816:4501
245.197.2.177 175.6.180.214 39.105.108.88 43.134.114.37