必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Bangkok

省份(region): Bangkok

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '116.204.183.0 - 116.204.183.255'

% Abuse contact for '116.204.183.0 - 116.204.183.255' is 'abuse@bangmod.cloud'

inetnum:        116.204.183.0 - 116.204.183.255
netname:        BANGMOD-TH
descr:          Bangmod Enterprise Co., Ltd.
country:        TH
admin-c:        BEA2-AP
tech-c:         BEA2-AP
abuse-c:        AB1114-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-BANGMODENTERPRISE-TH
mnt-irt:        IRT-BANGMODENTERPRISE-TH
last-modified:  2023-11-30T06:39:55Z
source:         APNIC

irt:            IRT-BANGMODENTERPRISE-TH
address:        Bangmod Enterprise Co., Ltd.
e-mail:         support@bangmod.co.th
abuse-mailbox:  abuse@bangmod.cloud
admin-c:        BEA2-AP
tech-c:         BEA2-AP
auth:           # Filtered
remarks:        support@bangmod.co.th was validated on 2026-01-21
remarks:        abuse@bangmod.cloud was validated on 2026-02-25
mnt-by:         MAINT-BANGMODENTERPRISE-TH
last-modified:  2026-04-08T15:24:57Z
source:         APNIC

role:           ABUSE BANGMODENTERPRISETH
country:        ZZ
address:        Bangmod Enterprise Co., Ltd.
phone:          +000000000
e-mail:         support@bangmod.co.th
admin-c:        BEA2-AP
tech-c:         BEA2-AP
nic-hdl:        AB1114-AP
remarks:        Generated from irt object IRT-BANGMODENTERPRISE-TH
remarks:        support@bangmod.co.th was validated on 2026-01-21
remarks:        abuse@bangmod.cloud was validated on 2026-02-25
abuse-mailbox:  abuse@bangmod.cloud
mnt-by:         APNIC-ABUSE
last-modified:  2026-02-25T04:27:52Z
source:         APNIC

role:           Bangmod Enterprise administrator
address:        145/18-19 Hong Tower FL.2 Room A.201 Bangkhuntian-Chaitalay Rd., Samaedum, Bangkhuntian, Bangkok 10150
country:        TH
phone:          +6621054417
e-mail:         abuse@bangmod.cloud
admin-c:        BEA2-AP
tech-c:         BEA2-AP
nic-hdl:        BEA2-AP
mnt-by:         MAINT-BANGMODENTERPRISE-TH
last-modified:  2025-08-20T17:37:12Z
source:         APNIC

% Information related to '116.204.183.0/24AS58955'

