必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Hong Kong

运营商(isp): CSL Limited

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
58.152.194.3 attackbotsspam
Honeypot attack, port: 5555, PTR: n058152194003.netvigator.com.
2020-01-22 04:48:18
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '58.152.0.0 - 58.152.255.255'

% Abuse contact for '58.152.0.0 - 58.152.255.255' is 'noc@imsbiz.com'

inetnum:        58.152.0.0 - 58.152.255.255
netname:        NETVIGATOR
descr:          Hong Kong Telecommunications (HKT) Limited Mass Internet
country:        HK
admin-c:        NA45-AP
tech-c:         NA45-AP
abuse-c:        AH981-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-HK-IMS-CS
mnt-lower:      MAINT-HK-IMS-CS
mnt-routes:     MAINT-HK-IMS-WILSON
mnt-irt:        IRT-HKTIMS-HK
last-modified:  2021-01-27T13:20:38Z
source:         APNIC

irt:            IRT-HKTIMS-HK
address:        PO Box 9896 GPO
e-mail:         noc@imsbiz.com
abuse-mailbox:  noc@imsbiz.com
admin-c:        WC109-AP
tech-c:         WC109-AP
auth:           # Filtered
remarks:        noc@imsbiz.com
remarks:        noc@imsbiz.com was validated on 2025-10-02
mnt-by:         MAINT-HK-IMS
last-modified:  2025-11-18T00:26:30Z
source:         APNIC

role:           ABUSE HKTIMSHK
country:        ZZ
address:        PO Box 9896 GPO
phone:          +000000000
e-mail:         noc@imsbiz.com
admin-c:        WC109-AP
tech-c:         WC109-AP
nic-hdl:        AH981-AP
remarks:        Generated from irt object IRT-HKTIMS-HK
remarks:        noc@imsbiz.com was validated on 2025-10-02
abuse-mailbox:  noc@imsbiz.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-10-02T01:16:57Z
source:         APNIC

role:           NETVIGATOR ADMINISTRATORS
address:        PO Box 9896 GPO
address:        Hong Kong
phone:          +852-2888-2888
country:        hk
e-mail:         pmaster@netvigator.com
admin-c:        WC109-AP
tech-c:         WC109-AP
nic-hdl:        NA45-AP
mnt-by:         MAINT-HK-IMS
last-modified:  2008-09-04T07:54:15Z
source:         APNIC

% Information related to '58.152.194.0/24AS4760'

