必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Singapore

省份(region): unknown

国家(country): Singapore

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
124.156.200.106 attackbots
27016/udp 21/tcp 888/tcp...
[2020-08-10/10-02]9pkt,7pt.(tcp),1pt.(udp)
2020-10-04 07:26:52
124.156.200.106 attackbots
27016/udp 21/tcp 888/tcp...
[2020-08-10/10-02]9pkt,7pt.(tcp),1pt.(udp)
2020-10-03 23:42:03
124.156.200.237 attackbotsspam
Unauthorized connection attempt detected from IP address 124.156.200.237 to port 9200
2020-07-29 18:38:50
124.156.200.106 attackspambots
Unauthorized connection attempt detected from IP address 124.156.200.106 to port 5820 [T]
2020-04-15 01:18:13
124.156.200.237 attackspam
suspicious action Sun, 01 Mar 2020 18:46:46 -0300
2020-03-02 06:19:15
124.156.200.106 attackbotsspam
unauthorized connection attempt
2020-02-16 17:01:45
124.156.200.106 attack
Unauthorized connection attempt detected from IP address 124.156.200.106 to port 23 [J]
2020-02-04 00:38:45
124.156.200.237 attackspam
Unauthorized connection attempt detected from IP address 124.156.200.237 to port 22 [J]
2020-01-29 03:09:48
124.156.200.237 attack
Unauthorized connection attempt detected from IP address 124.156.200.237 to port 8880 [J]
2020-01-27 22:20:48
124.156.200.92 attackspam
Unauthorized connection attempt detected from IP address 124.156.200.92 to port 898 [J]
2020-01-26 03:51:08
124.156.200.237 attackspambots
Unauthorized connection attempt detected from IP address 124.156.200.237 to port 6666 [J]
2020-01-19 16:29:31
124.156.200.92 attackbotsspam
Unauthorized connection attempt detected from IP address 124.156.200.92 to port 8881 [J]
2020-01-14 17:58:26
124.156.200.106 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-24 03:38:47
124.156.200.56 attackbotsspam
php WP PHPmyadamin ABUSE blocked for 12h
2019-10-28 12:00:36
124.156.200.106 attack
1 pkts, ports: TCP:1311
2019-10-06 06:57:11
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '124.156.192.0 - 124.156.207.255'

% Abuse contact for '124.156.192.0 - 124.156.207.255' is 'abuse@tencent.com'

inetnum:        124.156.192.0 - 124.156.207.255
netname:        ACEVILLEPTELTD-SG
descr:          16 COLLYER QUAY
country:        IN
admin-c:        APA7-AP
tech-c:         APA7-AP
abuse-c:        AA1875-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-ACEVILLEPTELTD-SG
mnt-irt:        IRT-ACEVILLEPTELTD-SG
last-modified:  2022-02-16T18:09:26Z
source:         APNIC

irt:            IRT-ACEVILLEPTELTD-SG
address:        16 COLLYER QUAY,
e-mail:         qcloud_net_duty@tencent.com
abuse-mailbox:  abuse@tencent.com
admin-c:        APA7-AP
tech-c:         APA7-AP
auth:           # Filtered
remarks:        abuse@tencent.com was validated on 2025-10-29
remarks:        qcloud_net_duty@tencent.com is invalid
mnt-by:         MAINT-ACEVILLEPTELTD-SG
last-modified:  2026-04-08T13:10:51Z
source:         APNIC

role:           ABUSE ACEVILLEPTELTDSG
country:        ZZ
address:        16 COLLYER QUAY,
phone:          +000000000
e-mail:         qcloud_net_duty@tencent.com
admin-c:        APA7-AP
tech-c:         APA7-AP
nic-hdl:        AA1875-AP
remarks:        Generated from irt object IRT-ACEVILLEPTELTD-SG
remarks:        abuse@tencent.com was validated on 2025-10-29
remarks:        qcloud_net_duty@tencent.com is invalid
abuse-mailbox:  abuse@tencent.com
mnt-by:         APNIC-ABUSE
last-modified:  2026-04-08T13:16:57Z
source:         APNIC

role:           ACEVILLE PTELTD administrator
address:        16 COLLYER QUAY, #18-29, INCOME AT RAFFLES, SINGAPORE
country:        SG
phone:          +8613923479936
fax-no:         +8613923479936
e-mail:         qcloud_net_duty@tencent.com
admin-c:        APA7-AP
tech-c:         APA7-AP
nic-hdl:        APA7-AP
mnt-by:         MAINT-ACEVILLEPTELTD-SG
last-modified:  2023-03-17T12:36:41Z
source:         APNIC

