必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Ho Chi Minh City

省份(region): unknown

国家(country): Vietnam

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '42.116.32.0 - 42.116.47.255'

% Abuse contact for '42.116.32.0 - 42.116.47.255' is 'hm-changed@vnnic.vn'

inetnum:        42.116.32.0 - 42.116.47.255
netname:        FPT-STATICIP-NET
country:        vn
descr:          FPT Telecom Company
descr:          2nd floor FPT Building, Pham Hung Road, Cau Giay District, Hanoi
admin-c:        LDP12-AP
tech-c:         NOC21-AP
status:         ALLOCATED NON-PORTABLE
remarks:        For spamming matters, mail to abuse@fpt.vn
mnt-by:         MAINT-VN-FPT
mnt-irt:        IRT-VNNIC-AP
last-modified:  2022-01-17T02:11:32Z
source:         APNIC

irt:            IRT-VNNIC-AP
address:        Ha Noi, VietNam
phone:          +84-24-35564944
fax-no:         +84-24-37821462
e-mail:         hm-changed@vnnic.vn
abuse-mailbox:  hm-changed@vnnic.vn
admin-c:        NTTT1-AP
tech-c:         NTTT1-AP
auth:           # Filtered
mnt-by:         MAINT-VN-VNNIC
last-modified:  2026-04-06T06:49:37Z
source:         APNIC

person:         Luong Duy Phuong
address:        FPT-VN
country:        VN
phone:          +84-28-73002222
e-mail:         phuongld@fpt.com
nic-hdl:        LDP12-AP
mnt-by:         MAINT-VN-FPT
last-modified:  2023-10-16T02:13:55Z
abuse-mailbox:  abuse@fpt.net
source:         APNIC

person:         Network Operation Center
nic-hdl:        NOC21-AP
e-mail:         ftel.noc.net@fpt.com
address:        FPT Telecom
phone:          +84-28-73093388
fax-no:         +84-28-73008889
country:        VN
mnt-by:         MAINT-VN-VNNIC
last-modified:  2023-10-16T01:44:54Z
source:         APNIC

% Information related to '42.116.40.0/24AS18403'

route:          42.116.40.0/24
origin:         AS18403
descr:          Vietnam Internet Network Information Center (VNNIC)
                18 Nguyen Du Str, Hai Ba Trung District, Hanoi City, Vietnam
                10th floor, MITEC Tower, Duong Dinh Nghe, Cau Giay, Hanoi
mnt-by:         MAINT-VN-FPT
last-modified:  2019-08-01T06:58:30Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.116.40.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24508
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.116.40.29.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040900 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 09 23:01:19 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
Host 29.40.116.42.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 42.116.40.29.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
183.251.110.95 attackspambots
Honeypot attack, port: 5555, PTR: PTR record not found
2020-03-31 03:41:13
151.63.122.153 attack
Email rejected due to spam filtering
2020-03-31 04:12:15
49.35.75.147 attackbotsspam
Port probing on unauthorized port 445
2020-03-31 03:45:14
154.245.155.130 attackbots
Email rejected due to spam filtering
2020-03-31 03:57:09
54.38.180.53 attackspambots
Invalid user ck from 54.38.180.53 port 34254
2020-03-31 03:53:23
175.139.176.117 attackspambots
Mar 30 18:32:47 lock-38 sshd[347567]: Failed password for root from 175.139.176.117 port 53238 ssh2
Mar 30 18:38:04 lock-38 sshd[347725]: Failed password for root from 175.139.176.117 port 38558 ssh2
Mar 30 18:42:34 lock-38 sshd[347907]: Failed password for root from 175.139.176.117 port 46760 ssh2
Mar 30 18:46:49 lock-38 sshd[348009]: Failed password for root from 175.139.176.117 port 54928 ssh2
Mar 30 18:51:03 lock-38 sshd[348143]: Failed password for root from 175.139.176.117 port 34844 ssh2
...
2020-03-31 03:50:35
124.118.129.5 attackbots
Mar 30 20:25:43 ns381471 sshd[8534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.118.129.5
Mar 30 20:25:45 ns381471 sshd[8534]: Failed password for invalid user lixx from 124.118.129.5 port 35792 ssh2
2020-03-31 03:55:36
23.54.238.148 attackspambots
Mar 30 15:52:59 debian-2gb-nbg1-2 kernel: \[7835436.483379\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=23.54.238.148 DST=195.201.40.59 LEN=44 TOS=0x10 PREC=0x00 TTL=44 ID=0 DF PROTO=TCP SPT=80 DPT=1911 WINDOW=29200 RES=0x00 ACK SYN URGP=0
2020-03-31 04:02:42
31.46.16.95 attack
Brute force SMTP login attempted.
...
2020-03-31 04:13:16
69.247.165.195 attackspam
udp 62056
2020-03-31 04:05:44
58.126.201.20 attackbots
fail2ban -- 58.126.201.20
...
2020-03-31 04:08:32
116.230.61.209 attackbots
ssh intrusion attempt
2020-03-31 03:47:38
152.136.90.196 attackspam
Mar 30 21:11:19 localhost sshd\[24152\]: Invalid user hemmings from 152.136.90.196
Mar 30 21:11:19 localhost sshd\[24152\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.90.196
Mar 30 21:11:21 localhost sshd\[24152\]: Failed password for invalid user hemmings from 152.136.90.196 port 39216 ssh2
Mar 30 21:17:42 localhost sshd\[24623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.90.196  user=root
Mar 30 21:17:45 localhost sshd\[24623\]: Failed password for root from 152.136.90.196 port 51782 ssh2
...
2020-03-31 03:48:23
49.235.143.244 attackspambots
Mar 30 20:49:07 lock-38 sshd[351592]: Invalid user qy from 49.235.143.244 port 49626
Mar 30 20:49:07 lock-38 sshd[351592]: Failed password for invalid user qy from 49.235.143.244 port 49626 ssh2
Mar 30 21:06:43 lock-38 sshd[352059]: Failed password for root from 49.235.143.244 port 35012 ssh2
Mar 30 21:11:23 lock-38 sshd[352281]: Failed password for root from 49.235.143.244 port 37390 ssh2
Mar 30 21:20:35 lock-38 sshd[352578]: Failed password for root from 49.235.143.244 port 42132 ssh2
...
2020-03-31 04:05:16
14.249.112.71 attackbots
1585583118 - 03/30/2020 17:45:18 Host: 14.249.112.71/14.249.112.71 Port: 445 TCP Blocked
2020-03-31 04:11:27

最近上报的IP列表

66.132.224.237 20.84.58.231 103.146.111.93 2606:4700:10::ac43:2693
2606:4700:10::6814:9202 2606:4700:10::6816:2207 2606:4700:10::6814:4461 31.92.92.78
93.123.72.166 234.0.22.102 142.93.3.173 2606:4700:10::6816:938
2606:4700:10::6814:4624 2606:4700:10::ac43:95e 2606:4700:10::6814:6122 164.155.74.38
111.55.113.213 113.8.33.50 39.182.81.160 146.70.160.238