必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '27.254.83.0 - 27.254.83.127'

% Abuse contact for '27.254.83.0 - 27.254.83.127' is 'csl-ip-admin@ais.co.th'

inetnum:        27.254.83.0 - 27.254.83.127
netname:        idc-csloxinfo
descr:          IDC-CBW Customer
country:        TH
admin-c:        LIA1-AP
tech-c:         LIA1-AP
abuse-c:        AC1613-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         LOXINFO-IS
mnt-irt:        IRT-CSLOXINFO-TH
last-modified:  2025-05-26T17:42:43Z
source:         APNIC

irt:            IRT-CSLOXINFO-TH
address:        CW Tower
address:        Ratchadapisek Road, Huai Khwang, Bangkok 10310
phone:          +66 2 2638000
fax-no:         +66 2 2638790
e-mail:         csl-ip-admin@ais.co.th
abuse-mailbox:  csl-ip-admin@ais.co.th
admin-c:        LIA1-AP
tech-c:         LIA1-AP
auth:           # Filtered
remarks:        csl-ip-admin@ais.co.th was validated on 2025-09-04
mnt-by:         CSLOXINFO-IS
last-modified:  2025-11-18T10:47:13Z
source:         APNIC

role:           ABUSE CSLOXINFOTH
country:        ZZ
address:        CW Tower
address:        Ratchadapisek Road, Huai Khwang, Bangkok 10310
phone:          +66 2 2638000
e-mail:         csl-ip-admin@ais.co.th
admin-c:        LIA1-AP
tech-c:         LIA1-AP
nic-hdl:        AC1613-AP
remarks:        Generated from irt object IRT-CSLOXINFO-TH
remarks:        csl-ip-admin@ais.co.th was validated on 2025-09-04
abuse-mailbox:  csl-ip-admin@ais.co.th
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-04T22:49:47Z
source:         APNIC

role:           Loxinfo IP Admins
remarks:        CS LOXINFO PUBLIC COMPANY LIMITED
address:        CW Tower
address:        Ratchadapisek Road, Huai Khwang, Bangkok 10310
country:        TH
phone:          +66-2263-8000
fax-no:         +66-2263-8790
e-mail:         csl-ip-admin@ais.co.th
admin-c:        LIA1-AP
tech-c:         LIA1-AP
nic-hdl:        LIA1-AP
mnt-by:         CSLOXINFO-IS
last-modified:  2026-01-12T02:24:09Z
source:         APNIC

% Information related to '27.254.83.0/24AS9891'

