必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Taipei

省份(region): Taipei

国家(country): Taiwan, China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '202.160.64.0 - 202.160.95.255'

% Abuse contact for '202.160.64.0 - 202.160.95.255' is 'jft.admin@jforce.com.tw'

inetnum:        202.160.64.0 - 202.160.95.255
netname:        SILKERA-NET
descr:          New Silkera Network Corp.
descr:          4F-3, No. 508, Sec. 5, Chung-Hsiao E. Rd.
descr:          ISP, Taiwan, R.O.C.
descr:          AS2914 NTT America, Inc.
country:        TW
admin-c:        TW108-AP
tech-c:         TW108-AP
abuse-c:        AT939-AP
status:         ALLOCATED PORTABLE
remarks:        Transfer from APNIC 20040120
mnt-by:         MAINT-TW-TWNIC
mnt-irt:        IRT-TPSILKERA-TW
last-modified:  2025-11-07T02:26:16Z
source:         APNIC

irt:            IRT-TPSILKERA-TW
address:        New Silkera Network Corp.
address:        2F-1, No. 196, Xinhu 3rd. Road, Neihu Dist.
address:        Taipei
phone:          +886-2-2796-1557 ext 123
e-mail:         jft.admin@jforce.com.tw
abuse-mailbox:  jft.admin@jforce.com.tw
admin-c:        TR585-AP
tech-c:         TR585-AP
remarks:        (oid:TPSILKERA)
mnt-by:         MAINT-TW-TWNIC
last-modified:  2025-11-06T07:52:45Z
source:         APNIC
auth:           # Filtered

role:           ABUSE TWNICAP
country:        ZZ
address:        3F., No. 123, Sec. 4, Bade Rd., Songshan Dist., Taipei 105, Taiwan
phone:          +000000000
e-mail:         hostmaster@twnic.tw
admin-c:        TWA2-AP
tech-c:         TWA2-AP
nic-hdl:        AT939-AP
remarks:        Generated from irt object IRT-TWNIC-AP
remarks:        hostmaster@twnic.tw was validated on 2025-05-23
abuse-mailbox:  hostmaster@twnic.tw
mnt-by:         APNIC-ABUSE
last-modified:  2025-05-23T00:02:10Z
source:         APNIC

person:         Truman Wu
address:        New Silkera Network Corp. 4F-3, No. 508, Sec. 5, Chung-Hsiao E. Rd. Taipei,  Taiwan
country:        TW
phone:          +886 2 2759 1319
fax-no:         +886 2 2727 6602
e-mail:         vdbill@silkera.net
nic-hdl:        TW108-AP
mnt-by:         MAINT-TW-TWNIC
last-modified:  2008-09-04T07:31:23Z
source:         APNIC

% Information related to '202.160.64.0 - 202.160.95.255'

inetnum:        202.160.64.0 - 202.160.95.255
netname:        SILKERA-NET
descr:          New Silkera Network Corp.
descr:          2F-1, No. 196, Xinhu 3rd. Road, Neihu Dist.
descr:          Taipei Taiwan
country:        TW
admin-c:        NV1-TW
tech-c:         NV1-TW
mnt-by:         MAINT-TW-TWNIC
changed:        jft.admin@jforce.com.tw 20061002
status:         ASSIGNED NON-PORTABLE
remarks:        This information has been partially mirrored by APNIC from
remarks:        TWNIC. To obtain more specific information, please use the
remarks:        TWNIC whois server at whois.twnic.net.
source:         TWNIC

