必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Singapore

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '163.128.98.0 - 163.128.99.255'

% Abuse contact for '163.128.98.0 - 163.128.99.255' is 'abuse@mail.cyberjetservice.com'

inetnum:        163.128.98.0 - 163.128.99.255
netname:        CYBERJETPTELTD-SG
descr:          CYBERJET PTE LTD
country:        SG
org:            ORG-CPL93-AP
admin-c:        CPLA69-AP
tech-c:         CPLA69-AP
abuse-c:        AC2922-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CYBERJETPTELTD-SG
mnt-routes:     MAINT-CYBERJETPTELTD-SG
mnt-irt:        IRT-CYBERJETPTELTD-SG
last-modified:  2026-03-23T22:35:16Z
source:         APNIC

irt:            IRT-CYBERJETPTELTD-SG
address:        73 Ayer Rajah Crescent, Singapore Singapore 139952
e-mail:         abuse@mail.cyberjetservice.com
abuse-mailbox:  abuse@mail.cyberjetservice.com
admin-c:        CPLA69-AP
tech-c:         CPLA69-AP
auth:           # Filtered
mnt-by:         MAINT-CYBERJETPTELTD-SG
last-modified:  2026-03-23T14:17:25Z
source:         APNIC

organisation:   ORG-CPL93-AP
org-name:       CYBERJET PTE LTD
org-type:       LIR
country:        SG
address:        73 Ayer Rajah Crescent
phone:          +65-6047-0237
e-mail:         contact@mail.cyberjetservice.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2026-02-21T13:24:53Z
source:         APNIC

role:           ABUSE CYBERJETPTELTDSG
country:        ZZ
address:        73 Ayer Rajah Crescent, Singapore Singapore 139952
phone:          +000000000
e-mail:         abuse@mail.cyberjetservice.com
admin-c:        CPLA69-AP
tech-c:         CPLA69-AP
nic-hdl:        AC2922-AP
remarks:        Generated from irt object IRT-CYBERJETPTELTD-SG
abuse-mailbox:  abuse@mail.cyberjetservice.com
mnt-by:         APNIC-ABUSE
last-modified:  2026-03-23T22:35:16Z
source:         APNIC

role:           CYBERJET PTE LTD administrator
address:        73 Ayer Rajah Crescent, Singapore Singapore 139952
country:        SG
phone:          +65-6047-0237
e-mail:         abuse@mail.cyberjetservice.com
admin-c:        CPLA69-AP
tech-c:         CPLA69-AP
nic-hdl:        CPLA69-AP
mnt-by:         MAINT-CYBERJETPTELTD-SG
last-modified:  2026-03-23T14:17:16Z
source:         APNIC

% Information related to '163.128.98.0/23AS154562'