% Information related to '124.156.0.0/16AS132203'

route:          124.156.0.0/16
origin:         AS132203
descr:          Tencent Cloud Computing (Beijing) Co., Ltd
                309 West Zone, 3F. 49 Zhichun Road. Haidian District.
mnt-by:         MAINT-TENCENT-CN
last-modified:  2018-05-25T10:47:57Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.156.200.223
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57520
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;124.156.200.223.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026051401 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 15 07:30:22 CST 2026
;; MSG SIZE  rcvd: 108
HOST信息:
Host 223.200.156.124.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 223.200.156.124.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
42.235.90.55 attackbotsspam
23/tcp
[2020-10-05]1pkt
2020-10-07 02:44:45
222.95.180.220 attackbots
23/tcp
[2020-10-05]1pkt
2020-10-07 02:48:14
221.122.73.130 attack
Oct  6 17:42:28 inter-technics sshd[31446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.122.73.130  user=root
Oct  6 17:42:29 inter-technics sshd[31446]: Failed password for root from 221.122.73.130 port 57772 ssh2
Oct  6 17:47:03 inter-technics sshd[31790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.122.73.130  user=root
Oct  6 17:47:05 inter-technics sshd[31790]: Failed password for root from 221.122.73.130 port 52347 ssh2
Oct  6 17:51:21 inter-technics sshd[32089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.122.73.130  user=root
Oct  6 17:51:24 inter-technics sshd[32089]: Failed password for root from 221.122.73.130 port 46921 ssh2
...
2020-10-07 02:47:13
152.136.71.9 attack
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-07 02:16:14
122.51.192.105 attack
(sshd) Failed SSH login from 122.51.192.105 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  6 12:09:42 optimus sshd[3889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.192.105  user=root
Oct  6 12:09:43 optimus sshd[3889]: Failed password for root from 122.51.192.105 port 51932 ssh2
Oct  6 12:19:30 optimus sshd[7367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.192.105  user=root
Oct  6 12:19:31 optimus sshd[7367]: Failed password for root from 122.51.192.105 port 47474 ssh2
Oct  6 12:20:57 optimus sshd[7831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.192.105  user=root
2020-10-07 02:47:28
193.112.163.159 attackspam
Oct  6 16:43:52 ns382633 sshd\[29948\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.163.159  user=root
Oct  6 16:43:54 ns382633 sshd\[29948\]: Failed password for root from 193.112.163.159 port 48210 ssh2
Oct  6 16:50:10 ns382633 sshd\[30950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.163.159  user=root
Oct  6 16:50:12 ns382633 sshd\[30950\]: Failed password for root from 193.112.163.159 port 43600 ssh2
Oct  6 16:53:24 ns382633 sshd\[31365\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.163.159  user=root
2020-10-07 02:34:29
172.105.110.26 attackbotsspam
[N1.H1.VM1] Port Scanner Detected Blocked by UFW
2020-10-07 02:46:11
45.65.222.154 attackbots
" "
2020-10-07 02:20:17
85.204.200.50 attackbots
445/tcp
[2020-10-05]1pkt
2020-10-07 02:24:38
123.157.112.49 attack
23/tcp
[2020-10-05]1pkt
2020-10-07 02:18:50
117.50.49.57 attack
Invalid user test2 from 117.50.49.57 port 51428
2020-10-07 02:35:32
198.199.89.152 attack
Oct  6 19:26:22 ns3164893 sshd[22965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.89.152  user=root
Oct  6 19:26:24 ns3164893 sshd[22965]: Failed password for root from 198.199.89.152 port 55384 ssh2
...
2020-10-07 02:51:06
14.231.153.95 attack
(eximsyntax) Exim syntax errors from 14.231.153.95 (VN/Vietnam/static.vnpt.vn): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-10-06 00:07:59 SMTP call from [14.231.153.95] dropped: too many syntax or protocol errors (last command was "?\034?\032?\027?\031?\034?\033?\030?\032?\026?\016?\r?\v?\f?	?")
2020-10-07 02:44:15
212.8.51.143 attackbotsspam
2020-10-06T15:12:04.471591mail.broermann.family sshd[11692]: Failed password for root from 212.8.51.143 port 50572 ssh2
2020-10-06T15:17:19.730686mail.broermann.family sshd[12185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.8.51.143  user=root
2020-10-06T15:17:21.875042mail.broermann.family sshd[12185]: Failed password for root from 212.8.51.143 port 57752 ssh2
2020-10-06T15:22:23.428300mail.broermann.family sshd[12675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.8.51.143  user=root
2020-10-06T15:22:25.305523mail.broermann.family sshd[12675]: Failed password for root from 212.8.51.143 port 36700 ssh2
...
2020-10-07 02:20:41
46.101.2.135 attack
" "
2020-10-07 02:41:15

最近上报的IP列表

43.99.58.227 2606:4700:10::6814:9412 2606:4700:10::6816:3656 35.241.130.26
20.48.166.247 54.91.225.59 54.146.183.54 165.232.61.133
39.100.82.100 180.105.218.135 54.86.2.95 43.132.126.14
171.91.131.243 121.234.219.100 2606:4700:10::6816:3486 2606:4700:10::ac43:2057
110.249.201.110 110.77.187.39 2606:4700:10::6814:8022 110.78.150.129