必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Australia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '203.28.0.0 - 203.28.7.255'

% Abuse contact for '203.28.0.0 - 203.28.7.255' is 'abuse.apac@verizon.com'

inetnum:        203.28.0.0 - 203.28.7.255
netname:        VERIZON-AU
descr:          Verizon Australia Pty Limited
country:        AU
org:            ORG-VAPL3-AP
admin-c:        UI2-AP
tech-c:         UI2-AP
abuse-c:        AV293-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-DNS-UUNET
mnt-routes:     MAINT-DNS-UUNET
mnt-irt:        IRT-VERIZON-AU
last-modified:  2024-06-19T01:34:14Z
source:         APNIC

irt:            IRT-VERIZON-AU
address:        UUNET House, 203 Pacific Highway
address:        St Leonards, NSW, 2065
e-mail:         abuse.apac@verizon.com
abuse-mailbox:  abuse.apac@verizon.com
admin-c:        UI2-AP
tech-c:         UI2-AP
auth:           # Filtered
remarks:        abuse.apac@verizon.com is invalid
mnt-by:         MAINT-DNS-UUNET
last-modified:  2026-02-13T02:02:42Z
source:         APNIC

organisation:   ORG-VAPL3-AP
org-name:       Verizon Australia Pty Limited
org-type:       LIR
country:        AU
address:        Level 3
address:        203 Pacific Highway
phone:          +65-6248-6513
fax-no:         +65-6248-6501
e-mail:         stephen.r.middleton@verizon.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:14:45Z
source:         APNIC

role:           ABUSE VERIZONAU
country:        ZZ
address:        UUNET House, 203 Pacific Highway
address:        St Leonards, NSW, 2065
phone:          +000000000
e-mail:         abuse.apac@verizon.com
admin-c:        UI2-AP
tech-c:         UI2-AP
nic-hdl:        AV293-AP
remarks:        Generated from irt object IRT-VERIZON-AU
remarks:        abuse.apac@verizon.com is invalid
abuse-mailbox:  abuse.apac@verizon.com
mnt-by:         APNIC-ABUSE
last-modified:  2026-02-13T02:02:58Z
source:         APNIC

role:           UUNET-AU IPAdmins
address:        UUNET House, 203 Pacific Highway
address:        St Leonards, NSW, 2065
country:        AU
phone:          +61-2-9434-5000
fax-no:         +61-2-9434-5888
e-mail:         abuse@hk.verizonbusiness.com
admin-c:        UI2-AP
tech-c:         UI2-AP
nic-hdl:        UI2-AP
remarks:        Admin emails: aspacsystemstac@au.mci.com
mnt-by:         MAINT-DNS-UUNET
last-modified:  2008-09-04T07:54:15Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 203.28.2.227
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32496
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;203.28.2.227.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041800 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 18 20:27:52 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
b'Host 227.2.28.203.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 203.28.2.227.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
35.240.189.61 attackspambots
GET /wp-login.php
2019-10-10 04:25:12
218.187.101.200 attackspambots
Honeypot attack, port: 5555, PTR: NK218-187-101-200.adsl.dynamic.apol.com.tw.
2019-10-10 04:44:14
81.152.54.113 attackbots
Automatic report - Port Scan Attack
2019-10-10 04:39:58
217.12.84.142 attackspambots
scan r
2019-10-10 04:52:05
222.93.65.53 attackbots
Oct  9 15:25:18 esmtp postfix/smtpd[24794]: lost connection after AUTH from unknown[222.93.65.53]
Oct  9 15:25:18 esmtp postfix/smtpd[24816]: lost connection after AUTH from unknown[222.93.65.53]
Oct  9 15:25:20 esmtp postfix/smtpd[24816]: lost connection after AUTH from unknown[222.93.65.53]
Oct  9 15:25:20 esmtp postfix/smtpd[24792]: lost connection after AUTH from unknown[222.93.65.53]
Oct  9 15:25:21 esmtp postfix/smtpd[24794]: lost connection after AUTH from unknown[222.93.65.53]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=222.93.65.53
2019-10-10 04:58:09
189.69.44.56 attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/189.69.44.56/ 
 BR - 1H : (264)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BR 
 NAME ASN : ASN27699 
 
