必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Bayan Lepas

省份(region): Pinang

国家(country): Malaysia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '202.170.48.0 - 202.170.63.255'

% Abuse contact for '202.170.48.0 - 202.170.63.255' is 'irham@usm.my'

inetnum:        202.170.48.0 - 202.170.63.255
netname:        USMNET
descr:          Universiti Sains Malaysia, Penang, Malaysia
country:        MY
org:            ORG-USM1-AP
admin-c:        AY223-AP
tech-c:         AY223-AP
abuse-c:        AU87-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-MY-UNISAINS
mnt-routes:     MAINT-MY-UNISAINS
mnt-irt:        IRT-UNISAINS-MY
last-modified:  2020-10-20T00:57:31Z
source:         APNIC

irt:            IRT-UNISAINS-MY
address:        Universiti Sains Malaysia,
address:        Center for Knowledge, Communication and Technology,
address:        11800 Pulau Pinang, MALAYSIA
e-mail:         irham@usm.my
abuse-mailbox:  irham@usm.my
admin-c:        AY223-AP
tech-c:         AY223-AP
auth:           # Filtered
remarks:        irham@usm.my was validated on 2025-12-15
mnt-by:         MAINT-MY-UNISAINS
last-modified:  2025-12-15T00:57:33Z
source:         APNIC

organisation:   ORG-USM1-AP
org-name:       Universiti Sains Malaysia
org-type:       LIR
country:        MY
address:        Center for Knowledge, Communication and Technology
address:        Universiti Sains Malaysia
phone:          +6046533782
fax-no:         +6046569117
e-mail:         ppkt@usm.my
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:15:06Z
source:         APNIC

role:           ABUSE UNISAINSMY
country:        ZZ
address:        Universiti Sains Malaysia,
address:        Center for Knowledge, Communication and Technology,
address:        11800 Pulau Pinang, MALAYSIA
phone:          +000000000
e-mail:         irham@usm.my
admin-c:        AY223-AP
tech-c:         AY223-AP
nic-hdl:        AU87-AP
remarks:        Generated from irt object IRT-UNISAINS-MY
remarks:        irham@usm.my was validated on 2025-12-15
abuse-mailbox:  irham@usm.my
mnt-by:         APNIC-ABUSE
last-modified:  2025-12-15T00:57:51Z
source:         APNIC

person:         Ahmad Fadhlul Irham Yusoff
nic-hdl:        AY223-AP
e-mail:         irham@usm.my
address:        Universiti Sains Malaysia,
address:        Center for Knowledge, Communication and Technology,
address:        11800 Pulau Pinang, MALAYSIA
phone:          +604-653-3782
fax-no:         +604-653-9177
country:        MY
mnt-by:         MAINT-MY-UNISAINS
last-modified:  2008-09-04T07:29:24Z
source:         APNIC

% Information related to '202.170.48.0/24AS24090'

