必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Vietnam

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       160.243.0.0 - 160.252.255.255
CIDR:           160.248.0.0/14, 160.252.0.0/16, 160.243.0.0/16, 160.244.0.0/14
NetName:        APNIC-ERX-160-233-0-0
NetHandle:      NET-160-243-0-0-1
Parent:         NET160 (NET-160-0-0-0-0)
NetType:        Early Registrations, Transferred to APNIC
OriginAS:       
Organization:   Asia Pacific Network Information Centre (APNIC)
RegDate:        2004-04-05
Updated:        2009-10-08
Comment:        This IP address range is not registered in the ARIN database.
Comment:        This range was transferred to the APNIC Whois Database as
Comment:        part of the ERX (Early Registration Transfer) project.
Comment:        For details, refer to the APNIC Whois Database via
Comment:        WHOIS.APNIC.NET or http://wq.apnic.net/apnic-bin/whois.pl
Comment:        
Comment:        ** IMPORTANT NOTE: APNIC is the Regional Internet Registry
Comment:        for the Asia Pacific region.  APNIC does not operate networks
Comment:        using this IP address range and is not able to investigate
Comment:        spam or abuse reports relating to these addresses.  For more
Comment:        help, refer to http://www.apnic.net/apnic-info/whois_search2/abuse-and-spamming
Ref:            https://rdap.arin.net/registry/ip/160.243.0.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois.apnic.net


OrgName:        Asia Pacific Network Information Centre
OrgId:          APNIC
Address:        PO Box 3646
City:           South Brisbane
StateProv:      QLD
PostalCode:     4101
Country:        AU
RegDate:        
Updated:        2012-01-24
Ref:            https://rdap.arin.net/registry/entity/APNIC

ReferralServer:  whois://whois.apnic.net
ResourceLink:  http://wq.apnic.net/whois-search/static/search.html

OrgTechHandle: AWC12-ARIN
OrgTechName:   APNIC Whois Contact
OrgTechPhone:  +61 7 3858 3188 
OrgTechEmail:  search-apnic-not-arin@apnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN

OrgAbuseHandle: AWC12-ARIN
OrgAbuseName:   APNIC Whois Contact
OrgAbusePhone:  +61 7 3858 3188 
OrgAbuseEmail:  search-apnic-not-arin@apnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.apnic.net.

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '160.250.132.0 - 160.250.133.255'

% Abuse contact for '160.250.132.0 - 160.250.133.255' is 'hm-changed@vnnic.vn'

inetnum:        160.250.132.0 - 160.250.133.255
netname:        VPS4U-VN
descr:          VPS4U TECHNOLOGY COMPANY LIMITED
descr:          House number 34, Odd Street, Hamlet 6, Van Phu Commune, Thuong Tin District, Hanoi
admin-c:        NTT54-AP
tech-c:         PQK1-AP
country:        VN
mnt-by:         MAINT-VN-VNNIC
mnt-irt:        IRT-VNNIC-AP
mnt-routes:     MAINT-VN-VNNIC
status:         ASSIGNED PORTABLE
last-modified:  2024-11-30T12:51:25Z
source:         APNIC

irt:            IRT-VNNIC-AP
address:        Ha Noi, VietNam
phone:          +84-24-35564944
fax-no:         +84-24-37821462
e-mail:         hm-changed@vnnic.vn
abuse-mailbox:  hm-changed@vnnic.vn
admin-c:        NTTT1-AP
tech-c:         NTTT1-AP
auth:           # Filtered
mnt-by:         MAINT-VN-VNNIC
last-modified:  2026-04-21T02:07:47Z
source:         APNIC

person:         Nguyen Thi Thap
address:        VPS4U-VN
country:        VN
phone:          +84-964361982
e-mail:         admin@vps4u.vn
nic-hdl:        NTT54-AP
mnt-by:         MAINT-VN-VNNIC
last-modified:  2024-11-30T12:48:53Z
source:         APNIC

person:         Pham Quoc Khanh
address:        VPS4U-VN
country:        VN
phone:          +84-393893008
e-mail:         khanh@vps4u.vn
nic-hdl:        PQK1-AP
mnt-by:         MAINT-VN-VNNIC
last-modified:  2024-11-30T12:49:28Z
source:         APNIC

% Information related to '160.250.132.0/23AS150895'

