必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Kathmandu

省份(region): Province 3

国家(country): Nepal

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
202.63.243.174 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/202.63.243.174/ 
 
 NP - 1H : (1)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : NP 
 NAME ASN : ASN4007 
 
 IP : 202.63.243.174 
 
 CIDR : 202.63.243.0/24 
 
 PREFIX COUNT : 91 
 
 UNIQUE IP COUNT : 25088 
 
 
 ATTACKS DETECTED ASN4007 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-05 07:25:57 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2019-11-05 17:52:23
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '202.63.243.0 - 202.63.243.255'

% Abuse contact for '202.63.243.0 - 202.63.243.255' is 'abuse@subisu.net.np'

inetnum:        202.63.243.0 - 202.63.243.255
netname:        SUBISU_Corporate_Pool24
descr:          SUBISU_Corporate_Pool24
country:        NP
admin-c:        ATC1-AP
tech-c:         DS625-AP
abuse-c:        AS2579-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-NP-SUBISU
mnt-irt:        IRT-SUBISUCABLENET-NP-NP
last-modified:  2021-02-02T16:05:28Z
source:         APNIC

irt:            IRT-SUBISUCABLENET-NP-NP
address:        PO Box: 6626, Baluwatar
address:        Kathmandu
address:        Nepal
e-mail:         engg@subisu.net.np
abuse-mailbox:  abuse@subisu.net.np
admin-c:        ATC1-AP
tech-c:         DS625-AP
auth:           # Filtered
remarks:        abuse@subisu.net.np is invalid
remarks:        engg@subisu.net.np was validated on 2026-03-19
mnt-by:         MAINT-NP-SUBISU
last-modified:  2026-03-19T05:44:02Z
source:         APNIC

role:           ABUSE SUBISUCABLENETNPNP
country:        ZZ
address:        PO Box: 6626, Baluwatar
address:        Kathmandu
address:        Nepal
phone:          +000000000
e-mail:         engg@subisu.net.np
admin-c:        ATC1-AP
tech-c:         DS625-AP
nic-hdl:        AS2579-AP
remarks:        Generated from irt object IRT-SUBISUCABLENET-NP-NP
remarks:        abuse@subisu.net.np is invalid
remarks:        engg@subisu.net.np was validated on 2026-03-19
abuse-mailbox:  abuse@subisu.net.np
mnt-by:         APNIC-ABUSE
last-modified:  2026-03-19T05:44:28Z
source:         APNIC

person:         Amit Thapa Chhetri
address:        PO Box: 6626
address:        katmandu
country:        NP
phone:          +977-1-4429616
fax-no:         +977-1-4430572
e-mail:         amit@subisu.net.np
mnt-by:         MAINT-NP-SUBISU
nic-hdl:        ATC1-AP
last-modified:  2008-09-04T07:29:23Z
source:         APNIC

person:         Deepak Shrestha
address:        Subisu Cable Net
address:        PO Box 6626
address:        Kathmandu
country:        NP
phone:          +977-1-4429616
e-mail:         deepak@subisu.net.np
nic-hdl:        DS625-AP
mnt-by:         MAINT-NP-SUBISU
last-modified:  2008-09-04T07:50:52Z
source:         APNIC

% Information related to '202.63.243.0/24AS136762'

route:          202.63.243.0/24
origin:         AS136762
descr:          Subisu Cablenet
                PO Box 6626 Kathmandu
mnt-by:         MAINT-NP-SUBISU
last-modified:  2018-12-13T06:37:45Z
source:         APNIC

% Information related to '202.63.243.0/24AS4007'

