必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Pakistan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '119.30.64.0 - 119.30.127.255'

% Abuse contact for '119.30.64.0 - 119.30.127.255' is 'TEC-ABUSEREPORTTEAM@jazz.com.pk'

inetnum:        119.30.64.0 - 119.30.127.255
netname:        LINKDOTNET
descr:          LINKdotNET Telecom Limited
descr:          Network Service Provider
country:        PK
org:            ORG-LTL4-AP
admin-c:        LH1008-AP
tech-c:         LH1008-AP
abuse-c:        AL1494-AP
status:         ALLOCATED PORTABLE
remarks:        -+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+
remarks:        This object can only be updated by APNIC hostmasters.
remarks:        To update this object, please contact APNIC
remarks:        hostmasters and include your organisation's account
remarks:        name in the subject line.
remarks:        * For abuse/spam related to this IP address block,
remarks:        * please send email to: abuse@link.net.pk
remarks:        -+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+
notify:         hostmaster@link.net.pk
mnt-by:         APNIC-HM
mnt-lower:      MAINT-PK-LDN
mnt-routes:     MAINT-PK-LDN
mnt-irt:        IRT-LINKDOTNET-PK
last-modified:  2020-06-29T06:41:58Z
source:         APNIC

irt:            IRT-LINKDOTNET-PK
address:        Block 2-A, FJ Plaza,
address:        Markaz F-7, Islamabad, Pakistan
e-mail:         DATACOREENGINEERING-TECHNOLGYDEVELOPMENT@jazz.com.pk
abuse-mailbox:  TEC-ABUSEREPORTTEAM@jazz.com.pk
admin-c:        TCET1-AP
tech-c:         TCET1-AP
auth:           # Filtered
remarks:        datacoreengineering-technolgydevelopment@jazz.com.pk was validated on 2025-12-10
remarks:        tec-abusereportteam@jazz.com.pk was validated on 2026-01-07
mnt-by:         MAINT-PK-LDN
last-modified:  2026-01-07T13:33:46Z
source:         APNIC

organisation:   ORG-LTL4-AP
org-name:       Linkdotnet Telecom Limited
org-type:       LIR
country:        PK
address:        LINKdotNET/Mobilink
address:        1st Floor, IBC-III, 16-E Kohistan Road
address:        F-8 Markaz
phone:          +92-42-111600222
fax-no:         +92-42-5833277
e-mail:         lakht.hassnain@jazz.com.pk
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:14:49Z
source:         APNIC

role:           ABUSE LINKDOTNETPK
country:        ZZ
address:        Block 2-A, FJ Plaza,
address:        Markaz F-7, Islamabad, Pakistan
phone:          +000000000
e-mail:         DATACOREENGINEERING-TECHNOLGYDEVELOPMENT@jazz.com.pk
admin-c:        TCET1-AP
tech-c:         TCET1-AP
nic-hdl:        AL1494-AP
remarks:        Generated from irt object IRT-LINKDOTNET-PK
remarks:        datacoreengineering-technolgydevelopment@jazz.com.pk was validated on 2025-12-10
remarks:        tec-abusereportteam@jazz.com.pk was validated on 2026-01-07
abuse-mailbox:  TEC-ABUSEREPORTTEAM@jazz.com.pk
mnt-by:         APNIC-ABUSE
last-modified:  2026-01-07T13:34:31Z
source:         APNIC

role:           LINKdotNET Hostmaster
address:        House # 28, Agha Khan Road
address:        F-6/4, Islamabad, Pakistan
country:        PK
phone:          +92-51-111600222
fax-no:         +92-51-2650220
e-mail:         DATACOREENGINEERING-TECHNOLGYDEVELOPMENT@jazz.com.pk
admin-c:        IS786-AP
tech-c:         IS786-AP
nic-hdl:        LH1008-AP
notify:         DATACOREENGINEERING-TECHNOLGYDEVELOPMENT@jazz.com.pk
mnt-by:         MAINT-PK-LDN
last-modified:  2021-07-05T06:00:39Z
abuse-mailbox:  TEC-ABUSEREPORTTEAM@jazz.com.pk
source:         APNIC

% Information related to '119.30.118.0/24AS45669'

route:          119.30.118.0/24
origin:         AS45669
descr:          Linkdotnet Telecom Limited
                LINKdotNET/Mobilink
                1st Floor, IBC-III, 16-E Kohistan Road
                F-8 Markaz
mnt-by:         MAINT-PK-LDN
last-modified:  2024-02-29T13:15:04Z
source:         APNIC

% Information related to '119.30.118.0/24AS58470'

route:          119.30.118.0/24
origin:         AS58470
descr:          Linkdotnet Telecom Limited
                LINKdotNET/Mobilink
                1st Floor, IBC-III, 16-E Kohistan Road
                F-8 Markaz
mnt-by:         MAINT-PK-LDN
last-modified:  2025-04-04T10:49:51Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.30.118.181
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60504
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.30.118.181.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041700 1800 900 604800 86400