route:          202.170.48.0/24
origin:         AS24090
descr:          Universiti Sains Malaysia
                Center for Knowledge, Communication and Technology
                Universiti Sains Malaysia
mnt-by:         MAINT-MY-UNISAINS
last-modified:  2020-09-23T07:35:33Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.170.48.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15235
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;202.170.48.150.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026020502 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 06 01:58:09 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
150.48.170.202.in-addr.arpa domain name pointer ppskportal.kk.usm.my.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
150.48.170.202.in-addr.arpa	name = ppskportal.kk.usm.my.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
200.110.174.137 attack
2020-03-13T03:45:06.637059abusebot.cloudsearch.cf sshd[9477]: Invalid user alex from 200.110.174.137 port 38814
2020-03-13T03:45:06.646664abusebot.cloudsearch.cf sshd[9477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200110174137.ip23.static.mediacommerce.com.co
2020-03-13T03:45:06.637059abusebot.cloudsearch.cf sshd[9477]: Invalid user alex from 200.110.174.137 port 38814
2020-03-13T03:45:09.260680abusebot.cloudsearch.cf sshd[9477]: Failed password for invalid user alex from 200.110.174.137 port 38814 ssh2
2020-03-13T03:49:03.761298abusebot.cloudsearch.cf sshd[9758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200110174137.ip23.static.mediacommerce.com.co  user=root
2020-03-13T03:49:05.576393abusebot.cloudsearch.cf sshd[9758]: Failed password for root from 200.110.174.137 port 41660 ssh2
2020-03-13T03:53:00.632995abusebot.cloudsearch.cf sshd[10026]: pam_unix(sshd:auth): authentication failure; logn
...
2020-03-13 15:41:48
14.183.214.139 attackspambots
20/3/12@23:52:23: FAIL: Alarm-Network address from=14.183.214.139
20/3/12@23:52:23: FAIL: Alarm-Network address from=14.183.214.139
...
2020-03-13 16:14:05
187.162.79.30 attack
Automatic report - Port Scan Attack
2020-03-13 16:10:55
113.172.223.107 attackbots
2020-03-1304:53:091jCbNk-0003DA-Dj\<=info@whatsup2013.chH=\(localhost\)[14.207.46.177]:41254P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=2402id=181DABF8F32709BA66632A92665F8666@whatsup2013.chT="fromDarya"forwarmnightswithyou@protonmail.comsulaiman.ay145212@gmail.com2020-03-1304:52:341jCbNB-0003Al-E5\<=info@whatsup2013.chH=\(localhost\)[113.172.223.107]:48066P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=2396id=6164D2818A5E70C31F1A53EB1F2C114A@whatsup2013.chT="fromDarya"fordonehadenough@gmail.comxavior.j.suarez.52511@gmail.com2020-03-1304:53:221jCbNx-0003EM-SB\<=info@whatsup2013.chH=\(localhost\)[14.186.226.226]:49779P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=2428id=F2F7411219CDE3508C89C0788CE75291@whatsup2013.chT="fromDarya"forjoseph_b55@yahoo.comakiff786@icloud.com2020-03-1304:52:311jCbMi-00039A-R1\<=info@whatsup2013.chH=\(localhost\)[197.251.224.136]:55287P=esmtpsaX
2020-03-13 15:28:50
58.65.136.170 attack
web-1 [ssh] SSH Attack
2020-03-13 15:54:19
114.102.0.87 attack
Robots ignored. Multiple log-reports "Access denied". Probable participation in a distributed denial of service action_
2020-03-13 15:35:26
210.121.223.61 attack
(sshd) Failed SSH login from 210.121.223.61 (KR/South Korea/-): 5 in the last 3600 secs
2020-03-13 15:46:11
157.230.24.223 attack
Automatic report - XMLRPC Attack
2020-03-13 16:11:30
98.152.155.210 attackspam
TCP port 3389: Scan and connection
2020-03-13 15:48:56
185.150.189.23 attack
scanner, scan for phpmyadmin database files
2020-03-13 15:44:21
45.63.83.160 attackspam
Mar 13 08:01:37 lnxded63 sshd[23388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.63.83.160
Mar 13 08:01:39 lnxded63 sshd[23388]: Failed password for invalid user mfptrading from 45.63.83.160 port 36683 ssh2
Mar 13 08:05:16 lnxded63 sshd[23690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.63.83.160
2020-03-13 16:06:35
112.64.52.21 attack
Robots ignored. Multiple log-reports "Access denied". Probable participation in a distributed denial of service action_
2020-03-13 15:51:53
112.85.42.178 attack
Mar 13 08:53:04 nextcloud sshd\[15295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.178  user=root
Mar 13 08:53:06 nextcloud sshd\[15295\]: Failed password for root from 112.85.42.178 port 42569 ssh2
Mar 13 08:53:10 nextcloud sshd\[15295\]: Failed password for root from 112.85.42.178 port 42569 ssh2
2020-03-13 15:54:47
190.151.216.83 attack
Automatic report - Port Scan Attack
2020-03-13 16:01:45
134.175.243.183 attackspambots
Mar 13 06:25:32 ns381471 sshd[8448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.243.183
Mar 13 06:25:34 ns381471 sshd[8448]: Failed password for invalid user db2inst1 from 134.175.243.183 port 37046 ssh2
2020-03-13 16:12:15

最近上报的IP列表

163.47.11.89 158.178.225.76 142.250.197.243 40.99.8.200
13.250.123.91 13.107.246.73 66.33.60.193 111.221.45.79
170.64.239.106 20.163.13.196 10.212.177.214 10.212.177.224
47.32.133.153 113.215.188.193 39.64.208.185 27.40.78.29
27.39.205.120 27.38.206.90 183.251.240.111 123.5.215.28