必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Hong Kong

省份(region): unknown

国家(country): Hong Kong

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '150.40.192.0 - 150.40.255.255'

% Abuse contact for '150.40.192.0 - 150.40.255.255' is 'hwssecurity@huaweicloud.com'

inetnum:        150.40.192.0 - 150.40.255.255
netname:        Huawei-Cloud-HK
descr:          Huawei-Cloud-HK
country:        HK
admin-c:        HIPL7-AP
tech-c:         HIPL7-AP
abuse-c:        AH905-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-HIPL-SG
mnt-irt:        IRT-HIPL-SG
last-modified:  2024-08-13T10:16:45Z
geofeed:        https://res-static.hc-cdn.cn/cloudbu-site/china/zh-cn/IP-location/google-geo-feed.csv
source:         APNIC

irt:            IRT-HIPL-SG
address:        15A Changi Business Park Central 1 Eightrium
e-mail:         hwssecurity@huaweicloud.com
abuse-mailbox:  hwssecurity@huaweicloud.com
admin-c:        HIPL4-AP
tech-c:         HIPL4-AP
auth:           # Filtered
remarks:        hwssecurity@huaweicloud.com
remarks:        hwssecurity@huaweicloud.com was validated on 2026-01-30
mnt-by:         MAINT-HIPL-SG
last-modified:  2026-04-25T02:48:52Z
source:         APNIC

role:           ABUSE HIPLSG
country:        ZZ
address:        15A Changi Business Park Central 1 Eightrium
phone:          +000000000
e-mail:         hwssecurity@huaweicloud.com
admin-c:        HIPL4-AP
tech-c:         HIPL4-AP
nic-hdl:        AH905-AP
remarks:        Generated from irt object IRT-HIPL-SG
remarks:        hwssecurity@huaweicloud.com was validated on 2026-01-30
abuse-mailbox:  hwssecurity@huaweicloud.com
mnt-by:         APNIC-ABUSE
last-modified:  2026-01-30T02:19:07Z
source:         APNIC

role:           HUAWEI INTERNATIONAL PTE LTD administrator
address:        15A Changi Business Park Central 1 Eightrium #03-03/04, Singapore  486035
country:        SG
phone:          +8618730601505
e-mail:         wanggang222@huawei.com
admin-c:        HIPL7-AP
tech-c:         HIPL7-AP
nic-hdl:        HIPL7-AP
notify:         wanggang222@huawei.com
mnt-by:         MAINT-HIPL-SG
last-modified:  2021-06-04T07:42:42Z
source:         APNIC

% Information related to '150.40.254.0/24AS136907'

route:          150.40.254.0/24
country:        HK
origin:         AS136907
descr:          HUAWEI INTERNATIONAL PTE. LTD.
                15A Changi Business Park Central 1 Eightrium #03-03/04
mnt-by:         MAINT-HIPL-SG
last-modified:  2025-01-21T07:59:27Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.40.254.162
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38430
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;150.40.254.162.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026050401 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 05 05:30:37 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
b'Host 162.254.40.150.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 150.40.254.162.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
223.242.229.106 attackspambots
Brute force SMTP login attempts.
2019-07-03 02:23:15
201.92.214.243 attack
Telnetd brute force attack detected by fail2ban
2019-07-03 02:11:39
14.102.18.188 attackbotsspam
port scan and connect, tcp 80 (http)
2019-07-03 02:32:34
167.99.158.136 attackspam
Brute force attempt
2019-07-03 02:06:26
217.64.42.229 attackbots
217.64.42.229 - - [02/Jul/2019:15:44:51 +0200] "GET /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
217.64.42.229 - - [02/Jul/2019:15:44:52 +0200] "POST /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
217.64.42.229 - - [02/Jul/2019:15:44:52 +0200] "GET /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
217.64.42.229 - - [02/Jul/2019:15:44:53 +0200] "POST /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
217.64.42.229 - - [02/Jul/2019:15:44:53 +0200] "GET /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
217.64.42.229 - - [02/Jul/2019:15:44:53 +0200] "POST /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-07-03 02:29:57
217.210.116.204 attackbotsspam
Trying to deliver email spam, but blocked by RBL
2019-07-03 02:12:45
189.229.219.179 attack
Jan 17 10:29:22 motanud sshd\[13653\]: Invalid user james from 189.229.219.179 port 52261
Jan 17 10:29:22 motanud sshd\[13653\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.229.219.179
Jan 17 10:29:24 motanud sshd\[13653\]: Failed password for invalid user james from 189.229.219.179 port 52261 ssh2
2019-07-03 02:24:12
182.74.165.174 attack
Brute force attempt
2019-07-03 01:58:10
113.179.86.183 attackbotsspam
Unauthorised access (Jul  2) SRC=113.179.86.183 LEN=52 TTL=53 ID=13308 DF TCP DPT=445 WINDOW=8192 SYN
2019-07-03 02:30:44
118.41.52.241 attackbotsspam
23/tcp
[2019-07-02]1pkt
2019-07-03 02:41:29
134.209.11.82 attackspam
Automatic report - Web App Attack
2019-07-03 02:09:15
212.156.84.182 attackbots
Trying to deliver email spam, but blocked by RBL
2019-07-03 02:10:48
189.240.105.161 attackspambots
Dec 20 20:10:50 motanud sshd\[21088\]: Invalid user git from 189.240.105.161 port 38260
Dec 20 20:10:50 motanud sshd\[21088\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.240.105.161
Dec 20 20:10:51 motanud sshd\[21088\]: Failed password for invalid user git from 189.240.105.161 port 38260 ssh2
2019-07-03 02:04:45
36.65.118.84 attack
no
2019-07-03 02:06:00
118.24.5.163 attackspam
Jul  2 15:46:21 vps691689 sshd[20773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.5.163
Jul  2 15:46:23 vps691689 sshd[20773]: Failed password for invalid user svk from 118.24.5.163 port 44654 ssh2
...
2019-07-03 02:04:12

最近上报的IP列表

14.212.75.133 43.165.198.144 153.75.247.138 3.80.204.163
13.222.129.81 2606:4700:10::6816:453 2606:4700:10::6816:3484 20.14.78.253
108.131.49.157 44.201.164.126 14.220.180.182 2606:4700:10::ac43:1450
2606:4700:10::ac43:1437 43.161.217.205 43.254.242.91 229.117.228.32
178.16.54.89 238.229.62.219 188.246.22.31 2606:4700:10::6816:3352