route:          27.254.83.0/24
origin:         AS9891
descr:          CS Loxinfo Public Company Limited
                90 CW Tower A 17-20th floor
                Ratchadapisek Rd
                Huai Kwang
mnt-by:         LOXINFO-IS
last-modified:  2025-05-23T16:11:08Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 27.254.83.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52563
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;27.254.83.119.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041402 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 15 09:53:47 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
119.83.254.27.in-addr.arpa domain name pointer 119.servertoday.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
119.83.254.27.in-addr.arpa	name = 119.servertoday.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.92.0.220 attackbots
Jul 18 08:07:45 home sshd[20893]: Failed password for root from 218.92.0.220 port 26186 ssh2
Jul 18 08:07:59 home sshd[20924]: Failed password for root from 218.92.0.220 port 38240 ssh2
...
2020-07-18 14:16:26
35.197.213.82 attack
Jul 18 08:07:58 vps sshd[623290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.213.197.35.bc.googleusercontent.com
Jul 18 08:08:00 vps sshd[623290]: Failed password for invalid user record from 35.197.213.82 port 57362 ssh2
Jul 18 08:13:43 vps sshd[653382]: Invalid user bruno from 35.197.213.82 port 44686
Jul 18 08:13:43 vps sshd[653382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.213.197.35.bc.googleusercontent.com
Jul 18 08:13:45 vps sshd[653382]: Failed password for invalid user bruno from 35.197.213.82 port 44686 ssh2
...
2020-07-18 14:15:46
218.156.38.65 attack
Jul 18 05:54:21 debian-2gb-nbg1-2 kernel: \[17303012.528474\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=218.156.38.65 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=48 ID=11696 PROTO=TCP SPT=30794 DPT=2323 WINDOW=43394 RES=0x00 SYN URGP=0
2020-07-18 14:41:47
49.88.112.111 attackspambots
Brute force SSH attack
2020-07-18 14:22:26
51.255.28.53 attackbotsspam
Invalid user cjx from 51.255.28.53 port 39308
2020-07-18 14:08:28
185.175.93.24 attackbots
07/18/2020-02:03:19.851301 185.175.93.24 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-07-18 14:19:38
54.38.65.127 attackbots
54.38.65.127 - - [18/Jul/2020:07:57:24 +0200] "GET /wp-login.php HTTP/1.1" 200 6060 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
54.38.65.127 - - [18/Jul/2020:07:57:25 +0200] "POST /wp-login.php HTTP/1.1" 200 6311 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
54.38.65.127 - - [18/Jul/2020:07:57:26 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-07-18 14:26:22
1.34.10.11 attackbots
Scanning an empty webserver with deny all robots.txt
2020-07-18 14:31:30
118.36.234.187 attack
Jul 18 06:51:25 ajax sshd[9187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.36.234.187 
Jul 18 06:51:27 ajax sshd[9187]: Failed password for invalid user ubuntu from 118.36.234.187 port 49068 ssh2
2020-07-18 14:12:32
128.127.90.40 attackspam
(smtpauth) Failed SMTP AUTH login from 128.127.90.40 (PL/Poland/host-c40.net.gecon.com.pl): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-07-18 08:24:30 plain authenticator failed for ([128.127.90.40]) [128.127.90.40]: 535 Incorrect authentication data (set_id=asrollahi)
2020-07-18 14:27:54
3.23.50.101 attackbotsspam
3.23.50.101 - - [18/Jul/2020:05:30:11 +0100] "POST /wp/wp-login.php HTTP/1.1" 200 1865 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
3.23.50.101 - - [18/Jul/2020:05:30:12 +0100] "POST /wp/wp-login.php HTTP/1.1" 200 1857 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
3.23.50.101 - - [18/Jul/2020:05:30:13 +0100] "POST /wp/xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-18 14:42:49
40.77.111.203 attack
$f2bV_matches
2020-07-18 14:33:31
111.231.137.83 attack
Jul 17 20:51:16 pixelmemory sshd[458989]: Invalid user yyy from 111.231.137.83 port 53690
Jul 17 20:51:16 pixelmemory sshd[458989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.137.83 
Jul 17 20:51:16 pixelmemory sshd[458989]: Invalid user yyy from 111.231.137.83 port 53690
Jul 17 20:51:19 pixelmemory sshd[458989]: Failed password for invalid user yyy from 111.231.137.83 port 53690 ssh2
Jul 17 20:54:19 pixelmemory sshd[462323]: Invalid user bbj from 111.231.137.83 port 45676
...
2020-07-18 14:46:09
128.199.254.89 attackbotsspam
Jul 18 02:34:06 firewall sshd[26321]: Invalid user rupesh from 128.199.254.89
Jul 18 02:34:08 firewall sshd[26321]: Failed password for invalid user rupesh from 128.199.254.89 port 37526 ssh2
Jul 18 02:38:38 firewall sshd[26418]: Invalid user kang from 128.199.254.89
...
2020-07-18 14:07:58
40.89.165.157 attackbots
Jul 18 06:21:54 django-0 sshd[9342]: Invalid user admin from 40.89.165.157
Jul 18 06:21:56 django-0 sshd[9342]: Failed password for invalid user admin from 40.89.165.157 port 49811 ssh2
Jul 18 06:31:44 django-0 sshd[9859]: Invalid user admin from 40.89.165.157
...
2020-07-18 14:33:11

最近上报的IP列表

20.48.184.58 2606:4700:10::ac43:137e 2606:4700:10::6816:2833 2606:4700:10::6814:7814
2606:4700:10::6814:6959 2606:4700:10::ac43:2280 2606:4700:10::6814:6749 66.132.224.232
142.93.115.5 202.61.75.125 35.223.241.4 121.199.172.227
2606:4700:10::6814:5094 2606:4700:10::6814:5012 2606:4700:10::6814:9258 2606:4700:10::6816:2592
2606:4700:10::6814:7504 121.234.219.139 2606:4700:10::6814:6536 113.142.81.115