必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Malaysia

运营商(isp): Maxis

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '58.71.128.0 - 58.71.255.255'

% Abuse contact for '58.71.128.0 - 58.71.255.255' is 'abuse@maxis.com.my'

inetnum:        58.71.128.0 - 58.71.255.255
netname:        MAXISNET
descr:          Maxis Broadband Sdn Bhd
descr:          Level 8, Block 1A, Plaza Sentral
descr:          Jalan Stesen Sentral 5
descr:          Kuala Lumpur Sentral
country:        MY
org:            ORG-MBS1-AP
admin-c:        MN167-AP
tech-c:         MO113-AP
abuse-c:        AM2470-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-MY-MAXIS
mnt-irt:        IRT-MAXISBROADBAND-MY
last-modified:  2020-06-15T04:03:47Z
source:         APNIC

irt:            IRT-MAXISBROADBAND-MY
address:        Level 19, Menara Maxis,
address:        KLCC, 50088 Kuala Lumpur
address:        Malaysia
e-mail:         abuse@maxis.com.my
abuse-mailbox:  abuse@maxis.com.my
admin-c:        KG360-AP
tech-c:         KG360-AP
auth:           # Filtered
remarks:        abuse@maxis.com.my is invalid
mnt-by:         MAINT-MY-MAXIS
last-modified:  2026-02-05T03:42:45Z
source:         APNIC

organisation:   ORG-MBS1-AP
org-name:       Maxis Broadband Sdn.Bhd
org-type:       LIR
country:        MY
address:        Level 14, Menara Maxis,
address:        Kuala Lumpur City Centre,
address:        Off Jalan Ampang
phone:          +60-3-2300-3000
fax-no:         +60-3-2300-0053
e-mail:         peering@maxis.com.my
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:14:52Z
source:         APNIC

role:           ABUSE MAXISBROADBANDMY
country:        ZZ
address:        Level 19, Menara Maxis,
address:        KLCC, 50088 Kuala Lumpur
address:        Malaysia
phone:          +000000000
e-mail:         abuse@maxis.com.my
admin-c:        KG360-AP
tech-c:         KG360-AP
nic-hdl:        AM2470-AP
remarks:        Generated from irt object IRT-MAXISBROADBAND-MY
remarks:        abuse@maxis.com.my is invalid
abuse-mailbox:  abuse@maxis.com.my
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-04T18:10:04Z
source:         APNIC

person:         Maheson Nadaraja
nic-hdl:        MN167-AP
e-mail:         nmaheso@maxis.com.my
address:        Plot 12155(Lot 13),
address:        Jalan Delima 1/1
address:        Subang Hi-Tech Industrial Park
address:        40000 Shah Alam, Selangor, Malaysia
phone:          +60-12-2000170
fax-no:         +60-3-58800225
country:        MY
mnt-by:         MAINT-MY-MAXIS
last-modified:  2008-09-04T07:29:52Z
source:         APNIC

