必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Bayan Lepas

省份(region): Pinang

国家(country): Malaysia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '202.170.48.0 - 202.170.63.255'

% Abuse contact for '202.170.48.0 - 202.170.63.255' is 'irham@usm.my'

inetnum:        202.170.48.0 - 202.170.63.255
netname:        USMNET
descr:          Universiti Sains Malaysia, Penang, Malaysia
country:        MY
org:            ORG-USM1-AP
admin-c:        AY223-AP
tech-c:         AY223-AP
abuse-c:        AU87-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-MY-UNISAINS
mnt-routes:     MAINT-MY-UNISAINS
mnt-irt:        IRT-UNISAINS-MY
last-modified:  2020-10-20T00:57:31Z
source:         APNIC

irt:            IRT-UNISAINS-MY
address:        Universiti Sains Malaysia,
address:        Center for Knowledge, Communication and Technology,
address:        11800 Pulau Pinang, MALAYSIA
e-mail:         irham@usm.my
abuse-mailbox:  irham@usm.my
admin-c:        AY223-AP
tech-c:         AY223-AP
auth:           # Filtered
remarks:        irham@usm.my was validated on 2025-12-15
mnt-by:         MAINT-MY-UNISAINS
last-modified:  2025-12-15T00:57:33Z
source:         APNIC

organisation:   ORG-USM1-AP
org-name:       Universiti Sains Malaysia
org-type:       LIR
country:        MY
address:        Center for Knowledge, Communication and Technology
address:        Universiti Sains Malaysia
phone:          +6046533782
fax-no:         +6046569117
e-mail:         ppkt@usm.my
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:15:06Z
source:         APNIC

role:           ABUSE UNISAINSMY
country:        ZZ
address:        Universiti Sains Malaysia,
address:        Center for Knowledge, Communication and Technology,
address:        11800 Pulau Pinang, MALAYSIA
phone:          +000000000
e-mail:         irham@usm.my
admin-c:        AY223-AP
tech-c:         AY223-AP
nic-hdl:        AU87-AP
remarks:        Generated from irt object IRT-UNISAINS-MY
remarks:        irham@usm.my was validated on 2025-12-15
abuse-mailbox:  irham@usm.my
mnt-by:         APNIC-ABUSE
last-modified:  2025-12-15T00:57:51Z
source:         APNIC

person:         Ahmad Fadhlul Irham Yusoff
nic-hdl:        AY223-AP
e-mail:         irham@usm.my
address:        Universiti Sains Malaysia,
address:        Center for Knowledge, Communication and Technology,
address:        11800 Pulau Pinang, MALAYSIA
phone:          +604-653-3782
fax-no:         +604-653-9177
country:        MY
mnt-by:         MAINT-MY-UNISAINS
last-modified:  2008-09-04T07:29:24Z
source:         APNIC

% Information related to '202.170.48.0/24AS24090'

