必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Hong Kong

运营商(isp): CSL Limited

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '42.200.128.0 - 42.200.255.255'

% Abuse contact for '42.200.128.0 - 42.200.255.255' is 'noc@imsbiz.com'

inetnum:        42.200.128.0 - 42.200.255.255
netname:        HKT-BIA
descr:          Hong Kong Telecommunications (HKT) Limited Business Internet
country:        HK
admin-c:        TA66-AP
tech-c:         TA66-AP
abuse-c:        AP706-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-HK-PCCW-BIA-CS
mnt-irt:        IRT-PCCW-BIA-HK
last-modified:  2021-01-27T13:23:08Z
source:         APNIC

irt:            IRT-PCCW-BIA-HK
address:        PO Box 9896 GPO
e-mail:         noc@imsbiz.com
abuse-mailbox:  noc@imsbiz.com
admin-c:        TA66-AP
tech-c:         TA66-AP
auth:           # Filtered
remarks:        noc@imsbiz.com
remarks:        noc@imsbiz.com was validated on 2026-04-23
mnt-by:         MAINT-HK-PCCW-BIA
last-modified:  2026-04-23T02:00:26Z
source:         APNIC

role:           ABUSE PCCWBIAHK
country:        ZZ
address:        PO Box 9896 GPO
phone:          +000000000
e-mail:         noc@imsbiz.com
admin-c:        TA66-AP
tech-c:         TA66-AP
nic-hdl:        AP706-AP
remarks:        Generated from irt object IRT-PCCW-BIA-HK
remarks:        noc@imsbiz.com was validated on 2026-04-23
abuse-mailbox:  noc@imsbiz.com
mnt-by:         APNIC-ABUSE
last-modified:  2026-04-23T02:00:42Z
source:         APNIC

role:           TECHNICAL ADMINISTRATORS
address:        HKT Limited
address:        PO Box 9896 GPO
phone:          +852-2883-5151
country:        HK
e-mail:         noc@imsbiz.com
admin-c:        NOC18-AP
admin-c:        WC109-AP
tech-c:         NOC18-AP
tech-c:         WC109-AP
nic-hdl:        TA66-AP
notify:         noc@imsbiz.com
mnt-by:         MAINT-HK-PCCW-BIA
last-modified:  2016-07-15T04:03:30Z
source:         APNIC

% Information related to '42.200.192.0/19AS4515'

route:          42.200.192.0/19
descr:          PCCW IMSBiz route object
origin:         AS4515
mnt-by:         MAINT-HK-PCCW-BIA
mnt-routes:     MAINT-HK-PCCW-BIA
last-modified:  2011-03-22T05:30:02Z
source:         APNIC

% Information related to '42.200.192.0/19AS4760'

route:          42.200.192.0/19
origin:         AS4760
descr:          PCCW IMS Ltd (PCCW Business Internet Access)
                26/F, PCCW TOWER
                TAIKOO PLACE
                979 KINGS ROAD
                QUARRY BAY, HONG KONG
mnt-by:         MAINT-HK-PCCW-BIA
last-modified:  2020-06-12T06:21:46Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.200.193.83
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32334
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.200.193.83.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026043002 1800 900 604800 86400