route:          202.63.243.0/24
origin:         AS4007
descr:          Subisu Cablenet
                PO Box 6626 Kathmandu
mnt-by:         MAINT-NP-SUBISU
last-modified:  2018-12-13T06:32:42Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.63.243.200
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56225
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;202.63.243.200.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040201 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 03 12:30:54 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 200.243.63.202.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 200.243.63.202.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
115.50.154.75 attackspambots
Automatic report - Port Scan Attack
2020-09-30 01:42:50
139.162.247.102 attackspambots
honeypot 22 port
2020-09-30 01:51:04
187.188.63.72 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-30 01:30:48
218.75.156.247 attack
Sep 29 11:25:50 vlre-nyc-1 sshd\[18241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.75.156.247  user=root
Sep 29 11:25:53 vlre-nyc-1 sshd\[18241\]: Failed password for root from 218.75.156.247 port 35364 ssh2
Sep 29 11:30:31 vlre-nyc-1 sshd\[18303\]: Invalid user vps from 218.75.156.247
Sep 29 11:30:31 vlre-nyc-1 sshd\[18303\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.75.156.247
Sep 29 11:30:33 vlre-nyc-1 sshd\[18303\]: Failed password for invalid user vps from 218.75.156.247 port 35980 ssh2
...
2020-09-30 01:10:51
36.133.121.14 attackspambots
(sshd) Failed SSH login from 36.133.121.14 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 29 11:04:37 elude sshd[2803]: Invalid user ubuntu from 36.133.121.14 port 41334
Sep 29 11:04:39 elude sshd[2803]: Failed password for invalid user ubuntu from 36.133.121.14 port 41334 ssh2
Sep 29 11:20:56 elude sshd[5236]: Invalid user 7 from 36.133.121.14 port 45026
Sep 29 11:20:57 elude sshd[5236]: Failed password for invalid user 7 from 36.133.121.14 port 45026 ssh2
Sep 29 11:22:10 elude sshd[5413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.133.121.14  user=root
2020-09-30 01:43:35
133.167.116.99 attackspam
Sep 29 08:29:09 gw1 sshd[10827]: Failed password for news from 133.167.116.99 port 53500 ssh2
...
2020-09-30 01:40:22
200.206.81.154 attack
Sep 28 15:30:58 *hidden* sshd[23807]: Failed password for invalid user prueba from 200.206.81.154 port 54307 ssh2 Sep 28 15:48:24 *hidden* sshd[32258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.206.81.154 user=root Sep 28 15:48:26 *hidden* sshd[32258]: Failed password for *hidden* from 200.206.81.154 port 59768 ssh2
2020-09-30 01:46:06
51.38.187.198 attack
51.38.187.198 - - [29/Sep/2020:16:22:08 +0200] "GET /wp-login.php HTTP/1.1" 200 8558 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.38.187.198 - - [29/Sep/2020:16:22:09 +0200] "POST /wp-login.php HTTP/1.1" 200 8809 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.38.187.198 - - [29/Sep/2020:16:22:10 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-30 01:49:51
39.72.180.34 attackspambots
DATE:2020-09-28 22:32:17, IP:39.72.180.34, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-09-30 01:30:36
5.135.161.7 attack
Sep 29 12:17:52 rocket sshd[11848]: Failed password for invalid user digital from 5.135.161.7 port 37521 ssh2
Sep 29 12:22:50 rocket sshd[12480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.161.7
Sep 29 12:22:52 rocket sshd[12480]: Failed password for invalid user deployer from 5.135.161.7 port 41379 ssh2
...
2020-09-30 01:42:20
145.239.19.186 attackspam
Sep 29 19:39:00 ip106 sshd[20733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.19.186 
Sep 29 19:39:03 ip106 sshd[20733]: Failed password for invalid user jean from 145.239.19.186 port 55962 ssh2
...
2020-09-30 01:48:26
59.18.121.131 attackbotsspam
Automatic report - Port Scan
2020-09-30 01:39:10
185.191.171.4 attackbots
Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools
2020-09-30 01:19:21
36.155.113.40 attackbotsspam
2020-09-29T11:16:49.301390abusebot.cloudsearch.cf sshd[32076]: Invalid user oleta from 36.155.113.40 port 37309
2020-09-29T11:16:49.308033abusebot.cloudsearch.cf sshd[32076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.113.40
2020-09-29T11:16:49.301390abusebot.cloudsearch.cf sshd[32076]: Invalid user oleta from 36.155.113.40 port 37309
2020-09-29T11:16:51.060560abusebot.cloudsearch.cf sshd[32076]: Failed password for invalid user oleta from 36.155.113.40 port 37309 ssh2
2020-09-29T11:22:01.597411abusebot.cloudsearch.cf sshd[32111]: Invalid user voip from 36.155.113.40 port 33436
2020-09-29T11:22:01.602790abusebot.cloudsearch.cf sshd[32111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.113.40
2020-09-29T11:22:01.597411abusebot.cloudsearch.cf sshd[32111]: Invalid user voip from 36.155.113.40 port 33436
2020-09-29T11:22:03.520952abusebot.cloudsearch.cf sshd[32111]: Failed password for inva
...
2020-09-30 01:32:39
187.72.177.131 attack
Sep 29 18:35:24 gw1 sshd[27086]: Failed password for root from 187.72.177.131 port 36512 ssh2
Sep 29 18:40:16 gw1 sshd[27346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.72.177.131
...
2020-09-30 01:11:16

最近上报的IP列表

7.84.28.154 194.187.177.15 190.145.123.18 66.132.172.130
2606:4700:10::6816:2296 2606:4700:10::6814:5751 2606:4700:10::6816:4646 2606:4700:10::6816:379d
2606:4700:10::6816:1907 2606:4700:10::6814:4596 2606:4700:10::6814:5417 2606:4700:10::6816:371
2606:4700:10::6814:8130 72.245.200.59 114.16.22.28 2606:4700:10::6816:4394
2606:4700:10::6814:5950 2606:4700:10::ac43:1128 110.78.158.233 2606:4700:10::6816:1323