person:         NSN VDAdm
address:        New Silkera Network
address:        15F, No.510, Sec 5, Chung-Hsiao E. Rd.
address:        Taipei Taiwan
country:        TW
phone:          +886-2-2759-1319
fax-no:         +886-2-2727-6602
e-mail:         vdadm@silkera.net
nic-hdl:        NV1-TW
changed:        hostmaster@twnic.net 20010410
remarks:        This information has been partially mirrored by APNIC from
remarks:        TWNIC. To obtain more specific information, please use the
remarks:        TWNIC whois server at whois.twnic.net.
source:         TWNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.160.86.191
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49813
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;202.160.86.191.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042200 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 22 19:18:54 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
b'Host 191.86.160.202.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 202.160.86.191.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
209.17.96.194 attack
IP: 209.17.96.194
Ports affected
    http protocol over TLS/SSL (443) 
Abuse Confidence rating 100%
Found in DNSBL('s)
ASN Details
   AS174 Cogent Communications
   United States (US)
   CIDR 209.17.96.0/20
Log Date: 31/01/2020 4:40:01 PM UTC
2020-02-01 03:39:00
51.91.212.81 attackspam
firewall-block, port(s): 8082/tcp
2020-02-01 03:29:56
186.249.44.213 attack
firewall-block, port(s): 1433/tcp
2020-02-01 03:34:44
51.178.51.37 attack
Jan 31 19:59:48 legacy sshd[30597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.51.37
Jan 31 19:59:50 legacy sshd[30597]: Failed password for invalid user xguest from 51.178.51.37 port 39842 ssh2
Jan 31 20:09:17 legacy sshd[30966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.51.37
...
2020-02-01 03:21:55
107.170.20.247 attackbotsspam
Unauthorized connection attempt detected from IP address 107.170.20.247 to port 2220 [J]
2020-02-01 03:24:58
180.252.54.89 attackbots
Unauthorized connection attempt from IP address 180.252.54.89 on Port 445(SMB)
2020-02-01 03:26:28
178.242.47.231 attackbotsspam
Triggered: repeated knocking on closed ports.
2020-02-01 03:46:03
165.22.144.147 attackbots
Jan 31 19:30:57 MK-Soft-Root2 sshd[13145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.144.147 
Jan 31 19:30:59 MK-Soft-Root2 sshd[13145]: Failed password for invalid user developer from 165.22.144.147 port 51014 ssh2
...
2020-02-01 03:16:07
72.167.190.24 attackbotsspam
Time:     Fri Jan 31 14:24:39 2020 -0300
IP:       72.167.190.24 (US/United States/p3plcpnl0995.prod.phx3.secureserver.net)
Failures: 20 (WordPressBruteForcePOST)
Interval: 3600 seconds
Blocked:  Permanent Block
2020-02-01 03:45:29
91.211.247.153 attackspam
Unauthorized connection attempt detected from IP address 91.211.247.153 to port 2220 [J]
2020-02-01 03:27:13
62.210.151.72 attackbots
SIP-5060-Unauthorized
2020-02-01 03:21:32
71.6.158.166 attackbotsspam
Port scan: Attack repeated for 24 hours
2020-02-01 03:29:03
201.77.116.44 attack
Feb  1 00:07:29 areeb-Workstation sshd[13563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.77.116.44 
Feb  1 00:07:31 areeb-Workstation sshd[13563]: Failed password for invalid user admin from 201.77.116.44 port 62984 ssh2
...
2020-02-01 03:13:51
178.128.52.32 attackspambots
Jan 31 19:52:21 srv01 sshd[18004]: Invalid user admin from 178.128.52.32 port 56094
Jan 31 19:52:21 srv01 sshd[18004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.52.32
Jan 31 19:52:21 srv01 sshd[18004]: Invalid user admin from 178.128.52.32 port 56094
Jan 31 19:52:23 srv01 sshd[18004]: Failed password for invalid user admin from 178.128.52.32 port 56094 ssh2
Jan 31 19:54:21 srv01 sshd[18140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.52.32  user=postgres
Jan 31 19:54:23 srv01 sshd[18140]: Failed password for postgres from 178.128.52.32 port 55630 ssh2
...
2020-02-01 03:18:16
46.166.142.178 attackspam
SIP:5060 - unauthorized VoIP call to 1455200441259797313 using
2020-02-01 03:15:30

最近上报的IP列表

2606:4700:10::6816:2267 2606:4700:10::ac43:706 52.84.50.0 4.232.188.102
221.238.131.250 34.96.52.79 185.241.32.124 2606:4700:10::ac43:1957
2606:4700:10::6814:8076 2606:4700:10::6814:4991 110.78.154.190 2606:4700:10::6816:3338
2606:4700:10::6814:9420 167.71.53.238 151.252.107.21 43.98.191.225
43.98.197.211 2606:4700:10::ac43:218e 2606:4700:10::6814:4893 69.30.197.146