 IP : 189.69.44.56 
 
 CIDR : 189.69.0.0/16 
 
 PREFIX COUNT : 267 
 
 UNIQUE IP COUNT : 6569728 
 
 
 WYKRYTE ATAKI Z ASN27699 :  
  1H - 5 
  3H - 16 
  6H - 27 
 12H - 61 
 24H - 113 
 
 DateTime : 2019-10-09 21:46:28 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-10 04:25:42
187.60.32.153 attackspam
2019-10-09T20:04:57.427936abusebot-6.cloudsearch.cf sshd\[9957\]: Invalid user user from 187.60.32.153 port 46126
2019-10-10 04:35:24
71.6.158.166 attack
Port scan
2019-10-10 04:47:29
130.198.67.114 attackbotsspam
Oct  9 22:31:21 mail kernel: [366328.724130] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=130.198.67.114 DST=77.73.69.240 LEN=40 TOS=0x08 PREC=0x20 TTL=63 ID=11572 DF PROTO=TCP SPT=50819 DPT=443 WINDOW=29200 RES=0x00 SYN URGP=0 
Oct  9 22:31:21 mail kernel: [366328.733582] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=130.198.67.114 DST=77.73.69.240 LEN=40 TOS=0x08 PREC=0x20 TTL=57 ID=34779 DF PROTO=TCP SPT=49583 DPT=22 WINDOW=29200 RES=0x00 SYN URGP=0 
Oct  9 22:31:22 mail kernel: [366328.855581] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=130.198.67.114 DST=77.73.69.240 LEN=40 TOS=0x08 PREC=0x20 TTL=64 ID=25623 DF PROTO=TCP SPT=52939 DPT=443 WINDOW=29200 RES=0x00 SYN URGP=0 
Oct  9 22:31:22 mail kernel: [366328.885170] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=130.198.67.114 DST=77.73.69.240 LEN=40 TOS=0x08 PREC=0x20 TTL=56 ID=25689 DF PROTO=TCP SPT=51607 DPT=22 WINDOW=29200 RES=0x00 SY
2019-10-10 04:41:20
95.9.147.24 attackbotsspam
Honeypot attack, port: 81, PTR: 95.9.147.24.static.ttnet.com.tr.
2019-10-10 04:20:00
125.9.184.66 attack
Honeypot attack, port: 23, PTR: 125-9-184-66.rev.home.ne.jp.
2019-10-10 04:54:00
14.162.183.197 attackbotsspam
Oct  9 10:03:13 php1 sshd\[976\]: Invalid user PassW0rd2017 from 14.162.183.197
Oct  9 10:03:13 php1 sshd\[976\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.162.183.197
Oct  9 10:03:14 php1 sshd\[976\]: Failed password for invalid user PassW0rd2017 from 14.162.183.197 port 52820 ssh2
Oct  9 10:11:37 php1 sshd\[1768\]: Invalid user 123Canon from 14.162.183.197
Oct  9 10:11:37 php1 sshd\[1768\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.162.183.197
2019-10-10 04:39:15
222.186.173.154 attackbotsspam
Oct  9 22:44:09 [host] sshd[26833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.154  user=root
Oct  9 22:44:12 [host] sshd[26833]: Failed password for root from 222.186.173.154 port 39992 ssh2
Oct  9 22:44:37 [host] sshd[26835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.154  user=root
2019-10-10 04:55:47
120.203.5.92 attackspambots
Honeypot attack, port: 23, PTR: PTR record not found
2019-10-10 04:36:06
41.230.114.172 attackspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-10-10 04:42:54

最近上报的IP列表

166.39.169.12 224.25.32.67 121.196.161.232 2606:4700:10::6814:9924
2606:4700:10::6816:803 2606:4700:10::6814:9547 2606:4700:10::6816:4696 2606:4700:10::6816:1231
2606:4700:10::6816:3253 103.25.231.252 21.187.64.46 141.108.162.237
53.240.8.8 25.232.206.75 37.10.113.220 103.236.81.127
110.78.158.130 2606:4700:10::6814:4995 2606:4700:10::6816:2792 2606:4700:10::6814:4933