必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Hong Kong

运营商(isp): CSL Limited

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '202.66.0.0 - 202.66.127.255'

% Abuse contact for '202.66.0.0 - 202.66.127.255' is 'abuse@citictel-cpc.com'

inetnum:        202.66.0.0 - 202.66.127.255
netname:        CITICTEL-CPC-HK
descr:          CITIC Telecom International CPC Limited
descr:          20/F Lincoln House
descr:          Taikoo Place
descr:          979 Kings Road, Quarry Bay
country:        HK
org:            ORG-CTIC1-AP
admin-c:        CN275-AP
tech-c:         CTIC1-AP
abuse-c:        AC1848-AP
status:         ALLOCATED PORTABLE
mnt-by:         APNIC-HM
mnt-lower:      MAINT-HK-CITICTELCPC
mnt-routes:     MAINT-HK-CITICTELCPC
mnt-irt:        IRT-CITICTEL-CPC-HK
last-modified:  2020-06-24T06:23:06Z
source:         APNIC

irt:            IRT-CITICTEL-CPC-HK
address:        20/F, Lincoln House,
address:        Taikoo Place,
address:        Quarry Bay,
address:        HONG KONG
e-mail:         abuse@citictel-cpc.com
abuse-mailbox:  abuse@citictel-cpc.com
admin-c:        CN275-AP
tech-c:         CTIC1-AP
auth:           # Filtered
remarks:        abuse@citictel-cpc.com was validated on 2026-03-03
mnt-by:         MAINT-HK-CITICTELCPC
last-modified:  2026-03-03T13:25:42Z
source:         APNIC

organisation:   ORG-CTIC1-AP
org-name:       CITIC Telecom International CPC Limited
org-type:       LIR
country:        HK
address:        20/F Lincoln House
address:        Taikoo Place
address:        979 King's Road
phone:          +852-2170-7101
fax-no:         +852-2795-1262
e-mail:         hostinfo@citictel-cpc.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:14:43Z
source:         APNIC

role:           ABUSE CITICTELCPCHK
country:        ZZ
address:        20/F, Lincoln House,
address:        Taikoo Place,
address:        Quarry Bay,
address:        HONG KONG
phone:          +000000000
e-mail:         abuse@citictel-cpc.com
admin-c:        CN275-AP
tech-c:         CTIC1-AP
nic-hdl:        AC1848-AP
remarks:        Generated from irt object IRT-CITICTEL-CPC-HK
remarks:        abuse@citictel-cpc.com was validated on 2026-03-03
abuse-mailbox:  abuse@citictel-cpc.com
mnt-by:         APNIC-ABUSE
last-modified:  2026-03-03T13:25:52Z
source:         APNIC

role:           CITICTel-CPC NOC
address:        20/F, Lincoln House,
address:        Taikoo Place,
address:        Quarry Bay,
address:        HONG KONG
country:        HK
phone:          +852-2170-7101
e-mail:         hostinfo@citictel-cpc.com
admin-c:        CTIC1-AP
tech-c:         CTIC1-AP
nic-hdl:        CN275-AP
remarks:        send email to "abuse@citictel-cpc.com" for spamming/abuse issue
notify:         hostinfo@citictel-cpc.com
abuse-mailbox:  abuse@citictel-cpc.com
mnt-by:         MAINT-HK-CITICTELCPC
last-modified:  2013-08-13T04:19:50Z
source:         APNIC

person:         CITIC Telecom International CPC Limited NOC
address:        20/F, Lincoln House,
address:        Taikoo Place,
address:        Quarry Bay,
address:        HONG KONG
country:        HK
phone:          +852-2170-7101
e-mail:         hostinfo@citictel-cpc.com
nic-hdl:        CTIC1-AP
remarks:        send email to "abuse@citictel-cpc.com" for spamming/abuse issue
notify:         hostinfo@citictel-cpc.com
abuse-mailbox:  abuse@citictel-cpc.com
mnt-by:         MAINT-HK-CITICTELCPC
last-modified:  2013-08-13T04:16:50Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.66.5.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8310
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;202.66.5.8.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026030600 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 06 23:11:32 CST 2026
;; MSG SIZE  rcvd: 103
HOST信息:
8.5.66.202.in-addr.arpa domain name pointer 202.66.5-8.static.hk.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
8.5.66.202.in-addr.arpa	name = 202.66.5-8.static.hk.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
181.51.32.182 attackbotsspam
"SMTPD"	2392	16418	"2019-07-20 x@x
"SMTPD"	2392	16418	"2019-07-20 03:09:50.065"	"181.51.32.182"	"SENT: 550 Delivery is not allowed to this address."

