必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Australia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '119.11.0.0 - 119.11.127.255'

% Abuse contact for '119.11.0.0 - 119.11.127.255' is 'ipadmin@tpgtelecom.com.au'

inetnum:        119.11.0.0 - 119.11.127.255
netname:        VODAFONE
descr:          VODAFONE AUSTRALIA PTY LIMITED
descr:          Mobile Service Provider
descr:          40 Mount Street
descr:          North Sydney
descr:          NSW 2060
country:        AU
org:            ORG-VAPL1-AP
admin-c:        VNA1-AP
tech-c:         VNA1-AP
abuse-c:        AV465-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-AU-VODAFONE
mnt-routes:     MAINT-AU-VODAFONE
mnt-irt:        IRT-VODAFONE-AU
last-modified:  2021-01-12T03:03:42Z
source:         APNIC

irt:            IRT-VODAFONE-AU
address:        Level 1
address:        177 Pacific Highway
address:        North Sydney
address:        NSW
e-mail:         ipadmin@tpgtelecom.com.au
abuse-mailbox:  ipadmin@tpgtelecom.com.au
admin-c:        IA219-AP
tech-c:         IA219-AP
auth:           # Filtered
remarks:        ipadmin@tpgtelecom.com.au was validated on 2025-09-24
mnt-by:         MAINT-AU-VODAFONE
last-modified:  2025-11-18T00:26:23Z
source:         APNIC

organisation:   ORG-VAPL1-AP
org-name:       Vodafone Australia Pty Ltd
org-type:       LIR
country:        AU
address:        Level 27, Tower Two, International Towers Sydney
address:        200 Barangaroo Avenue
phone:          +61-2-9415-7000
fax-no:         +61-2-9415-7479
e-mail:         chris.tsigros@tpgtelecom.com.au
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2024-08-02T12:55:42Z
source:         APNIC

role:           ABUSE VODAFONEAU
country:        ZZ
address:        Level 1
address:        177 Pacific Highway
address:        North Sydney
address:        NSW
phone:          +000000000
e-mail:         ipadmin@tpgtelecom.com.au
admin-c:        IA219-AP
tech-c:         IA219-AP
nic-hdl:        AV465-AP
remarks:        Generated from irt object IRT-VODAFONE-AU
remarks:        ipadmin@tpgtelecom.com.au was validated on 2025-09-24
abuse-mailbox:  ipadmin@tpgtelecom.com.au
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-24T23:00:10Z
source:         APNIC

role:           Vodafone Network Admin
address:        ATTN: IPN, Level 1, 177 Pacific Highway
address:        North Sydney, NSW, 2060
country:        AU
phone:          +61-2-94157999
e-mail:         IPAdmin@vodafone.com.au
admin-c:        IA219-AP
tech-c:         IA219-AP
nic-hdl:        VNA1-AP
abuse-mailbox:  infosec@vodafone.com.au
mnt-by:         MAINT-AU-VODAFONE
last-modified:  2021-03-08T05:22:04Z
source:         APNIC

% Information related to '119.11.26.0/24AS133612'

