必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Pakistan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '175.107.0.0 - 175.107.63.255'

% Abuse contact for '175.107.0.0 - 175.107.63.255' is 'zahir.abbas@ntc.net.pk'

inetnum:        175.107.0.0 - 175.107.63.255
netname:        NTCISP-PK
descr:          National Telecommunication Corporation
descr:          Corporation
descr:          NTC Headquarters Sector F-5/1
country:        PK
org:            ORG-NTC3-AP
admin-c:        NTCA1-AP
tech-c:         NTCA1-AP
abuse-c:        AN769-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-PK-WAHEED
mnt-routes:     MAINT-PK-WAHEED
mnt-irt:        IRT-NTCISP-PK
last-modified:  2020-06-22T05:24:27Z
source:         APNIC

irt:            IRT-NTCISP-PK
address:        Ntc Regional Hqs F-5/1 Islamabad
e-mail:         zahir.abbas@ntc.org.pk
abuse-mailbox:  zahir.abbas@ntc.net.pk
admin-c:        NTCA1-AP
tech-c:         NTCA1-AP
auth:           # Filtered
remarks:        zahir.abbas@ntc.org.pk is invalid
remarks:        zahir.abbas@ntc.net.pk is invalid
mnt-by:         MAINT-PK-ZAHIR
last-modified:  2025-10-17T10:52:14Z
source:         APNIC

organisation:   ORG-NTC3-AP
org-name:       National Telecommunication Corporation
org-type:       LIR
country:        PK
address:        Corporation
address:        NTC Headquarters Sector F-5/1
phone:          +92-51-9208686
fax-no:         +92-51-9201489
e-mail:         talha.javaid@ntc.net.pk
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:14:53Z
source:         APNIC

role:           ABUSE NTCISPPK
country:        ZZ
address:        Ntc Regional Hqs F-5/1 Islamabad
phone:          +000000000
e-mail:         zahir.abbas@ntc.org.pk
admin-c:        NTCA1-AP
tech-c:         NTCA1-AP
nic-hdl:        AN769-AP
remarks:        Generated from irt object IRT-NTCISP-PK
remarks:        zahir.abbas@ntc.org.pk is invalid
remarks:        zahir.abbas@ntc.net.pk is invalid
abuse-mailbox:  zahir.abbas@ntc.net.pk
mnt-by:         APNIC-ABUSE
last-modified:  2025-10-17T10:52:36Z
source:         APNIC

role:           National Telecommunication Corporation administrator
address:        Sector F 5/1, Islamabad
country:        PK
phone:          +92-51-9208809
fax-no:         +92-51-9201489
e-mail:         ispsupport@ntc.net.pk
admin-c:        NTCA1-AP
tech-c:         NTCA1-AP
nic-hdl:        NTCA1-AP
mnt-by:         MAINT-PK-WAHEED
last-modified:  2015-07-01T04:51:22Z
source:         APNIC

% Information related to '175.107.36.0/22AS23888'

