必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Yangon

省份(region): Yangon

国家(country): Myanmar

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '150.228.148.0 - 150.228.149.255'

% Abuse contact for '150.228.148.0 - 150.228.149.255' is 'starlink-admin@spacex.com'

inetnum:        150.228.148.0 - 150.228.149.255
netname:        STARLINK_SNGESGP1_MM
descr:          Starlink IPv4 Customer Space
country:        MM
geofeed:        https://geoip.starlinkisp.net/
admin-c:        SSIA2-AP
tech-c:         AS2380-AP
abuse-c:        AS2380-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-SPACEX-AP
mnt-irt:        IRT-SPACEX-AP
last-modified:  2026-03-27T19:31:20Z
source:         APNIC

irt:            IRT-SPACEX-AP
address:        1 Rocket Rd, Hawthorne CA 90250
e-mail:         starlink-admin@spacex.com
abuse-mailbox:  starlink-admin@spacex.com
admin-c:        SSIA2-AP
tech-c:         SSIA2-AP
auth:           # Filtered
remarks:        starlink-admin@spacex.com was validated on 2026-03-27
mnt-by:         MAINT-SPACEX-AP
last-modified:  2026-03-27T23:03:32Z
source:         APNIC

role:           ABUSE SPACEXAP
country:        ZZ
address:        1 Rocket Rd, Hawthorne CA 90250
phone:          +000000000
e-mail:         starlink-admin@spacex.com
admin-c:        SSIA2-AP
tech-c:         SSIA2-AP
nic-hdl:        AS2380-AP
remarks:        Generated from irt object IRT-SPACEX-AP
remarks:        starlink-admin@spacex.com was validated on 2026-03-27
abuse-mailbox:  starlink-admin@spacex.com
mnt-by:         APNIC-ABUSE
last-modified:  2026-03-27T23:04:07Z
source:         APNIC

role:           SpaceX Services Inc administrator
address:        1 Rocket Rd, Hawthorne CA 90250
country:        US
phone:          +1-310-363-6000
e-mail:         starlink-admin@spacex.com
admin-c:        SSIA2-AP
tech-c:         SSIN3-AP
nic-hdl:        SSIA2-AP
mnt-by:         MAINT-SPACEX-AP
last-modified:  2021-09-06T17:22:13Z
source:         APNIC

% Information related to '150.228.149.0/24AS14593'

