必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Taiwan, China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '202.12.76.0 - 202.12.79.255'

% Abuse contact for '202.12.76.0 - 202.12.79.255' is 'chris@host.com.tw'

inetnum:        202.12.76.0 - 202.12.79.255
netname:        YUANJHEN
descr:          Yuan-Jhen Info., Co., Ltd
descr:          12F., No.866-7, Zhongzheng Rd., Zhonghe Dist.,
descr:          New Taipei City, 235
country:        TW
admin-c:        YN371-AP
tech-c:         YN371-AP
abuse-c:        AT939-AP
status:         ALLOCATED PORTABLE
mnt-by:         MAINT-TW-TWNIC
mnt-lower:      MAINT-TW-TWNIC
mnt-irt:        IRT-YUANJHEN-TW
last-modified:  2023-11-30T04:19:09Z
source:         APNIC

irt:            IRT-YUANJHEN-TW
address:        Yuan-Jhen Info., Co., Ltd
address:        12F., No.866-7, Zhongzheng Rd., Zhonghe Dist.,
address:        New Taipei City, 235
e-mail:         chris@host.com.tw
abuse-mailbox:  chris@host.com.tw
admin-c:        YC2393-AP
tech-c:         YC2393-AP
auth:           # Filtered
mnt-by:         MAINT-TW-TWNIC
last-modified:  2025-11-06T07:55:47Z
source:         APNIC

role:           ABUSE TWNICAP
country:        ZZ
address:        3F., No. 123, Sec. 4, Bade Rd., Songshan Dist., Taipei 105, Taiwan
phone:          +000000000
e-mail:         hostmaster@twnic.tw
admin-c:        TWA2-AP
tech-c:         TWA2-AP
nic-hdl:        AT939-AP
remarks:        Generated from irt object IRT-TWNIC-AP
remarks:        hostmaster@twnic.tw was validated on 2025-05-23
abuse-mailbox:  hostmaster@twnic.tw
mnt-by:         APNIC-ABUSE
last-modified:  2025-05-23T00:02:10Z
source:         APNIC

person:         YUANJHEN NOC
address:        12F., No.866-11, Zhongzheng Rd., Zhonghe Dist., New Taipei City, 235, R.O.C
country:        TW
phone:          +886-2-7753-7313
e-mail:         abuse@twnoc.net
nic-hdl:        YN371-AP
mnt-by:         MAINT-TW-TWNIC
last-modified:  2023-02-10T08:13:55Z
source:         APNIC

% Information related to '202.12.79.0/24AS131149'

route:          202.12.79.0/24
origin:         AS131149
country:        TW
descr:          Yuan-Jhen Info., Co., Ltd
descr:          12F., No.866-7, Zhongzheng Rd., Zhonghe Dist.,New Taipei City, 235, R.O.C
descr:          NewTaipei City
last-modified:  2025-12-31T03:57:52Z
source:         APNIC
mnt-by:         MAINT-TW-TWNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.12.79.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49334
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;202.12.79.137.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026033100 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 31 22:51:49 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
137.79.12.202.in-addr.arpa domain name pointer 202-12-79-137.static.ip.net.tw.
NSLOOKUP信息:
b'137.79.12.202.in-addr.arpa	name = 202-12-79-137.static.ip.net.tw.

Authoritative answers can be found from:

'
相关IP信息:
最新评论:
IP 类型 评论内容 时间
79.199.208.247 attackspambots
Chat Spam
2020-08-22 21:27:40
49.234.47.124 attackbots
SSH login attempts.
2020-08-22 22:06:00
42.119.27.143 attackbotsspam
Unauthorized connection attempt from IP address 42.119.27.143 on Port 445(SMB)
2020-08-22 21:40:01
188.240.26.111 attackspam
SSH invalid-user multiple login try
2020-08-22 21:54:16
157.7.233.185 attack
Aug 22 14:32:22 electroncash sshd[32579]: Invalid user debian from 157.7.233.185 port 46977
Aug 22 14:32:22 electroncash sshd[32579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.7.233.185 
Aug 22 14:32:22 electroncash sshd[32579]: Invalid user debian from 157.7.233.185 port 46977
Aug 22 14:32:24 electroncash sshd[32579]: Failed password for invalid user debian from 157.7.233.185 port 46977 ssh2
Aug 22 14:36:43 electroncash sshd[33773]: Invalid user webdata from 157.7.233.185 port 48225
...
2020-08-22 21:49:58
45.40.199.82 attackspambots
Aug 22 13:17:05 game-panel sshd[16118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.199.82
Aug 22 13:17:07 game-panel sshd[16118]: Failed password for invalid user harry from 45.40.199.82 port 36182 ssh2
Aug 22 13:22:38 game-panel sshd[16266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.199.82
2020-08-22 21:26:04
149.56.141.170 attack
Aug 22 15:06:11 vps639187 sshd\[16348\]: Invalid user riana from 149.56.141.170 port 53248
Aug 22 15:06:11 vps639187 sshd\[16348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.141.170
Aug 22 15:06:13 vps639187 sshd\[16348\]: Failed password for invalid user riana from 149.56.141.170 port 53248 ssh2
...
2020-08-22 21:30:58
218.92.0.224 attack
Aug 22 15:42:10 ip106 sshd[32115]: Failed password for root from 218.92.0.224 port 29445 ssh2
Aug 22 15:42:14 ip106 sshd[32115]: Failed password for root from 218.92.0.224 port 29445 ssh2
...
2020-08-22 21:54:40
183.109.124.137 attackbotsspam
Aug 22 14:15:02 cosmoit sshd[15840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.109.124.137
2020-08-22 21:55:50
178.128.157.71 attackbotsspam
2020-08-22T14:14:02.487240+02:00  sshd[31120]: Failed password for invalid user celery from 178.128.157.71 port 33556 ssh2
2020-08-22 21:51:40
142.93.212.10 attackspambots
Aug 22 15:21:08 dev0-dcde-rnet sshd[24444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.212.10
Aug 22 15:21:10 dev0-dcde-rnet sshd[24444]: Failed password for invalid user gramm from 142.93.212.10 port 42074 ssh2
Aug 22 15:24:09 dev0-dcde-rnet sshd[24483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.212.10
2020-08-22 22:03:48
49.235.98.68 attack
2020-08-22T07:55:21.3395451495-001 sshd[47503]: Invalid user morita from 49.235.98.68 port 46378
2020-08-22T07:55:21.3429801495-001 sshd[47503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.98.68
2020-08-22T07:55:21.3395451495-001 sshd[47503]: Invalid user morita from 49.235.98.68 port 46378
2020-08-22T07:55:22.9808561495-001 sshd[47503]: Failed password for invalid user morita from 49.235.98.68 port 46378 ssh2
2020-08-22T07:58:50.0242221495-001 sshd[47611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.98.68  user=root
2020-08-22T07:58:51.8830531495-001 sshd[47611]: Failed password for root from 49.235.98.68 port 58266 ssh2
...
2020-08-22 21:25:46
46.101.212.57 attackspam
Aug 22 14:15:16 kh-dev-server sshd[2378]: Failed password for root from 46.101.212.57 port 60122 ssh2
...
2020-08-22 21:34:11
70.113.40.145 attack
Unauthorized connection attempt from IP address 70.113.40.145 on Port 445(SMB)
2020-08-22 21:52:13
2.233.125.227 attack
Aug 22 13:14:36 rush sshd[18120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.233.125.227
Aug 22 13:14:38 rush sshd[18120]: Failed password for invalid user steam from 2.233.125.227 port 33994 ssh2
Aug 22 13:18:41 rush sshd[18264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.233.125.227
...
2020-08-22 21:28:48

最近上报的IP列表

206.183.108.42 8.213.128.92 2606:4700:10::6814:7481 2606:4700:10::6814:9743
2606:4700:10::6814:9843 2606:4700:10::6814:7350 2606:4700:10::6814:8238 2606:4700:10::ac43:1112
2606:4700:10::6816:956 2606:4700:10::6814:7155 2606:4700:10::6814:4796 164.155.74.138
2606:4700:10::6814:5517 2606:4700:10::6816:3165 175.119.202.28 108.165.147.240
167.172.184.251 159.223.45.109 207.154.236.153 164.92.175.202