route:          58.152.194.0/24
origin:         AS4760
descr:          PCCW IMS Limited
                14/F, Lockhart Exchange Bldg
                No. 3 Hennessy Road
mnt-by:         MAINT-HK-IMS-WILSON
last-modified:  2020-09-28T03:50:10Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 58.152.194.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 349
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;58.152.194.52.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032201 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 02:25:38 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
52.194.152.58.in-addr.arpa domain name pointer n058152194052.netvigator.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
52.194.152.58.in-addr.arpa	name = n058152194052.netvigator.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
180.253.162.103 attack
Aug 25 10:03:59 pkdns2 sshd\[3184\]: Failed password for root from 180.253.162.103 port 24665 ssh2Aug 25 10:07:06 pkdns2 sshd\[3350\]: Invalid user hugo from 180.253.162.103Aug 25 10:07:08 pkdns2 sshd\[3350\]: Failed password for invalid user hugo from 180.253.162.103 port 18465 ssh2Aug 25 10:10:32 pkdns2 sshd\[3548\]: Invalid user admin from 180.253.162.103Aug 25 10:10:34 pkdns2 sshd\[3548\]: Failed password for invalid user admin from 180.253.162.103 port 59081 ssh2Aug 25 10:13:49 pkdns2 sshd\[3701\]: Invalid user postgres from 180.253.162.103
...
2020-08-25 15:35:47
190.2.211.18 attackbots
Aug 24 16:08:00 sachi sshd\[8703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.2.211.18  user=root
Aug 24 16:08:02 sachi sshd\[8703\]: Failed password for root from 190.2.211.18 port 6799 ssh2
Aug 24 16:13:39 sachi sshd\[14015\]: Invalid user rtc from 190.2.211.18
Aug 24 16:13:39 sachi sshd\[14015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.2.211.18
Aug 24 16:13:42 sachi sshd\[14015\]: Failed password for invalid user rtc from 190.2.211.18 port 6843 ssh2
2020-08-25 15:33:30
111.229.211.66 attackspambots
Port scan denied
2020-08-25 15:43:24
41.66.24.247 attack
Port Scan
...
2020-08-25 16:12:09
37.255.193.74 attackspambots
37.255.193.74 (IR/Iran/-), more than 60 Apache 403 hits in the last 3600 secs; Ports: 80,443; Direction: in; Trigger: LF_APACHE_403; Logs:
2020-08-25 15:58:18
103.195.1.106 attackbots
Port Scan
...
2020-08-25 15:44:16
185.186.17.89 attackbots
Attempted Brute Force (dovecot)
2020-08-25 15:45:46
13.67.40.250 attackbotsspam
Aug 25 04:27:35 serwer sshd\[18947\]: Invalid user cam from 13.67.40.250 port 51034
Aug 25 04:27:35 serwer sshd\[18947\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.67.40.250
Aug 25 04:27:36 serwer sshd\[18947\]: Failed password for invalid user cam from 13.67.40.250 port 51034 ssh2
...
2020-08-25 16:06:57
178.128.121.188 attack
Aug 25 08:04:06 electroncash sshd[3962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.121.188 
Aug 25 08:04:06 electroncash sshd[3962]: Invalid user cj from 178.128.121.188 port 35870
Aug 25 08:04:08 electroncash sshd[3962]: Failed password for invalid user cj from 178.128.121.188 port 35870 ssh2
Aug 25 08:08:32 electroncash sshd[5105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.121.188  user=root
Aug 25 08:08:34 electroncash sshd[5105]: Failed password for root from 178.128.121.188 port 42026 ssh2
...
2020-08-25 15:31:32
178.62.12.192 attackbots
<6 unauthorized SSH connections
2020-08-25 15:54:08
78.128.113.118 attackspambots
2020-08-25 10:11:13 dovecot_login authenticator failed for \(\[78.128.113.118\]\) \[78.128.113.118\]: 535 Incorrect authentication data \(set_id=admin@nophost.com\)
2020-08-25 10:11:20 dovecot_login authenticator failed for \(\[78.128.113.118\]\) \[78.128.113.118\]: 535 Incorrect authentication data
2020-08-25 10:11:29 dovecot_login authenticator failed for \(\[78.128.113.118\]\) \[78.128.113.118\]: 535 Incorrect authentication data
2020-08-25 10:11:33 dovecot_login authenticator failed for \(\[78.128.113.118\]\) \[78.128.113.118\]: 535 Incorrect authentication data
2020-08-25 10:11:45 dovecot_login authenticator failed for \(\[78.128.113.118\]\) \[78.128.113.118\]: 535 Incorrect authentication data
2020-08-25 16:12:59
193.112.70.95 attackspam
k+ssh-bruteforce
2020-08-25 15:43:45
121.123.53.120 attackbots
Automatic report - Port Scan Attack
2020-08-25 16:03:42
153.122.84.229 attack
2020-08-25T07:06:45.432140abusebot-7.cloudsearch.cf sshd[14685]: Invalid user kot from 153.122.84.229 port 49414
2020-08-25T07:06:45.436218abusebot-7.cloudsearch.cf sshd[14685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=lookdatabase.com
2020-08-25T07:06:45.432140abusebot-7.cloudsearch.cf sshd[14685]: Invalid user kot from 153.122.84.229 port 49414
2020-08-25T07:06:47.537858abusebot-7.cloudsearch.cf sshd[14685]: Failed password for invalid user kot from 153.122.84.229 port 49414 ssh2
2020-08-25T07:10:30.435493abusebot-7.cloudsearch.cf sshd[14740]: Invalid user admin from 153.122.84.229 port 55826
2020-08-25T07:10:30.439630abusebot-7.cloudsearch.cf sshd[14740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=lookdatabase.com
2020-08-25T07:10:30.435493abusebot-7.cloudsearch.cf sshd[14740]: Invalid user admin from 153.122.84.229 port 55826
2020-08-25T07:10:32.094679abusebot-7.cloudsearch.cf sshd[14740]: F
...
2020-08-25 15:42:59
218.92.0.247 attackbots
2020-08-25T07:36:54.890879abusebot-6.cloudsearch.cf sshd[2756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.247  user=root
2020-08-25T07:36:56.669132abusebot-6.cloudsearch.cf sshd[2756]: Failed password for root from 218.92.0.247 port 45923 ssh2
2020-08-25T07:37:00.126189abusebot-6.cloudsearch.cf sshd[2756]: Failed password for root from 218.92.0.247 port 45923 ssh2
2020-08-25T07:36:54.890879abusebot-6.cloudsearch.cf sshd[2756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.247  user=root
2020-08-25T07:36:56.669132abusebot-6.cloudsearch.cf sshd[2756]: Failed password for root from 218.92.0.247 port 45923 ssh2
2020-08-25T07:37:00.126189abusebot-6.cloudsearch.cf sshd[2756]: Failed password for root from 218.92.0.247 port 45923 ssh2
2020-08-25T07:36:54.890879abusebot-6.cloudsearch.cf sshd[2756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.
...
2020-08-25 15:40:36

最近上报的IP列表

129.19.104.124 35.204.109.104 2606:4700:10::6816:3930 110.77.187.43
2606:4700:10::6816:1645 2606:4700:10::6814:5302 2606:4700:10::6816:993 110.78.156.173
2606:4700:10::6814:8722 110.78.150.173 2606:4700:10::6816:135 2606:4700:10::6816:4306
2606:4700:10::ac43:2355 2606:4700:10::6816:778 2606:4700:10::6814:7977 2606:4700:10::ac43:2380
2606:4700:10::6816:3436 2606:4700:10::6816:2521 2606:4700:10::6814:6429 2606:4700:10::6814:7719