必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Bhutan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '202.144.137.16 - 202.144.137.127'

% Abuse contact for '202.144.137.16 - 202.144.137.127' is 'systems@bt.bt'

inetnum:        202.144.137.16 - 202.144.137.127
netname:        DRUKNET
descr:          Infrastructure
country:        BT
admin-c:        JT106-AP
tech-c:         JT106-AP
abuse-c:        AB1276-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-BT-DRUKNET
mnt-irt:        IRT-BTTELECOM-BT
last-modified:  2021-01-14T06:16:01Z
source:         APNIC

irt:            IRT-BTTELECOM-BT
address:        DrukNet
address:        Bhutan Telecom
address:        Thimphu
e-mail:         systems@bt.bt
abuse-mailbox:  systems@bt.bt
admin-c:        DNO1-AP
tech-c:         DNO1-AP
auth:           # Filtered
remarks:        systems@bt.bt was validated on 2026-03-26
mnt-by:         MAINT-BT-DRUKNET
last-modified:  2026-03-26T00:36:43Z
source:         APNIC

role:           ABUSE BTTELECOMBT
country:        ZZ
address:        DrukNet
address:        Bhutan Telecom
address:        Thimphu
phone:          +000000000
e-mail:         systems@bt.bt
admin-c:        DNO1-AP
tech-c:         DNO1-AP
nic-hdl:        AB1276-AP
remarks:        Generated from irt object IRT-BTTELECOM-BT
remarks:        systems@bt.bt was validated on 2026-03-26
abuse-mailbox:  systems@bt.bt
mnt-by:         APNIC-ABUSE
last-modified:  2026-03-26T00:37:14Z
source:         APNIC

person:         Jichen Thinley
address:        DrukNet
address:        Bhutan Telecom
address:        Thimphu
country:        BT
phone:          +975-2-320118
fax-no:         +975-2-328160
e-mail:         jichen@druknet.bt
nic-hdl:        JT106-AP
mnt-by:         MAINT-BT-DRUKNET
last-modified:  2008-09-04T07:29:18Z
source:         APNIC

% Information related to '202.144.128.0/20AS18024'

route:          202.144.128.0/20
descr:          DRUKNET-BLOCK-A1
country:        BT
notify:         ioc@bt.bt
mnt-by:         MAINT-BT-DRUKNET
origin:         AS18024
last-modified:  2018-09-18T09:37:40Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.144.137.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44630
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;202.144.137.94.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026051300 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 13 16:01:08 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
94.137.144.202.in-addr.arpa domain name pointer leasedline-202-144-137-94.Yangkhor-Thimphu.druknet.bt.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
94.137.144.202.in-addr.arpa	name = leasedline-202-144-137-94.Yangkhor-Thimphu.druknet.bt.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
14.162.42.140 attack
Unauthorized IMAP connection attempt
2019-11-28 04:42:55
144.135.85.184 attack
SSH Brute Force
2019-11-28 04:44:07
194.135.123.66 attackspam
Unauthorised access (Nov 27) SRC=194.135.123.66 LEN=52 TTL=112 ID=5862 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Nov 27) SRC=194.135.123.66 LEN=52 TTL=112 ID=16216 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Nov 27) SRC=194.135.123.66 LEN=52 TTL=112 ID=32565 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Nov 25) SRC=194.135.123.66 LEN=52 TTL=112 ID=9275 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-28 04:48:43
188.254.0.224 attackspambots
Nov 27 20:16:31 lnxded63 sshd[19475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.224
2019-11-28 04:27:26
119.161.100.138 attackspam
Nov 27 04:47:56 hpm sshd\[21637\]: Invalid user git from 119.161.100.138
Nov 27 04:47:56 hpm sshd\[21637\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=s0.ifix-fast.net
Nov 27 04:47:59 hpm sshd\[21637\]: Failed password for invalid user git from 119.161.100.138 port 44337 ssh2
Nov 27 04:48:02 hpm sshd\[21637\]: Failed password for invalid user git from 119.161.100.138 port 44337 ssh2
Nov 27 04:48:06 hpm sshd\[21637\]: Failed password for invalid user git from 119.161.100.138 port 44337 ssh2
2019-11-28 04:44:20
191.36.194.41 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-28 04:40:03
191.189.27.123 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-28 04:56:23
191.243.240.212 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-28 04:46:26
14.237.117.147 attack
UTC: 2019-11-26 port: 23/tcp
2019-11-28 04:39:19
51.91.8.222 attackbotsspam
$f2bV_matches
2019-11-28 04:59:16
128.199.211.110 attackbots
Invalid user apache from 128.199.211.110 port 52700
2019-11-28 04:47:51
185.172.86.146 attackbots
Telnet/23 MH Probe, BF, Hack -
2019-11-28 04:35:13
191.243.240.136 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-28 04:50:32
95.45.105.149 attackspambots
Invalid user webmaster from 95.45.105.149 port 50754
2019-11-28 04:54:54
122.152.250.89 attackspam
Nov 27 19:17:21 v22018076622670303 sshd\[19277\]: Invalid user john12345 from 122.152.250.89 port 58450
Nov 27 19:17:21 v22018076622670303 sshd\[19277\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.250.89
Nov 27 19:17:23 v22018076622670303 sshd\[19277\]: Failed password for invalid user john12345 from 122.152.250.89 port 58450 ssh2
...
2019-11-28 04:58:21

最近上报的IP列表

35.208.217.108 110.78.153.121 2606:4700:10::6814:5318 2606:4700:10::6816:4140
20.221.68.74 10.223.24.110 119.28.100.147 134.35.157.43
2606:4700:10::6814:8420 2003:d6:a729:7200:81d8:b8be:f73d:9c8a 99.10.76.25 34.85.82.221
35.187.220.208 43.156.18.240 2606:4700:10::6814:6575 69.189.152.90
204.0.23.7 45.82.13.133 2606:4700:10::6814:5146 2606:4700:10::6814:9411