route:          119.11.26.0/24
descr:          route object for  119.11.26.0/24
country:        AU
origin:         AS133612
mnt-lower:      MAINT-AU-VODAFONE
mnt-routes:     MAINT-AU-VODAFONE
mnt-by:         MAINT-AU-VODAFONE
member-of:      AS133612:RS-routes
last-modified:  2016-01-21T23:05:44Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.11.26.185
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60254
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.11.26.185.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032502 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 26 13:10:58 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 185.26.11.119.in-addr.arpa. not found: 3(NXDOMAIN)
'
NSLOOKUP信息:
server can't find 119.11.26.185.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
170.84.39.18 attack
postfix
2019-11-07 19:03:41
14.63.165.49 attackbots
Nov  7 11:41:18 rotator sshd\[2793\]: Invalid user finger from 14.63.165.49Nov  7 11:41:20 rotator sshd\[2793\]: Failed password for invalid user finger from 14.63.165.49 port 47458 ssh2Nov  7 11:46:07 rotator sshd\[3584\]: Invalid user brigitte from 14.63.165.49Nov  7 11:46:10 rotator sshd\[3584\]: Failed password for invalid user brigitte from 14.63.165.49 port 38663 ssh2Nov  7 11:50:53 rotator sshd\[4378\]: Invalid user falcon123 from 14.63.165.49Nov  7 11:50:55 rotator sshd\[4378\]: Failed password for invalid user falcon123 from 14.63.165.49 port 58101 ssh2
...
2019-11-07 18:59:36
181.126.83.125 attack
Nov  7 13:06:59 gw1 sshd[20105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.126.83.125
Nov  7 13:07:01 gw1 sshd[20105]: Failed password for invalid user tomcat from 181.126.83.125 port 45090 ssh2
...
2019-11-07 18:56:10
106.12.17.43 attackspam
Nov  7 09:38:11 root sshd[21224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.17.43 
Nov  7 09:38:13 root sshd[21224]: Failed password for invalid user yd from 106.12.17.43 port 57292 ssh2
Nov  7 09:45:13 root sshd[21317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.17.43 
...
2019-11-07 18:50:46
222.186.175.169 attack
2019-11-06 UTC: 4x - (4x)
2019-11-07 18:57:56
177.42.129.24 attack
Automatic report - Port Scan Attack
2019-11-07 19:28:11
122.175.55.196 attack
2019-11-07T06:57:25.901857abusebot-6.cloudsearch.cf sshd\[29695\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.175.55.196  user=root
2019-11-07 19:00:06
79.22.190.243 attackbots
Fail2Ban Ban Triggered
2019-11-07 19:08:18
41.223.142.211 attackbots
Nov  7 16:54:53 vibhu-HP-Z238-Microtower-Workstation sshd\[25986\]: Invalid user !QAZ3edc%TGBg from 41.223.142.211
Nov  7 16:54:53 vibhu-HP-Z238-Microtower-Workstation sshd\[25986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.223.142.211
Nov  7 16:54:55 vibhu-HP-Z238-Microtower-Workstation sshd\[25986\]: Failed password for invalid user !QAZ3edc%TGBg from 41.223.142.211 port 56637 ssh2
Nov  7 16:59:58 vibhu-HP-Z238-Microtower-Workstation sshd\[26165\]: Invalid user steamsteam from 41.223.142.211
Nov  7 16:59:58 vibhu-HP-Z238-Microtower-Workstation sshd\[26165\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.223.142.211
...
2019-11-07 19:30:02
139.199.159.77 attackspambots
2019-11-07T08:35:19.649229abusebot-4.cloudsearch.cf sshd\[4845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.159.77  user=root
2019-11-07 18:55:24
45.82.32.152 attackspambots
Nov  7 06:16:24 web01 postfix/smtpd[8002]: connect from talk.oliviertylczak.com[45.82.32.152]
Nov  7 06:16:24 web01 policyd-spf[9302]: None; identhostnamey=helo; client-ip=45.82.32.152; helo=talk.lnndc.com; envelope-from=x@x
Nov  7 06:16:24 web01 policyd-spf[9302]: Pass; identhostnamey=mailfrom; client-ip=45.82.32.152; helo=talk.lnndc.com; envelope-from=x@x
Nov x@x
Nov  7 06:16:25 web01 postfix/smtpd[8002]: disconnect from talk.oliviertylczak.com[45.82.32.152]
Nov  7 06:16:33 web01 postfix/smtpd[8002]: connect from talk.oliviertylczak.com[45.82.32.152]
Nov  7 06:16:33 web01 policyd-spf[9302]: None; identhostnamey=helo; client-ip=45.82.32.152; helo=talk.lnndc.com; envelope-from=x@x
Nov  7 06:16:33 web01 policyd-spf[9302]: Pass; identhostnamey=mailfrom; client-ip=45.82.32.152; helo=talk.lnndc.com; envelope-from=x@x
Nov x@x
Nov  7 06:16:33 web01 postfix/smtpd[8002]: disconnect from talk.oliviertylczak.com[45.82.32.152]
Nov  7 06:25:24 web01 postfix/smtpd[9127]: connect fro........
-------------------------------
2019-11-07 19:26:03
180.66.195.79 attackbotsspam
3 failed attempts at connecting to SSH.
2019-11-07 19:10:44
194.28.115.251 attack
WEB_SERVER 403 Forbidden
2019-11-07 19:07:21
104.236.52.94 attackspam
2019-11-07T09:33:25.363656tmaserv sshd\[3968\]: Failed password for root from 104.236.52.94 port 45320 ssh2
2019-11-07T10:36:57.777877tmaserv sshd\[7106\]: Invalid user smartkey from 104.236.52.94 port 60748
2019-11-07T10:36:57.782781tmaserv sshd\[7106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.52.94
2019-11-07T10:36:59.350649tmaserv sshd\[7106\]: Failed password for invalid user smartkey from 104.236.52.94 port 60748 ssh2
2019-11-07T10:41:24.602386tmaserv sshd\[7325\]: Invalid user uriel from 104.236.52.94 port 41694
2019-11-07T10:41:24.607290tmaserv sshd\[7325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.52.94
...
2019-11-07 19:29:33
45.125.65.99 attack
\[2019-11-07 06:00:55\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-07T06:00:55.090-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="6722101148585359060",SessionID="0x7fdf2c836d78",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.65.99/49368",ACLName="no_extension_match"
\[2019-11-07 06:01:47\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-07T06:01:47.788-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="6387501148556213011",SessionID="0x7fdf2c003608",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.65.99/54867",ACLName="no_extension_match"
\[2019-11-07 06:01:51\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-07T06:01:51.370-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="6058601148343508002",SessionID="0x7fdf2c836d78",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.65.99/63054",ACLNam
2019-11-07 19:04:27

最近上报的IP列表

103.181.165.69 2606:4700:10::6814:6986 2606:4700:10::6814:9761 2606:4700:10::6816:3461
2606:4700:10::6816:4823 2606:4700:10::6816:3089 2606:4700:10::6814:9644 2606:4700:10::6814:8976
2606:4700:10::ac43:47e 2606:4700:10::6816:2482 2606:4700:10::6814:4687 122.193.247.96
10.255.32.160 218.204.167.202 2606:4700:10::6816:4687 121.234.219.134
2606:4700:10::6816:3046 2606:4700:10::6814:8864 2606:4700:10::6816:3021 2606:4700:10::6816:1464