route:          163.128.98.0/23
descr:          Private Customer
origin:         AS154562
mnt-by:         MAINT-CYBERJETPTELTD-SG
last-modified:  2026-03-30T09:01:11Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.128.98.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59698
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;163.128.98.1.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041800 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 18 23:18:26 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
Host 1.98.128.163.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 1.98.128.163.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
130.105.68.165 attackbotsspam
Sep  6 05:47:39 lnxweb61 sshd[17113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.105.68.165
2019-09-06 20:55:04
1.24.226.226 attackbots
SSH bruteforce (Triggered fail2ban)  Sep  6 05:48:10 dev1 sshd[175436]: error: maximum authentication attempts exceeded for invalid user admin from 1.24.226.226 port 53494 ssh2 [preauth]
Sep  6 05:48:10 dev1 sshd[175436]: Disconnecting invalid user admin 1.24.226.226 port 53494: Too many authentication failures [preauth]
2019-09-06 20:38:14
49.88.112.71 attackspam
Reported by AbuseIPDB proxy server.
2019-09-06 20:59:11
95.179.146.162 attackspam
2019-09-06T07:02:18Z - RDP login failed multiple times. (95.179.146.162)
2019-09-06 20:33:33
213.202.211.200 attackspam
Sep  6 14:34:01 localhost sshd\[15291\]: Invalid user gitolite from 213.202.211.200 port 55350
Sep  6 14:34:01 localhost sshd\[15291\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.202.211.200
Sep  6 14:34:04 localhost sshd\[15291\]: Failed password for invalid user gitolite from 213.202.211.200 port 55350 ssh2
2019-09-06 20:41:42
191.235.91.156 attack
Sep  6 08:58:01 Tower sshd[1794]: Connection from 191.235.91.156 port 46146 on 192.168.10.220 port 22
Sep  6 08:58:09 Tower sshd[1794]: Invalid user odoo from 191.235.91.156 port 46146
Sep  6 08:58:09 Tower sshd[1794]: error: Could not get shadow information for NOUSER
Sep  6 08:58:09 Tower sshd[1794]: Failed password for invalid user odoo from 191.235.91.156 port 46146 ssh2
Sep  6 08:58:09 Tower sshd[1794]: Received disconnect from 191.235.91.156 port 46146:11: Bye Bye [preauth]
Sep  6 08:58:09 Tower sshd[1794]: Disconnected from invalid user odoo 191.235.91.156 port 46146 [preauth]
2019-09-06 20:59:48
201.39.233.40 attackbots
Sep  6 14:17:27 plex sshd[20848]: Invalid user nagios from 201.39.233.40 port 48667
2019-09-06 20:34:28
157.230.132.73 attackspambots
2019-09-06T08:41:12.479056abusebot-3.cloudsearch.cf sshd\[24961\]: Invalid user jenkins from 157.230.132.73 port 40726
2019-09-06 20:33:54
104.248.175.232 attack
Sep  6 07:06:02 www2 sshd\[39486\]: Invalid user webster from 104.248.175.232Sep  6 07:06:04 www2 sshd\[39486\]: Failed password for invalid user webster from 104.248.175.232 port 36026 ssh2Sep  6 07:10:44 www2 sshd\[40008\]: Invalid user user from 104.248.175.232
...
2019-09-06 21:04:30
165.22.218.93 attack
2019-09-06T13:07:25.087833abusebot-5.cloudsearch.cf sshd\[8919\]: Invalid user gpadmin from 165.22.218.93 port 45661
2019-09-06 21:13:54
37.193.120.109 attackbotsspam
ssh failed login
2019-09-06 20:49:38
60.12.8.241 attackspambots
Sep  6 13:42:12 srv206 sshd[21656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.12.8.241  user=root
Sep  6 13:42:14 srv206 sshd[21656]: Failed password for root from 60.12.8.241 port 8452 ssh2
Sep  6 13:46:04 srv206 sshd[21714]: Invalid user git from 60.12.8.241
...
2019-09-06 20:43:17
132.232.4.33 attack
Sep  6 01:23:13 eddieflores sshd\[1696\]: Invalid user teste from 132.232.4.33
Sep  6 01:23:13 eddieflores sshd\[1696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.4.33
Sep  6 01:23:16 eddieflores sshd\[1696\]: Failed password for invalid user teste from 132.232.4.33 port 50028 ssh2
Sep  6 01:29:11 eddieflores sshd\[2202\]: Invalid user postgres from 132.232.4.33
Sep  6 01:29:11 eddieflores sshd\[2202\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.4.33
2019-09-06 20:58:12
61.69.78.78 attackspam
Sep  6 14:15:45 localhost sshd\[13509\]: Invalid user ftpuser from 61.69.78.78 port 42528
Sep  6 14:15:45 localhost sshd\[13509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.69.78.78
Sep  6 14:15:47 localhost sshd\[13509\]: Failed password for invalid user ftpuser from 61.69.78.78 port 42528 ssh2
2019-09-06 20:28:41
165.22.6.195 attackspambots
Sep  6 02:30:57 php1 sshd\[26980\]: Invalid user steam from 165.22.6.195
Sep  6 02:30:57 php1 sshd\[26980\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.6.195
Sep  6 02:30:59 php1 sshd\[26980\]: Failed password for invalid user steam from 165.22.6.195 port 38310 ssh2
Sep  6 02:35:15 php1 sshd\[27321\]: Invalid user user22 from 165.22.6.195
Sep  6 02:35:15 php1 sshd\[27321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.6.195
2019-09-06 20:44:25

最近上报的IP列表

2606:4700:10::6816:2792 2606:4700:10::6814:4933 2606:4700:10::6814:8277 2606:4700:10::6814:4639
47.80.17.248 2606:4700:10::6816:2692 35.186.186.214 88.101.166.29
88.101.166.189 103.215.74.213 110.77.248.115 2606:4700:10::6816:1314
2606:4700:10::6814:9150 2606:4700:10::6814:4899 110.78.150.162 2606:4700:10::6816:1235
2606:4700:10::6816:4905 166.88.142.143 66.132.195.103 222.199.16.39