;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 01 06:00:27 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
83.193.200.42.in-addr.arpa domain name pointer 42-200-193-83.static.imsbiz.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
83.193.200.42.in-addr.arpa	name = 42-200-193-83.static.imsbiz.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
75.97.250.243 attackspambots
9000/tcp
[2019-08-16]1pkt
2019-08-16 14:28:47
82.166.93.77 attackbotsspam
Aug 16 08:21:01 microserver sshd[50210]: Invalid user amanda from 82.166.93.77 port 49210
Aug 16 08:21:01 microserver sshd[50210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.166.93.77
Aug 16 08:21:04 microserver sshd[50210]: Failed password for invalid user amanda from 82.166.93.77 port 49210 ssh2
Aug 16 08:27:25 microserver sshd[51068]: Invalid user chicago from 82.166.93.77 port 55202
Aug 16 08:27:25 microserver sshd[51068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.166.93.77
Aug 16 08:40:56 microserver sshd[53214]: Invalid user colleen from 82.166.93.77 port 58380
Aug 16 08:40:56 microserver sshd[53214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.166.93.77
Aug 16 08:40:58 microserver sshd[53214]: Failed password for invalid user colleen from 82.166.93.77 port 58380 ssh2
Aug 16 08:45:38 microserver sshd[53961]: Invalid user marilia from 82.166.93.77 port 50032
Aug
2019-08-16 14:06:02
177.133.228.29 attackbots
23/tcp
[2019-08-16]1pkt
2019-08-16 13:55:37
182.116.170.183 attack
Unauthorised access (Aug 16) SRC=182.116.170.183 LEN=40 TTL=49 ID=61536 TCP DPT=8080 WINDOW=22328 SYN
2019-08-16 14:13:22
201.251.156.11 attackbots
Aug 16 01:23:10 debian sshd\[5479\]: Invalid user monkey from 201.251.156.11 port 34073
Aug 16 01:23:10 debian sshd\[5479\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.251.156.11
Aug 16 01:23:13 debian sshd\[5479\]: Failed password for invalid user monkey from 201.251.156.11 port 34073 ssh2
...
2019-08-16 14:06:40
71.6.199.23 attackbots
71.6.199.23 has been banned from MailServer for Abuse
...
2019-08-16 13:40:17
149.129.251.152 attack
Aug 16 07:15:56 MainVPS sshd[1137]: Invalid user ftptest from 149.129.251.152 port 53974
Aug 16 07:15:56 MainVPS sshd[1137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.129.251.152
Aug 16 07:15:56 MainVPS sshd[1137]: Invalid user ftptest from 149.129.251.152 port 53974
Aug 16 07:15:58 MainVPS sshd[1137]: Failed password for invalid user ftptest from 149.129.251.152 port 53974 ssh2
Aug 16 07:23:44 MainVPS sshd[1735]: Invalid user salvatore from 149.129.251.152 port 39362
...
2019-08-16 13:39:52
202.162.214.245 attackspambots
Port scan on 1 port(s): 4899
2019-08-16 14:05:24
123.206.90.123 attackbots
Aug 16 11:16:07 areeb-Workstation sshd\[4387\]: Invalid user danar from 123.206.90.123
Aug 16 11:16:07 areeb-Workstation sshd\[4387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.90.123
Aug 16 11:16:09 areeb-Workstation sshd\[4387\]: Failed password for invalid user danar from 123.206.90.123 port 38632 ssh2
...
2019-08-16 14:10:36
148.70.113.127 attack
Aug 16 06:56:40 microserver sshd[37985]: Invalid user rio from 148.70.113.127 port 51506
Aug 16 06:56:40 microserver sshd[37985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.113.127
Aug 16 06:56:43 microserver sshd[37985]: Failed password for invalid user rio from 148.70.113.127 port 51506 ssh2
Aug 16 07:02:50 microserver sshd[38758]: Invalid user loyal from 148.70.113.127 port 42676
Aug 16 07:02:50 microserver sshd[38758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.113.127
Aug 16 07:14:34 microserver sshd[40314]: Invalid user ten from 148.70.113.127 port 53230
Aug 16 07:14:34 microserver sshd[40314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.113.127
Aug 16 07:14:36 microserver sshd[40314]: Failed password for invalid user ten from 148.70.113.127 port 53230 ssh2
Aug 16 07:21:06 microserver sshd[41516]: Invalid user server2 from 148.70.113.127 port 44428
Au
2019-08-16 13:57:41
195.56.253.49 attackspam
2019-08-16T05:23:25.151910abusebot-6.cloudsearch.cf sshd\[3276\]: Invalid user supervisor from 195.56.253.49 port 46112
2019-08-16 13:56:58
72.27.31.56 attack
23/tcp
[2019-08-16]1pkt
2019-08-16 14:19:49
220.143.87.163 attackspambots
23/tcp
[2019-08-16]1pkt
2019-08-16 13:28:53
193.188.22.12 attackbotsspam
Triggered by Fail2Ban at Ares web server
2019-08-16 14:25:37
207.180.235.203 attackspam
Aug 16 08:23:41 hosting sshd[11206]: Invalid user cy from 207.180.235.203 port 42262
...
2019-08-16 13:42:04

最近上报的IP列表

64.179.162.164 148.96.94.85 2606:4700:10::6816:2815 43.160.240.216
63.34.145.48 157.230.123.151 14.212.68.42 146.103.41.75
54.91.45.104 2606:4700:10::6814:6558 2606:4700:10::6814:6199 52.6.113.215
50.16.169.122 170.106.75.142 2606:4700:10::6816:3995 2606:4700:10::ac43:2884
2606:4700:20::681a:200 66.132.186.206 45.142.193.24 45.230.66.123