person:         Maxis Network and Security Operations
nic-hdl:        MO113-AP
remarks:        Please send spam report, virus alert or any others
remarks:        abuse report trouble to abuse@maxis.com.my
e-mail:         abuse@maxis.com.my
address:        Level 19, Menara Maxis,
address:        KLCC, 50088 Kuala Lumpur
address:        Malaysia
phone:          +603-2330-7500
fax-no:         +603-2330-0587
country:        MY
mnt-by:         MAINT-MY-MAXIS
last-modified:  2008-11-07T08:55:51Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 58.71.239.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63999
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;58.71.239.99.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026051300 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 13 21:40:24 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
Host 99.239.71.58.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 99.239.71.58.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
121.166.245.171 attackbots
Aug 30 10:54:20 ns382633 sshd\[7415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.166.245.171  user=root
Aug 30 10:54:22 ns382633 sshd\[7415\]: Failed password for root from 121.166.245.171 port 43238 ssh2
Aug 30 11:01:16 ns382633 sshd\[9656\]: Invalid user dines from 121.166.245.171 port 49994
Aug 30 11:01:16 ns382633 sshd\[9656\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.166.245.171
Aug 30 11:01:18 ns382633 sshd\[9656\]: Failed password for invalid user dines from 121.166.245.171 port 49994 ssh2
2020-08-30 17:57:33
117.136.2.159 attack
port scan and connect, tcp 1433 (ms-sql-s)
2020-08-30 18:02:25
116.108.40.120 attackspambots
Attempted connection to port 23.
2020-08-30 17:38:04
45.2.251.126 attackspam
 TCP (SYN) 45.2.251.126:50746 -> port 50802, len 44
2020-08-30 18:16:10
148.70.149.39 attackspambots
Invalid user drake from 148.70.149.39 port 33452
2020-08-30 18:01:25
14.177.232.31 attackspambots
Aug 30 05:44:49 tor-proxy-04 sshd\[6274\]: Invalid user nexthink from 14.177.232.31 port 35580
Aug 30 05:44:50 tor-proxy-04 sshd\[6274\]: Connection closed by 14.177.232.31 port 35580 \[preauth\]
Aug 30 05:44:51 tor-proxy-04 sshd\[6276\]: Invalid user misp from 14.177.232.31 port 36226
...
2020-08-30 18:02:42
85.209.0.9 attackbotsspam
Honeypot hit.
2020-08-30 17:46:46
168.121.51.42 attack
Unauthorized connection attempt from IP address 168.121.51.42 on Port 445(SMB)
2020-08-30 17:47:25
115.75.26.86 attackbots
Attempted connection to port 445.
2020-08-30 17:38:23
98.249.36.64 attack
Aug 30 06:58:24 DAAP sshd[7004]: Invalid user git from 98.249.36.64 port 36998
Aug 30 06:58:25 DAAP sshd[7004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.249.36.64
Aug 30 06:58:24 DAAP sshd[7004]: Invalid user git from 98.249.36.64 port 36998
Aug 30 06:58:26 DAAP sshd[7004]: Failed password for invalid user git from 98.249.36.64 port 36998 ssh2
Aug 30 06:59:08 DAAP sshd[7012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.249.36.64  user=root
Aug 30 06:59:10 DAAP sshd[7012]: Failed password for root from 98.249.36.64 port 41998 ssh2
...
2020-08-30 17:37:17
113.170.128.199 attackbotsspam
Unauthorized connection attempt from IP address 113.170.128.199 on Port 445(SMB)
2020-08-30 17:56:24
180.183.122.191 attackbots
Unauthorized connection attempt from IP address 180.183.122.191 on Port 445(SMB)
2020-08-30 17:40:00
104.131.208.119 attack
104.131.208.119 - - [30/Aug/2020:11:27:59 +0200] "GET /wp-login.php HTTP/1.1" 200 8775 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.131.208.119 - - [30/Aug/2020:11:28:00 +0200] "POST /wp-login.php HTTP/1.1" 200 9026 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.131.208.119 - - [30/Aug/2020:11:28:01 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-30 17:39:25
177.52.77.100 attack
(smtpauth) Failed SMTP AUTH login from 177.52.77.100 (BR/Brazil/177-52-77-100.telecom.brbyte.com): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-08-30 08:14:18 plain authenticator failed for ([177.52.77.100]) [177.52.77.100]: 535 Incorrect authentication data (set_id=h.sabet@iwnt.ir)
2020-08-30 18:19:01
49.49.234.199 attackspambots
Unauthorized connection attempt from IP address 49.49.234.199 on Port 445(SMB)
2020-08-30 17:50:41

最近上报的IP列表

175.107.211.157 121.43.152.182 47.92.241.42 39.100.81.231
74.48.144.143 149.56.160.175 66.132.172.178 176.65.139.231
198.199.104.186 2606:4700:10::6814:6640 2606:4700:10::6814:8896 49.175.36.22
74.41.154.158 182.187.88.177 212.73.148.41 43.128.73.132
39.98.88.157 39.173.105.161 122.193.247.161 5.226.140.10