IP Address:	181.51.32.182
Email x@x
No MX record resolves to this server for domain: opvakantievanafeindhoven.nl


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=181.51.32.182
2019-07-20 19:02:05
89.35.39.126 attackspam
Auto reported by IDS
2019-07-20 18:34:44
107.170.234.57 attack
Jul 20 05:02:55 Tower sshd[33835]: Connection from 107.170.234.57 port 52940 on 192.168.10.220 port 22
Jul 20 05:02:59 Tower sshd[33835]: Invalid user ashton from 107.170.234.57 port 52940
Jul 20 05:02:59 Tower sshd[33835]: error: Could not get shadow information for NOUSER
Jul 20 05:02:59 Tower sshd[33835]: Failed password for invalid user ashton from 107.170.234.57 port 52940 ssh2
Jul 20 05:02:59 Tower sshd[33835]: Received disconnect from 107.170.234.57 port 52940:11: Bye Bye [preauth]
Jul 20 05:02:59 Tower sshd[33835]: Disconnected from invalid user ashton 107.170.234.57 port 52940 [preauth]
2019-07-20 18:52:11
114.40.117.130 attack
[portscan] Port scan
2019-07-20 18:44:28
130.61.72.90 attackbotsspam
Jul 20 11:24:45 herz-der-gamer sshd[4736]: Failed password for invalid user joao from 130.61.72.90 port 37238 ssh2
...
2019-07-20 18:35:51
89.233.219.57 attack
Honeypot attack, port: 23, PTR: 89-233-219-57.cust.bredband2.com.
2019-07-20 18:53:55
1.53.137.164 attack
email spam
2019-07-20 18:40:45
174.103.170.160 attack
Jul 20 08:47:33 MK-Soft-VM3 sshd\[21400\]: Invalid user deployer from 174.103.170.160 port 39356
Jul 20 08:47:33 MK-Soft-VM3 sshd\[21400\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.103.170.160
Jul 20 08:47:34 MK-Soft-VM3 sshd\[21400\]: Failed password for invalid user deployer from 174.103.170.160 port 39356 ssh2
...
2019-07-20 18:05:53
145.239.128.24 attack
145.239.128.24 - - \[20/Jul/2019:10:37:59 +0200\] "POST /wp-login.php HTTP/1.1" 200 2110 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
145.239.128.24 - - \[20/Jul/2019:10:37:59 +0200\] "POST /wp-login.php HTTP/1.1" 200 2091 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-07-20 18:18:14
150.95.30.118 attackspambots
Auto reported by IDS
2019-07-20 18:53:35
27.192.12.15 attackbotsspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-20 18:56:31
185.234.216.220 attackspam
Jul 20 02:30:15 mail postfix/smtpd\[31898\]: warning: unknown\[185.234.216.220\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul 20 03:01:06 mail postfix/smtpd\[32434\]: warning: unknown\[185.234.216.220\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul 20 03:11:16 mail postfix/smtpd\[32629\]: warning: unknown\[185.234.216.220\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul 20 03:21:46 mail postfix/smtpd\[373\]: warning: unknown\[185.234.216.220\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-07-20 18:32:16
134.73.161.140 attackbots
Automatic report - SSH Brute-Force Attack
2019-07-20 18:09:15
113.160.148.74 attack
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2019-07-20 18:55:34
52.143.153.32 attackbots
Jul 20 12:08:22 * sshd[16413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.143.153.32
Jul 20 12:08:24 * sshd[16413]: Failed password for invalid user support from 52.143.153.32 port 59100 ssh2
2019-07-20 18:19:10

最近上报的IP列表

83.142.209.67 166.88.164.217 59.39.222.245 23.225.40.149
39.98.63.115 165.245.190.93 13.222.157.162 192.204.43.113
112.45.101.155 185.211.101.91 216.167.2.233 220.167.232.114
44.201.59.250 94.231.206.2 94.231.206.109 49.78.84.123
35.203.210.87 34.53.191.143 41.193.162.193 100.50.36.245