;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 17 12:01:00 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
181.118.30.119.in-addr.arpa domain name pointer static-host119-30-118-181.link.net.pk.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
181.118.30.119.in-addr.arpa	name = static-host119-30-118-181.link.net.pk.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.38.80.173 attackspambots
2020-03-26T04:54:23.690196librenms sshd[7597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.ip-51-38-80.eu
2020-03-26T04:54:23.687176librenms sshd[7597]: Invalid user by from 51.38.80.173 port 35402
2020-03-26T04:54:25.917581librenms sshd[7597]: Failed password for invalid user by from 51.38.80.173 port 35402 ssh2
...
2020-03-26 13:13:49
41.170.14.90 attack
Mar 26 03:56:39 *** sshd[29904]: Invalid user jasper from 41.170.14.90
2020-03-26 12:52:09
111.229.104.94 attackbotsspam
Mar 26 06:02:10 [host] sshd[22891]: Invalid user p
Mar 26 06:02:10 [host] sshd[22891]: pam_unix(sshd:
Mar 26 06:02:13 [host] sshd[22891]: Failed passwor
2020-03-26 13:42:53
181.210.91.170 attackspam
port scan and connect, tcp 80 (http)
2020-03-26 13:48:49
216.83.52.120 attackbots
Mar 26 04:54:23 serwer sshd\[16162\]: Invalid user laboratory from 216.83.52.120 port 27332
Mar 26 04:54:23 serwer sshd\[16162\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.83.52.120
Mar 26 04:54:26 serwer sshd\[16162\]: Failed password for invalid user laboratory from 216.83.52.120 port 27332 ssh2
...
2020-03-26 13:12:18
103.129.13.107 attackspambots
fail2ban
2020-03-26 13:07:02
150.136.236.53 attackspam
k+ssh-bruteforce
2020-03-26 13:17:44
141.98.10.141 attackspam
Mar 26 05:15:00 srv01 postfix/smtpd\[22432\]: warning: unknown\[141.98.10.141\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 26 05:31:49 srv01 postfix/smtpd\[22432\]: warning: unknown\[141.98.10.141\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 26 05:33:51 srv01 postfix/smtpd\[31736\]: warning: unknown\[141.98.10.141\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 26 05:34:38 srv01 postfix/smtpd\[22432\]: warning: unknown\[141.98.10.141\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 26 05:34:56 srv01 postfix/smtpd\[31735\]: warning: unknown\[141.98.10.141\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-03-26 12:49:59
167.99.170.160 attack
F2B blocked SSH BF
2020-03-26 13:09:08
104.236.142.200 attackspam
2020-03-26T04:20:23.353743dmca.cloudsearch.cf sshd[29061]: Invalid user es from 104.236.142.200 port 56726
2020-03-26T04:20:23.359030dmca.cloudsearch.cf sshd[29061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.142.200
2020-03-26T04:20:23.353743dmca.cloudsearch.cf sshd[29061]: Invalid user es from 104.236.142.200 port 56726
2020-03-26T04:20:25.057620dmca.cloudsearch.cf sshd[29061]: Failed password for invalid user es from 104.236.142.200 port 56726 ssh2
2020-03-26T04:26:55.586543dmca.cloudsearch.cf sshd[29579]: Invalid user fr from 104.236.142.200 port 45880
2020-03-26T04:26:55.592491dmca.cloudsearch.cf sshd[29579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.142.200
2020-03-26T04:26:55.586543dmca.cloudsearch.cf sshd[29579]: Invalid user fr from 104.236.142.200 port 45880
2020-03-26T04:26:58.108645dmca.cloudsearch.cf sshd[29579]: Failed password for invalid user fr from 104.236.142.20
...
2020-03-26 13:24:07
115.238.44.237 attackbots
port scan and connect, tcp 22 (ssh)
2020-03-26 13:48:10
51.254.122.71 attack
Mar 26 09:37:32 gw1 sshd[8609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.122.71
Mar 26 09:37:34 gw1 sshd[8609]: Failed password for invalid user 1234567890 from 51.254.122.71 port 51204 ssh2
...
2020-03-26 12:58:04
120.132.6.27 attackspambots
(sshd) Failed SSH login from 120.132.6.27 (CN/China/-): 5 in the last 3600 secs
2020-03-26 13:28:27
79.106.4.202 attack
CMS (WordPress or Joomla) login attempt.
2020-03-26 13:01:00
91.121.159.180 attackbots
Mar 26 03:54:22 work-partkepr sshd\[29785\]: Invalid user robot from 91.121.159.180 port 46802
Mar 26 03:54:22 work-partkepr sshd\[29785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.159.180
...
2020-03-26 13:21:27

最近上报的IP列表

66.132.172.32 2606:4700:10::6814:5893 2606:4700:10::6816:2799 2606:4700:10::6814:7859
2606:4700:10::6814:4951 194.36.32.205 103.136.32.14 45.180.134.197
172.232.232.10 220.197.78.83 175.30.48.231 112.94.189.34
105.191.36.188 176.65.139.101 2606:4700:10::6816:4018 2606:4700:10::6814:4721
2606:4700:10::6814:8297 2606:4700:10::6816:2612 2606:4700:10::6814:8986 2606:4700:10::6816:3393