route:          116.204.183.0/24
descr:          Bangmod Enterprise Co., Ltd.
origin:         AS58955
mnt-by:         MAINT-BANGMODENTERPRISE-TH
last-modified:  2023-12-02T08:19:13Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.204.183.163
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52339
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.204.183.163.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041800 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 19 01:11:37 CST 2026
;; MSG SIZE  rcvd: 108
HOST信息:
b'163.183.204.116.in-addr.arpa domain name pointer 116-204-183-163.static.bangmod-idc.com.
'
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
163.183.204.116.in-addr.arpa	name = 116-204-183-163.static.bangmod-idc.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
167.172.171.234 attackspambots
$f2bV_matches
2020-03-05 16:48:43
136.233.21.27 attackspam
Unauthorized connection attempt from IP address 136.233.21.27 on Port 445(SMB)
2020-03-05 16:37:57
46.21.100.222 attack
" "
2020-03-05 16:04:43
159.203.30.120 attackspam
" "
2020-03-05 16:33:29
94.96.115.148 attack
Email rejected due to spam filtering
2020-03-05 16:15:46
92.63.194.32 attackbotsspam
Mar  5 09:12:11 localhost sshd\[22819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.32  user=root
Mar  5 09:12:13 localhost sshd\[22819\]: Failed password for root from 92.63.194.32 port 41875 ssh2
Mar  5 09:12:35 localhost sshd\[22906\]: Invalid user admin from 92.63.194.32
Mar  5 09:12:35 localhost sshd\[22906\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.32
Mar  5 09:12:37 localhost sshd\[22906\]: Failed password for invalid user admin from 92.63.194.32 port 44437 ssh2
...
2020-03-05 16:16:54
96.64.149.69 attack
Mar  5 05:47:26 rotator sshd\[32068\]: Invalid user admin from 96.64.149.69Mar  5 05:47:28 rotator sshd\[32068\]: Failed password for invalid user admin from 96.64.149.69 port 52080 ssh2Mar  5 05:48:54 rotator sshd\[32080\]: Invalid user ubuntu from 96.64.149.69Mar  5 05:48:57 rotator sshd\[32080\]: Failed password for invalid user ubuntu from 96.64.149.69 port 52148 ssh2Mar  5 05:50:22 rotator sshd\[32754\]: Invalid user pi from 96.64.149.69Mar  5 05:50:24 rotator sshd\[32754\]: Failed password for invalid user pi from 96.64.149.69 port 52210 ssh2
...
2020-03-05 16:23:16
71.6.158.166 attack
71.6.158.166 - - [05/Mar/2020:09:06:32 +0800] "quit" 400 150 "-" "-" "-"
2020-03-05 16:13:23
165.22.33.32 attack
Mar  5 08:46:40 sd-53420 sshd\[13615\]: Invalid user qdxx from 165.22.33.32
Mar  5 08:46:40 sd-53420 sshd\[13615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.33.32
Mar  5 08:46:42 sd-53420 sshd\[13615\]: Failed password for invalid user qdxx from 165.22.33.32 port 56404 ssh2
Mar  5 08:52:49 sd-53420 sshd\[14159\]: Invalid user wangyu from 165.22.33.32
Mar  5 08:52:49 sd-53420 sshd\[14159\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.33.32
...
2020-03-05 16:10:45
92.63.194.59 attackbotsspam
(sshd) Failed SSH login from 92.63.194.59 (NL/Netherlands/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar  5 09:05:33 ubnt-55d23 sshd[7270]: Invalid user admin from 92.63.194.59 port 37267
Mar  5 09:05:35 ubnt-55d23 sshd[7270]: Failed password for invalid user admin from 92.63.194.59 port 37267 ssh2
2020-03-05 16:11:07
31.173.243.25 attack
Email rejected due to spam filtering
2020-03-05 16:05:54
112.85.42.182 attackbots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.182  user=root
Failed password for root from 112.85.42.182 port 38551 ssh2
Failed password for root from 112.85.42.182 port 38551 ssh2
Failed password for root from 112.85.42.182 port 38551 ssh2
Failed password for root from 112.85.42.182 port 38551 ssh2
2020-03-05 16:13:01
222.186.175.217 attack
Mar  5 09:25:31 [host] sshd[10453]: pam_unix(sshd:
Mar  5 09:25:33 [host] sshd[10453]: Failed passwor
Mar  5 09:25:37 [host] sshd[10453]: Failed passwor
2020-03-05 16:26:43
222.73.44.71 attack
firewall-block, port(s): 445/tcp
2020-03-05 16:28:48
217.87.186.164 attackspambots
Mar  5 06:18:03 roki sshd[18294]: Invalid user pi from 217.87.186.164
Mar  5 06:18:03 roki sshd[18294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.87.186.164
Mar  5 06:18:05 roki sshd[18294]: Failed password for invalid user pi from 217.87.186.164 port 60436 ssh2
Mar  5 06:21:19 roki sshd[18502]: Invalid user pi from 217.87.186.164
Mar  5 06:21:19 roki sshd[18502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.87.186.164
...
2020-03-05 16:31:24

最近上报的IP列表

166.88.142.143 66.132.195.103 222.199.16.39 116.204.183.187
2606:4700:10::6814:5922 2606:4700:10::6814:6162 2606:4700:10::6816:3845 35.249.72.11
192.71.126.151 114.32.76.133 109.162.246.95 2606:4700:10::6816:2894
2606:4700:10::6814:7687 2606:4700:10::6814:4608 2606:4700:10::6816:2464 164.155.74.156
20.65.137.167 2606:4700:10::6816:1384 2606:4700:10::6816:2814 2606:4700:10::ac43:2011