route:          150.228.149.0/24
origin:         AS14593
descr:          SpaceX Services, Inc.
                1 Rocket Rd
mnt-by:         MAINT-SPACEX-AP
last-modified:  2026-02-13T18:14:56Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.228.149.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11743
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;150.228.149.164.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026050300 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 03 18:35:49 CST 2026
;; MSG SIZE  rcvd: 108
HOST信息:
164.149.228.150.in-addr.arpa domain name pointer customer.sngesgp1.isp.starlink.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
164.149.228.150.in-addr.arpa	name = customer.sngesgp1.isp.starlink.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
196.196.235.113 attackspambots
NAME : "" "" CIDR :  | STATUS : 403 {Looking for resource vulnerabilities} DDoS Attack  - block certain countries :) IP: 196.196.235.113  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-08-21 06:54:12
142.93.222.197 attack
Aug 20 12:51:44 vps200512 sshd\[13871\]: Invalid user it from 142.93.222.197
Aug 20 12:51:44 vps200512 sshd\[13871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.197
Aug 20 12:51:47 vps200512 sshd\[13871\]: Failed password for invalid user it from 142.93.222.197 port 46844 ssh2
Aug 20 12:56:50 vps200512 sshd\[13981\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.197  user=root
Aug 20 12:56:53 vps200512 sshd\[13981\]: Failed password for root from 142.93.222.197 port 37024 ssh2
2019-08-21 06:56:35
46.105.137.251 attackspambots
$f2bV_matches
2019-08-21 07:12:25
187.120.129.55 attackspambots
$f2bV_matches
2019-08-21 07:14:28
46.101.235.214 attack
Aug 20 22:35:39 ns315508 sshd[5321]: Invalid user clamav1 from 46.101.235.214 port 48188
Aug 20 22:35:39 ns315508 sshd[5321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.235.214
Aug 20 22:35:39 ns315508 sshd[5321]: Invalid user clamav1 from 46.101.235.214 port 48188
Aug 20 22:35:41 ns315508 sshd[5321]: Failed password for invalid user clamav1 from 46.101.235.214 port 48188 ssh2
Aug 20 22:38:32 ns315508 sshd[5343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.235.214  user=root
Aug 20 22:38:34 ns315508 sshd[5343]: Failed password for root from 46.101.235.214 port 51724 ssh2
...
2019-08-21 07:04:56
49.50.87.77 attack
[ssh] SSH attack
2019-08-21 07:04:32
179.124.21.10 attackbotsspam
2019-08-20 09:46:37 H=(livingwellness.it) [179.124.21.10]:43707 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/query/ip/179.124.21.10)
2019-08-20 09:46:38 H=(livingwellness.it) [179.124.21.10]:43707 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/query/ip/179.124.21.10)
2019-08-20 09:46:39 H=(livingwellness.it) [179.124.21.10]:43707 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/query/ip/179.124.21.10)
...
2019-08-21 06:45:31
36.152.65.206 attackspambots
Automatic report - Port Scan Attack
2019-08-21 06:57:14
23.97.180.45 attackbots
Aug 20 21:54:19 server sshd[58064]: Failed password for invalid user raju from 23.97.180.45 port 38126 ssh2
Aug 20 22:03:40 server sshd[58971]: Failed password for invalid user lucas from 23.97.180.45 port 53505 ssh2
Aug 20 22:08:36 server sshd[59392]: Failed password for invalid user jenny from 23.97.180.45 port 48653 ssh2
2019-08-21 06:52:34
51.38.230.62 attackbots
Aug 20 20:25:02 web8 sshd\[10275\]: Invalid user laura from 51.38.230.62
Aug 20 20:25:02 web8 sshd\[10275\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.230.62
Aug 20 20:25:04 web8 sshd\[10275\]: Failed password for invalid user laura from 51.38.230.62 port 41040 ssh2
Aug 20 20:28:56 web8 sshd\[12121\]: Invalid user admin from 51.38.230.62
Aug 20 20:28:56 web8 sshd\[12121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.230.62
2019-08-21 06:48:40
93.97.227.54 attackbots
Aug 20 21:37:52 bouncer sshd\[1734\]: Invalid user network1 from 93.97.227.54 port 58389
Aug 20 21:37:52 bouncer sshd\[1734\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.97.227.54 
Aug 20 21:37:54 bouncer sshd\[1734\]: Failed password for invalid user network1 from 93.97.227.54 port 58389 ssh2
...
2019-08-21 06:33:35
95.110.235.17 attackspam
Aug 20 04:59:49 tdfoods sshd\[9566\]: Invalid user test from 95.110.235.17
Aug 20 04:59:49 tdfoods sshd\[9566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.110.235.17
Aug 20 04:59:51 tdfoods sshd\[9566\]: Failed password for invalid user test from 95.110.235.17 port 56337 ssh2
Aug 20 05:04:19 tdfoods sshd\[10062\]: Invalid user caja from 95.110.235.17
Aug 20 05:04:19 tdfoods sshd\[10062\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.110.235.17
2019-08-21 06:31:58
178.128.158.113 attack
Invalid user user from 178.128.158.113 port 41418
2019-08-21 06:42:29
106.12.30.229 attackspambots
Invalid user fe from 106.12.30.229 port 54236
2019-08-21 07:03:56
130.61.83.71 attack
Aug 21 00:43:13 srv206 sshd[8371]: Invalid user emil from 130.61.83.71
...
2019-08-21 07:03:26

最近上报的IP列表

77.247.16.23 109.198.233.107 66.132.186.169 5.28.96.201
2606:4700:10::ac43:2224 2606:4700:10::ac43:1003 58.246.155.87 91.227.114.170
190.4.202.166 101.36.106.75 110.78.158.234 183.207.48.139
27.78.166.86 71.215.0.124 110.77.248.15 2606:4700:10::6816:2092
2606:4700:10::6816:3832 2606:4700:10::6816:2988 3.250.151.208 156.226.174.212