route:          160.250.132.0/23
descr:          VPS4U-VN
origin:         AS150895
mnt-by:         MAINT-VN-VNNIC
last-modified:  2025-03-01T09:09:49Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 160.250.132.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53792
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;160.250.132.72.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042200 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 22 17:20:37 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 72.132.250.160.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
server can't find 160.250.132.72.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
213.183.101.89 attackbots
2019-09-16T11:41:20.231979abusebot-8.cloudsearch.cf sshd\[29493\]: Invalid user admin from 213.183.101.89 port 40718
2019-09-16 19:57:10
183.80.156.183 attack
Sep 16 14:00:02 rotator sshd\[10863\]: Invalid user ubnt from 183.80.156.183Sep 16 14:00:05 rotator sshd\[10863\]: Failed password for invalid user ubnt from 183.80.156.183 port 46206 ssh2Sep 16 14:03:53 rotator sshd\[11714\]: Invalid user admin from 183.80.156.183Sep 16 14:04:00 rotator sshd\[11714\]: Failed password for invalid user admin from 183.80.156.183 port 50978 ssh2Sep 16 14:05:36 rotator sshd\[12495\]: Invalid user admin from 183.80.156.183Sep 16 14:05:41 rotator sshd\[12495\]: Failed password for invalid user admin from 183.80.156.183 port 49820 ssh2
...
2019-09-16 20:13:38
87.117.1.169 attackbotsspam
2019-09-16T10:26:09.962292 X postfix/smtpd[31711]: NOQUEUE: reject: RCPT from unknown[87.117.1.169]: 554 5.7.1 Service unavailable; Client host [87.117.1.169] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?87.117.1.169; from= to= proto=ESMTP helo=
2019-09-16 19:52:36
195.91.201.100 attack
" "
2019-09-16 20:11:32
68.183.178.162 attackbotsspam
Sep 16 07:41:55 plusreed sshd[32018]: Invalid user web from 68.183.178.162
...
2019-09-16 19:51:47
106.13.59.16 attackspambots
DATE:2019-09-16 10:25:37,IP:106.13.59.16,MATCHES:10,PORT:ssh
2019-09-16 20:23:07
178.33.236.23 attackbots
Sep 16 01:44:28 php1 sshd\[10799\]: Invalid user qomo from 178.33.236.23
Sep 16 01:44:28 php1 sshd\[10799\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.236.23
Sep 16 01:44:30 php1 sshd\[10799\]: Failed password for invalid user qomo from 178.33.236.23 port 41506 ssh2
Sep 16 01:48:35 php1 sshd\[11152\]: Invalid user sinus from 178.33.236.23
Sep 16 01:48:35 php1 sshd\[11152\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.236.23
2019-09-16 20:19:04
104.248.116.140 attackbotsspam
Sep 16 10:26:00 mout sshd[6814]: Invalid user gerry from 104.248.116.140 port 47992
2019-09-16 20:03:30
85.26.195.231 attackspam
Thu, 2019-08-15 11:35:29 - TCP Packet - Source:85.26.195.231,52269
Destination:,80 - [DVR-HTTP rule match]
2019-09-16 20:30:09
36.67.91.81 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-09-16 20:10:41
113.65.215.247 attackbots
Honeypot attack, port: 23, PTR: PTR record not found
2019-09-16 19:55:00
198.245.63.151 attackbotsspam
Sep 16 10:52:20 vpn01 sshd\[17092\]: Invalid user adimari from 198.245.63.151
Sep 16 10:52:20 vpn01 sshd\[17092\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.63.151
Sep 16 10:52:22 vpn01 sshd\[17092\]: Failed password for invalid user adimari from 198.245.63.151 port 39772 ssh2
2019-09-16 19:53:27
131.0.8.49 attack
Sep 16 02:03:15 eddieflores sshd\[8938\]: Invalid user duci from 131.0.8.49
Sep 16 02:03:15 eddieflores sshd\[8938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.0.8.49
Sep 16 02:03:17 eddieflores sshd\[8938\]: Failed password for invalid user duci from 131.0.8.49 port 45947 ssh2
Sep 16 02:11:15 eddieflores sshd\[9661\]: Invalid user mac from 131.0.8.49
Sep 16 02:11:15 eddieflores sshd\[9661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.0.8.49
2019-09-16 20:22:44
140.143.15.169 attackspam
Sep 16 04:25:38 Tower sshd[45005]: Connection from 140.143.15.169 port 36886 on 192.168.10.220 port 22
Sep 16 04:25:39 Tower sshd[45005]: Invalid user oracle from 140.143.15.169 port 36886
Sep 16 04:25:39 Tower sshd[45005]: error: Could not get shadow information for NOUSER
Sep 16 04:25:39 Tower sshd[45005]: Failed password for invalid user oracle from 140.143.15.169 port 36886 ssh2
Sep 16 04:25:40 Tower sshd[45005]: Received disconnect from 140.143.15.169 port 36886:11: Bye Bye [preauth]
Sep 16 04:25:40 Tower sshd[45005]: Disconnected from invalid user oracle 140.143.15.169 port 36886 [preauth]
2019-09-16 20:08:57
183.13.123.223 attack
Sep 16 11:36:44 mail sshd\[28670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.13.123.223  user=mysql
Sep 16 11:36:46 mail sshd\[28670\]: Failed password for mysql from 183.13.123.223 port 41488 ssh2
Sep 16 11:44:51 mail sshd\[28949\]: Invalid user user from 183.13.123.223
Sep 16 11:44:51 mail sshd\[28949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.13.123.223
...
2019-09-16 20:25:10

最近上报的IP列表

2606:4700:10::6816:4720 166.88.100.204 2606:4700:10::6816:50 2606:4700:10::6814:7962
2606:4700:10::ac43:223e 2606:4700:10::6814:5652 2606:4700:10::ac43:157e 164.155.74.117
123.172.17.162 177.40.3.176 183.249.218.51 165.149.49.67
77.103.160.108 159.48.163.38 45.182.140.135 110.78.156.84
2606:4700:10::ac43:1015 2606:4700:10::6814:6159 2606:4700:10::6816:3967 2606:4700:10::6814:6385