必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Singapore

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
27.124.43.196 attackspambots
PHP DIESCAN Information Disclosure Vulnerability
2019-10-14 02:53:35
27.124.43.69 attackbots
404 NOT FOUND
2019-09-29 13:29:17
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '27.124.40.0 - 27.124.47.255'

% Abuse contact for '27.124.40.0 - 27.124.47.255' is 'cs.mail@ctgserver.com'

inetnum:        27.124.40.0 - 27.124.47.255
netname:        CTG124-40-HK
descr:          CTG Server Ltd.
country:        HK
admin-c:        RCPL3-AP
tech-c:         RCPL3-AP
abuse-c:        AC2487-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-RCPL-SG
mnt-irt:        IRT-CTG-HK
last-modified:  2025-04-15T10:10:14Z
source:         APNIC

irt:            IRT-CTG-HK
address:        202 ,2/F Kam Sang BLDG 257,Des Voeux RD Central Hong Kong
e-mail:         cs.mail@ctgserver.com
abuse-mailbox:  cs.mail@ctgserver.com
admin-c:        RCPL3-AP
tech-c:         RCPL3-AP
auth:           # Filtered
remarks:        cs.mail@ctgserver.com
remarks:        cs.mail@ctgserver.com was validated on 2026-02-04
mnt-by:         MAINT-RCPL-SG
last-modified:  2026-02-04T04:07:26Z
source:         APNIC

role:           ABUSE CTGHK
country:        ZZ
address:        202 ,2/F Kam Sang BLDG 257,Des Voeux RD Central Hong Kong
phone:          +000000000
e-mail:         cs.mail@ctgserver.com
admin-c:        RCPL3-AP
tech-c:         RCPL3-AP
nic-hdl:        AC2487-AP
remarks:        Generated from irt object IRT-CTG-HK
remarks:        cs.mail@ctgserver.com was validated on 2026-02-04
abuse-mailbox:  cs.mail@ctgserver.com
mnt-by:         APNIC-ABUSE
last-modified:  2026-02-04T04:07:58Z
source:         APNIC

role:           RACKIP CONSULTANCY PTE LTD administrator
address:        399 Chai Wan Road, Chai Wan, Hong Kong
country:        SG
phone:          +603-7806-1316
fax-no:         +603-7806-1316
e-mail:         abuse@rackip.com
admin-c:        RCPL3-AP
tech-c:         RCPL3-AP
nic-hdl:        RCPL3-AP
mnt-by:         MAINT-RCPL-SG
last-modified:  2021-08-30T06:13:42Z
source:         APNIC

% Information related to '27.124.43.0/24AS152194'

route:          27.124.43.0/24
origin:         AS152194
descr:          RACKIP CONSULTANCY PTE. LTD.
                No. 3, Pemimpin Drive, #07-04 Lip Hing, Industrial Building,
mnt-by:         MAINT-RCPL-SG
last-modified:  2024-03-31T12:52:12Z
source:         APNIC

% Information related to '27.124.43.0/24AS64050'