route:          175.107.36.0/22
origin:         AS23888
descr:          National Telecommunication Corporation
                Corporation
                NTC Headquarters Sector F-5/1
mnt-by:         MAINT-PK-WAHEED
last-modified:  2021-08-13T02:33:56Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 175.107.38.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28483
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;175.107.38.44.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025102400 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 24 18:30:51 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 44.38.107.175.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 175.107.38.44.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.12.78.199 attackbots
$f2bV_matches
2019-10-10 15:10:09
111.12.52.239 attack
Automatic report - Banned IP Access
2019-10-10 15:08:27
138.197.195.52 attackbotsspam
Oct 10 08:52:27 DAAP sshd[5603]: Invalid user Renauld2017 from 138.197.195.52 port 47848
...
2019-10-10 15:28:33
198.251.89.80 attackbotsspam
2019-10-10T06:39:04.931431abusebot.cloudsearch.cf sshd\[8767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=tor-exit-01.nonanet.net  user=root
2019-10-10 15:37:17
198.108.67.130 attackspambots
10/10/2019-00:19:18.257187 198.108.67.130 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-10 15:38:57
134.209.17.42 attack
Oct 10 06:45:07 web8 sshd\[21548\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.17.42  user=root
Oct 10 06:45:10 web8 sshd\[21548\]: Failed password for root from 134.209.17.42 port 60065 ssh2
Oct 10 06:49:07 web8 sshd\[23445\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.17.42  user=root
Oct 10 06:49:09 web8 sshd\[23445\]: Failed password for root from 134.209.17.42 port 51959 ssh2
Oct 10 06:53:05 web8 sshd\[25355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.17.42  user=root
2019-10-10 15:03:46
192.227.252.26 attackspambots
Oct 10 07:10:18 venus sshd\[14470\]: Invalid user Contrasena12 from 192.227.252.26 port 35640
Oct 10 07:10:18 venus sshd\[14470\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.252.26
Oct 10 07:10:20 venus sshd\[14470\]: Failed password for invalid user Contrasena12 from 192.227.252.26 port 35640 ssh2
...
2019-10-10 15:17:35
192.227.136.67 attackbotsspam
Oct 10 09:01:32 vps01 sshd[16523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.136.67
Oct 10 09:01:35 vps01 sshd[16523]: Failed password for invalid user C3nt0s2019 from 192.227.136.67 port 43306 ssh2
2019-10-10 15:18:31
217.65.27.132 attack
Oct 10 08:11:20 hosting sshd[12027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.65.27.132  user=root
Oct 10 08:11:22 hosting sshd[12027]: Failed password for root from 217.65.27.132 port 37246 ssh2
...
2019-10-10 15:11:32
106.13.32.70 attackspambots
Oct 10 09:03:25 dev0-dcde-rnet sshd[19737]: Failed password for root from 106.13.32.70 port 59080 ssh2
Oct 10 09:14:21 dev0-dcde-rnet sshd[19760]: Failed password for root from 106.13.32.70 port 60412 ssh2
2019-10-10 15:34:45
62.234.73.104 attackspam
Oct 10 07:36:37 markkoudstaal sshd[19578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.73.104
Oct 10 07:36:39 markkoudstaal sshd[19578]: Failed password for invalid user Result2017 from 62.234.73.104 port 39522 ssh2
Oct 10 07:41:30 markkoudstaal sshd[20104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.73.104
2019-10-10 15:05:44
175.6.247.195 attackbots
" "
2019-10-10 15:01:16
200.98.165.82 attackbotsspam
" "
2019-10-10 15:11:56
173.239.37.152 attackspam
[Aegis] @ 2019-10-10 04:50:55  0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack
2019-10-10 15:00:48
81.4.125.221 attack
Oct  7 04:13:01 zn007 sshd[13512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.4.125.221  user=r.r
Oct  7 04:13:03 zn007 sshd[13512]: Failed password for r.r from 81.4.125.221 port 57478 ssh2
Oct  7 04:13:03 zn007 sshd[13512]: Received disconnect from 81.4.125.221: 11: Bye Bye [preauth]
Oct  7 04:25:10 zn007 sshd[15002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.4.125.221  user=r.r
Oct  7 04:25:13 zn007 sshd[15002]: Failed password for r.r from 81.4.125.221 port 53842 ssh2
Oct  7 04:25:13 zn007 sshd[15002]: Received disconnect from 81.4.125.221: 11: Bye Bye [preauth]
Oct  7 04:28:34 zn007 sshd[15108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.4.125.221  user=r.r
Oct  7 04:28:36 zn007 sshd[15108]: Failed password for r.r from 81.4.125.221 port 45176 ssh2
Oct  7 04:28:36 zn007 sshd[15108]: Received disconnect from 81.4.125.221: 1........
-------------------------------
2019-10-10 15:19:22

最近上报的IP列表

14.213.29.65 47.93.212.245 39.106.139.197 123.56.25.153
3.18.215.229 59.82.83.99 59.82.135.33 112.7.7.227
112.7.7.41 91.212.166.40 59.82.83.3 59.82.83.157
203.93.173.11 103.103.88.215 59.82.135.231 59.82.135.167
59.82.135.105 233.40.82.198 27.215.85.19 183.60.225.225