必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Cyberjaya

省份(region): Selangor

国家(country): Malaysia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '203.25.78.0 - 203.25.78.255'

% Abuse contact for '203.25.78.0 - 203.25.78.255' is 'noc@ixtelecom.net'

inetnum:        203.25.78.0 - 203.25.78.255
netname:        IXTELECOM-MY
descr:          Level 40 Tower 2 Petronas Twin Towers
descr:          Kuala Lumpur City Centre (KLCC)
country:        MY
org:            ORG-IT1-AP
admin-c:        ROR1-AP
tech-c:         ROR1-AP
status:         ASSIGNED PORTABLE
abuse-c:        AI567-AP
remarks:        Used for IPv4
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-IXTELECOM-MY
mnt-routes:     MAINT-IXTELECOM-MY
mnt-irt:        IRT-IXTELECOM-MY
last-modified:  2026-02-27T04:22:38Z
source:         APNIC

irt:            IRT-IXTELECOM-MY
address:        D1-04-10, Tamarind Square
address:        Persiaran Multimedia
address:        63000 Cyberjaya, Selangor, Malaysia
e-mail:         noc@ixtelecom.net
abuse-mailbox:  noc@ixtelecom.net
admin-c:        ITNA2-AP
tech-c:         ROR1-AP
auth:           # Filtered
remarks:        noc@ixtelecom.net was validated on 2025-12-16
mnt-by:         MAINT-IXTELECOM-MY
last-modified:  2026-02-03T14:15:12Z
source:         APNIC

organisation:   ORG-IT1-AP
org-name:       IX Telecom
org-type:       LIR
country:        MY
address:        D1-04-10, Tamarind Square
address:        Persiaran Multimedia
phone:          +60-3-8686-8888
fax-no:         +60-3-8686-8899
e-mail:         noc@ixtelecom.net
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:15:50Z
source:         APNIC

role:           ABUSE IXTELECOMMY
country:        ZZ
address:        D1-04-10, Tamarind Square
address:        Persiaran Multimedia
address:        63000 Cyberjaya, Selangor, Malaysia
phone:          +000000000
e-mail:         noc@ixtelecom.net
admin-c:        ITNA2-AP
tech-c:         ROR1-AP
nic-hdl:        AI567-AP
remarks:        Generated from irt object IRT-IXTELECOM-MY
remarks:        noc@ixtelecom.net was validated on 2025-12-16
abuse-mailbox:  noc@ixtelecom.net
mnt-by:         APNIC-ABUSE
last-modified:  2025-12-16T13:08:06Z
source:         APNIC

person:         Riv Octovahriz Rivai
address:        D1-04-10, Tamarind Square
                Persiaran Multimedia
                63000 Cyberjaya
                Selangor, Malaysia
country:        MY
phone:          +603 8686 8888
e-mail:         riv@ixtelecom.net
nic-hdl:        ROR1-AP
mnt-by:         MAINT-IXTELECOM-MY
last-modified:  2022-03-19T13:46:55Z
source:         APNIC

% Information related to '203.25.78.0/24AS56286'