route:          27.124.43.0/24
origin:         AS64050
descr:          RACKIP CONSULTANCY PTE. LTD.
                No. 3, Pemimpin Drive, #07-04 Lip Hing, Industrial Building,
mnt-by:         MAINT-RCPL-SG
last-modified:  2023-10-04T06:22:41Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 27.124.43.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8741
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;27.124.43.215.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042101 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 22 05:00:05 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 215.43.124.27.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 27.124.43.215.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
179.95.1.104 attackbots
Telnetd brute force attack detected by fail2ban
2019-10-04 03:46:50
23.129.64.100 attackspambots
2019-10-03T17:23:22.642991abusebot.cloudsearch.cf sshd\[15941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.100  user=root
2019-10-04 03:25:22
113.110.195.226 attackspam
Oct  3 20:29:50 microserver sshd[11320]: Invalid user operator from 113.110.195.226 port 33152
Oct  3 20:29:50 microserver sshd[11320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.110.195.226
Oct  3 20:29:51 microserver sshd[11320]: Failed password for invalid user operator from 113.110.195.226 port 33152 ssh2
Oct  3 20:35:17 microserver sshd[12311]: Invalid user perry from 113.110.195.226 port 51940
Oct  3 20:35:17 microserver sshd[12311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.110.195.226
Oct  3 20:46:03 microserver sshd[13698]: Invalid user jessie from 113.110.195.226 port 33052
Oct  3 20:46:03 microserver sshd[13698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.110.195.226
Oct  3 20:46:05 microserver sshd[13698]: Failed password for invalid user jessie from 113.110.195.226 port 33052 ssh2
Oct  3 20:51:24 microserver sshd[14331]: Invalid user rebecca from 113.
2019-10-04 03:40:06
130.61.121.105 attackspambots
2019-10-03T19:52:07.7743991240 sshd\[30192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.121.105  user=root
2019-10-03T19:52:09.0266181240 sshd\[30192\]: Failed password for root from 130.61.121.105 port 32881 ssh2
2019-10-03T20:01:43.4622411240 sshd\[30620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.121.105  user=root
...
2019-10-04 03:43:30
47.196.163.134 attackspam
xmlrpc attack
2019-10-04 03:58:30
167.114.251.164 attackspam
SSH Brute Force
2019-10-04 03:40:33
188.166.220.17 attack
vps1:sshd-InvalidUser
2019-10-04 04:00:07
143.204.192.70 attackbots
TCP Port: 443 _    invalid blocked  zen-spamhaus also rbldns-ru _  _ Client xx.xx.4.90 _ _ (438)
2019-10-04 03:57:11
51.38.232.52 attackbots
failed root login
2019-10-04 03:44:33
121.33.247.107 attack
2019-10-03 dovecot_login authenticator failed for \(**REMOVED**\) \[121.33.247.107\]: 535 Incorrect authentication data \(set_id=nologin@**REMOVED**\)
2019-10-03 dovecot_login authenticator failed for \(**REMOVED**\) \[121.33.247.107\]: 535 Incorrect authentication data \(set_id=**REMOVED**@**REMOVED**\)
2019-10-03 dovecot_login authenticator failed for \(**REMOVED**\) \[121.33.247.107\]: 535 Incorrect authentication data \(set_id=nologin@**REMOVED**\)
2019-10-04 03:28:19
183.239.61.55 attackbots
2019-10-03T19:30:18.702757shield sshd\[19516\]: Invalid user named from 183.239.61.55 port 37612
2019-10-03T19:30:18.706864shield sshd\[19516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.239.61.55
2019-10-03T19:30:20.690840shield sshd\[19516\]: Failed password for invalid user named from 183.239.61.55 port 37612 ssh2
2019-10-03T19:34:01.194407shield sshd\[20073\]: Invalid user yuri from 183.239.61.55 port 43470
2019-10-03T19:34:01.200214shield sshd\[20073\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.239.61.55
2019-10-04 03:45:26
68.45.62.109 attack
Oct  3 19:04:35 markkoudstaal sshd[3127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.45.62.109
Oct  3 19:04:37 markkoudstaal sshd[3127]: Failed password for invalid user ahm from 68.45.62.109 port 59254 ssh2
Oct  3 19:08:53 markkoudstaal sshd[3512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.45.62.109
2019-10-04 03:23:05
192.227.252.13 attackspam
Oct  3 09:09:09 friendsofhawaii sshd\[21792\]: Invalid user owncloud from 192.227.252.13
Oct  3 09:09:09 friendsofhawaii sshd\[21792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.252.13
Oct  3 09:09:11 friendsofhawaii sshd\[21792\]: Failed password for invalid user owncloud from 192.227.252.13 port 44112 ssh2
Oct  3 09:13:19 friendsofhawaii sshd\[22136\]: Invalid user bobrien from 192.227.252.13
Oct  3 09:13:19 friendsofhawaii sshd\[22136\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.252.13
2019-10-04 03:27:28
210.176.62.116 attack
Invalid user guha from 210.176.62.116 port 56428
2019-10-04 03:45:10
62.210.151.21 attack
\[2019-10-03 15:15:13\] SECURITY\[2006\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-03T15:15:13.294-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="911112243078499",SessionID="0x7f1e1c839d18",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.151.21/55513",ACLName="no_extension_match"
\[2019-10-03 15:15:36\] SECURITY\[2006\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-03T15:15:36.531-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="922212243078499",SessionID="0x7f1e1c7d89e8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.151.21/62741",ACLName="no_extension_match"
\[2019-10-03 15:15:59\] SECURITY\[2006\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-03T15:15:59.667-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="977712243078499",SessionID="0x7f1e1c78f1a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.151.21/52583",ACLName="no_ext
2019-10-04 03:37:38

最近上报的IP列表

14.213.31.78 2606:4700:10::6814:5889 122.193.247.103 2606:4700:10::6814:5550
164.155.74.130 2606:4700:10::6814:9633 2606:4700:10::6814:9974 2606:4700:10::6816:271
2606:4700:10::6814:9587 2606:4700:10::6816:2764 2606:4700:10::ac43:2495 198.211.100.14
54.221.170.110 34.203.200.187 32.192.75.243 212.107.30.123
162.19.222.42 35.203.210.13 103.70.76.190 2606:4700:10::6814:5319