route:          202.170.48.0/24
origin:         AS24090
descr:          Universiti Sains Malaysia
                Center for Knowledge, Communication and Technology
                Universiti Sains Malaysia
mnt-by:         MAINT-MY-UNISAINS
last-modified:  2020-09-23T07:35:33Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.170.48.250
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56547
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;202.170.48.250.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026020502 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 06 01:58:01 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 250.48.170.202.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 250.48.170.202.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
164.160.225.242 attackspambots
Automatic report - Banned IP Access
2020-06-10 16:05:19
78.182.45.166 attackbotsspam
SMB Server BruteForce Attack
2020-06-10 15:48:17
178.32.221.142 attack
Jun 10 04:50:32 vps46666688 sshd[30315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.221.142
Jun 10 04:50:35 vps46666688 sshd[30315]: Failed password for invalid user info from 178.32.221.142 port 50222 ssh2
...
2020-06-10 15:51:32
139.155.17.74 attackspam
2020-06-10 05:51:03,895 fail2ban.actions: WARNING [ssh] Ban 139.155.17.74
2020-06-10 15:45:31
190.96.139.112 attackbotsspam
Jun 10 09:47:36 OPSO sshd\[11618\]: Invalid user student from 190.96.139.112 port 52961
Jun 10 09:47:36 OPSO sshd\[11618\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.96.139.112
Jun 10 09:47:38 OPSO sshd\[11618\]: Failed password for invalid user student from 190.96.139.112 port 52961 ssh2
Jun 10 09:51:19 OPSO sshd\[12552\]: Invalid user teamspeak3 from 190.96.139.112 port 47362
Jun 10 09:51:19 OPSO sshd\[12552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.96.139.112
2020-06-10 16:04:51
106.13.52.107 attackbotsspam
$f2bV_matches
2020-06-10 15:57:47
89.248.169.143 attackbots
2020-06-10T03:12:31.5751371495-001 sshd[45214]: Invalid user fi from 89.248.169.143 port 45936
2020-06-10T03:12:33.8246221495-001 sshd[45214]: Failed password for invalid user fi from 89.248.169.143 port 45936 ssh2
2020-06-10T03:15:42.0011721495-001 sshd[45356]: Invalid user rw from 89.248.169.143 port 48722
2020-06-10T03:15:42.0041361495-001 sshd[45356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.248.169.143
2020-06-10T03:15:42.0011721495-001 sshd[45356]: Invalid user rw from 89.248.169.143 port 48722
2020-06-10T03:15:44.4674321495-001 sshd[45356]: Failed password for invalid user rw from 89.248.169.143 port 48722 ssh2
...
2020-06-10 15:58:13
192.35.168.231 attackspambots
firewall-block, port(s): 3010/tcp
2020-06-10 15:43:59
106.12.59.245 attack
Jun 10 06:02:24 srv-ubuntu-dev3 sshd[80710]: Invalid user oracle from 106.12.59.245
Jun 10 06:02:24 srv-ubuntu-dev3 sshd[80710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.59.245
Jun 10 06:02:24 srv-ubuntu-dev3 sshd[80710]: Invalid user oracle from 106.12.59.245
Jun 10 06:02:26 srv-ubuntu-dev3 sshd[80710]: Failed password for invalid user oracle from 106.12.59.245 port 51552 ssh2
Jun 10 06:06:42 srv-ubuntu-dev3 sshd[81339]: Invalid user aruba from 106.12.59.245
Jun 10 06:06:42 srv-ubuntu-dev3 sshd[81339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.59.245
Jun 10 06:06:42 srv-ubuntu-dev3 sshd[81339]: Invalid user aruba from 106.12.59.245
Jun 10 06:06:43 srv-ubuntu-dev3 sshd[81339]: Failed password for invalid user aruba from 106.12.59.245 port 47268 ssh2
Jun 10 06:11:07 srv-ubuntu-dev3 sshd[81995]: Invalid user testuser from 106.12.59.245
...
2020-06-10 16:13:10
221.133.18.115 attackspam
Jun 10 07:33:36 vmd17057 sshd[4926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.133.18.115 
Jun 10 07:33:38 vmd17057 sshd[4926]: Failed password for invalid user uf from 221.133.18.115 port 41861 ssh2
...
2020-06-10 15:41:51
195.54.166.47 attack
06/10/2020-03:28:09.594464 195.54.166.47 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-10 16:10:49
117.6.236.165 attackspam
20/6/9@23:51:06: FAIL: Alarm-Network address from=117.6.236.165
...
2020-06-10 15:43:34
222.186.42.136 attackspam
SSH/22 MH Probe, BF, Hack -
2020-06-10 15:40:39
139.155.79.24 attackbotsspam
Jun 10 05:48:25 ns382633 sshd\[29444\]: Invalid user admin from 139.155.79.24 port 46320
Jun 10 05:48:25 ns382633 sshd\[29444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.79.24
Jun 10 05:48:27 ns382633 sshd\[29444\]: Failed password for invalid user admin from 139.155.79.24 port 46320 ssh2
Jun 10 05:51:11 ns382633 sshd\[30105\]: Invalid user nilesh from 139.155.79.24 port 42658
Jun 10 05:51:11 ns382633 sshd\[30105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.79.24
2020-06-10 15:37:39
103.111.83.174 attackbotsspam
 TCP (SYN) 103.111.83.174:16759 -> port 23, len 44
2020-06-10 15:59:31

最近上报的IP列表

202.170.48.150 163.47.11.89 158.178.225.76 142.250.197.243
40.99.8.200 13.250.123.91 13.107.246.73 66.33.60.193
111.221.45.79 170.64.239.106 20.163.13.196 10.212.177.214
10.212.177.224 47.32.133.153 113.215.188.193 39.64.208.185
27.40.78.29 27.39.205.120 27.38.206.90 183.251.240.111