route:          203.25.78.0/24
origin:         AS56286
descr:          IX Telecom
                D1-04-10, Tamarind Square
                Persiaran Multimedia
mnt-by:         MAINT-IXTELECOM-MY
last-modified:  2025-10-23T06:54:51Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 203.25.78.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62930
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;203.25.78.220.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031002 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 11 13:48:52 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 220.78.25.203.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 203.25.78.220.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
182.61.175.96 attack
Nov 13 05:43:39 vtv3 sshd[24388]: Failed password for invalid user verland from 182.61.175.96 port 40870 ssh2
Nov 13 05:47:45 vtv3 sshd[26480]: Invalid user info from 182.61.175.96 port 49062
Nov 13 05:47:45 vtv3 sshd[26480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.175.96
Nov 13 06:00:26 vtv3 sshd[395]: Invalid user superman from 182.61.175.96 port 45448
Nov 13 06:00:26 vtv3 sshd[395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.175.96
Nov 13 06:00:28 vtv3 sshd[395]: Failed password for invalid user superman from 182.61.175.96 port 45448 ssh2
Nov 13 06:04:34 vtv3 sshd[2132]: Invalid user phair from 182.61.175.96 port 53652
Nov 13 06:04:34 vtv3 sshd[2132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.175.96
Nov 27 08:56:45 vtv3 sshd[12838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.175.96 
Nov 27 08:56:47
2019-11-27 19:05:04
217.243.172.58 attack
Automatic report - Banned IP Access
2019-11-27 19:09:39
13.234.177.166 attackbots
Brute force attack against VPN service
2019-11-27 18:52:40
62.234.73.104 attackspambots
Nov 27 05:35:24 ny01 sshd[6599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.73.104
Nov 27 05:35:26 ny01 sshd[6599]: Failed password for invalid user dovecot from 62.234.73.104 port 49796 ssh2
Nov 27 05:39:29 ny01 sshd[6960]: Failed password for root from 62.234.73.104 port 53432 ssh2
2019-11-27 18:54:25
200.27.119.92 attackspambots
postfix
2019-11-27 19:14:45
222.186.175.147 attackbotsspam
2019-11-27T11:37:40.428747ns386461 sshd\[26566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.147  user=root
2019-11-27T11:37:42.635904ns386461 sshd\[26566\]: Failed password for root from 222.186.175.147 port 63770 ssh2
2019-11-27T11:37:45.491108ns386461 sshd\[26566\]: Failed password for root from 222.186.175.147 port 63770 ssh2
2019-11-27T11:37:48.759227ns386461 sshd\[26566\]: Failed password for root from 222.186.175.147 port 63770 ssh2
2019-11-27T11:37:51.770400ns386461 sshd\[26566\]: Failed password for root from 222.186.175.147 port 63770 ssh2
...
2019-11-27 18:38:16
178.62.79.227 attackbots
Nov 26 23:56:44 web1 sshd\[8264\]: Invalid user admin777 from 178.62.79.227
Nov 26 23:56:44 web1 sshd\[8264\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.79.227
Nov 26 23:56:47 web1 sshd\[8264\]: Failed password for invalid user admin777 from 178.62.79.227 port 60050 ssh2
Nov 27 00:01:56 web1 sshd\[8748\]: Invalid user bot from 178.62.79.227
Nov 27 00:01:56 web1 sshd\[8748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.79.227
2019-11-27 19:00:58
180.180.123.220 attackspambots
Unauthorized connection attempt from IP address 180.180.123.220 on Port 445(SMB)
2019-11-27 18:48:07
148.70.24.20 attackbotsspam
Nov 27 05:20:02 linuxvps sshd\[53749\]: Invalid user server from 148.70.24.20
Nov 27 05:20:02 linuxvps sshd\[53749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.24.20
Nov 27 05:20:05 linuxvps sshd\[53749\]: Failed password for invalid user server from 148.70.24.20 port 41242 ssh2
Nov 27 05:27:52 linuxvps sshd\[58219\]: Invalid user solanki from 148.70.24.20
Nov 27 05:27:52 linuxvps sshd\[58219\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.24.20
2019-11-27 18:50:10
213.251.35.49 attackbotsspam
Nov 27 12:37:32 gw1 sshd[13844]: Failed password for root from 213.251.35.49 port 36498 ssh2
...
2019-11-27 18:47:45
104.245.145.124 attackspam
(From rufus.birtwistle6@googlemail.com) Interested in advertising that charges less than $49 per month and delivers tons of people who are ready to buy directly to your website? Reply to: alfred4756will@gmail.com to find out how this works.
2019-11-27 18:56:14
182.254.188.93 attackbotsspam
Nov 27 11:24:58 * sshd[25013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.188.93
Nov 27 11:24:59 * sshd[25013]: Failed password for invalid user andre from 182.254.188.93 port 56456 ssh2
2019-11-27 18:36:21
36.78.45.235 attackspam
Unauthorised access (Nov 27) SRC=36.78.45.235 LEN=52 TTL=115 ID=30879 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Nov 27) SRC=36.78.45.235 LEN=52 TTL=115 ID=2184 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-27 18:35:53
72.252.110.155 attackspam
Automatic report - Banned IP Access
2019-11-27 18:39:33
83.26.243.75 attack
Fail2Ban Ban Triggered
2019-11-27 19:11:23

最近上报的IP列表

198.235.24.222 104.248.248.6 157.245.96.91 139.59.36.115
114.236.93.69 177.190.67.44 172.210.9.172 2.58.115.100
149.52.75.129 43.128.81.242 192.109.139.196 44.245.225.158
142.93.213.36 193.112.190.192 183.36.34.69 121.231.113.168
43.230.8.77 45.88.91.106 155.102.247.63 155.212.209.222