必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Mong Kok

省份(region): Yau Tsim Mong Kowloon

国家(country): Hong Kong

运营商(isp): Hong Kong Broadband Network Ltd

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '61.238.0.0 - 61.239.255.255'

% Abuse contact for '61.238.0.0 - 61.239.255.255' is 'abuse@hkbn.net'

inetnum:        61.238.0.0 - 61.239.255.255
netname:        HKBN
descr:          Hong Kong Broadband Network Ltd
country:        HK
org:            ORG-HKBN1-AP
admin-c:        MH84-AP
tech-c:         MH84-AP
abuse-c:        AH1013-AP
status:         ALLOCATED PORTABLE
remarks:        This object can only be modified by APNIC hostmaster
remarks:        If you wish to modify this object details please
remarks:        send email to hostmaster@apnic.net with your organisation
remarks:        account name in the subject line.
mnt-by:         APNIC-HM
mnt-lower:      MAINT-HK-HKBN
mnt-routes:     MAINT-HK-HKBN
mnt-irt:        IRT-HKBN-HK
last-modified:  2020-07-15T13:09:34Z
source:         APNIC

irt:            IRT-HKBN-HK
address:        15/F Trans Asia Centre
address:        18 Kin Hong Street, Kwai Chung
address:        N.T.
e-mail:         hostmaster@hkbn.com.hk
abuse-mailbox:  abuse@hkbn.net
admin-c:        HKBN-HK
tech-c:         HKBN-HK
auth:           # Filtered
remarks:        abuse@hkbn.net was validated on 2025-10-29
remarks:        hostmaster@hkbn.com.hk is invalid
mnt-by:         MAINT-HK-HKBN
last-modified:  2026-01-28T13:07:16Z
source:         APNIC

organisation:   ORG-HKBN1-AP
org-name:       Hong Kong Broadband Network Limited
org-type:       LIR
country:        HK
address:        15/F Trans Asia Centre
address:        18 Kin Hong Street
phone:          +852-3999-3888
fax-no:         +852-8167-7020
e-mail:         nocsn@hkbn.com.hk
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2025-02-24T12:57:31Z
source:         APNIC

role:           ABUSE HKBNHK
country:        ZZ
address:        15/F Trans Asia Centre
address:        18 Kin Hong Street, Kwai Chung
address:        N.T.
phone:          +000000000
e-mail:         hostmaster@hkbn.com.hk
admin-c:        HKBN-HK
tech-c:         HKBN-HK
nic-hdl:        AH1013-AP
remarks:        Generated from irt object IRT-HKBN-HK
remarks:        abuse@hkbn.net was validated on 2025-10-29
remarks:        hostmaster@hkbn.com.hk is invalid
abuse-mailbox:  abuse@hkbn.net
mnt-by:         APNIC-ABUSE
last-modified:  2026-01-28T13:08:22Z
source:         APNIC

person:         Master Host
address:        15/F, 18 Kin Hong Street, Trans Asia Centre, Kwai Chung, Kln
country:        HK
phone:          +852-3999-3888
fax-no:         +852-8167-7020
e-mail:         hostmaster@hkbn.com.hk
nic-hdl:        MH84-AP
mnt-by:         MAINT-HK-HKBN
abuse-mailbox:  abuse@hkbn.net
last-modified:  2014-11-11T08:51:41Z
source:         APNIC

% Information related to '61.239.240.0/24AS10103'

route:          61.239.240.0/24
origin:         AS10103
descr:          Hong Kong Broadband Network Ltd
                15/F Trans Asia Centre
                18 Kin Hong Street
mnt-by:         MAINT-HK-HKBN
last-modified:  2020-04-23T04:55:33Z
source:         APNIC

% Information related to '61.239.240.0/24AS9269'

route:          61.239.240.0/24
origin:         AS9269
descr:          Hong Kong Broadband Network Ltd
                15/F Trans Asia Centre
                18 Kin Hong Street
mnt-by:         MAINT-HK-HKBN
last-modified:  2020-04-23T04:55:16Z
source:         APNIC

% Information related to '61.239.240.0/24AS9381'

route:          61.239.240.0/24
origin:         AS9381
descr:          Hong Kong Broadband Network Ltd
                15/F Trans Asia Centre
                18 Kin Hong Street
mnt-by:         MAINT-HK-HKBN
last-modified:  2021-01-27T04:48:23Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.239.240.254
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47969
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;61.239.240.254.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026021802 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 19 13:19:40 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
254.240.239.61.in-addr.arpa domain name pointer 061239240254.ctinets.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
254.240.239.61.in-addr.arpa	name = 061239240254.ctinets.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.31.166 attack
Automatic report BANNED IP
2020-06-12 15:24:26
220.132.76.189 attackbotsspam
port scan and connect, tcp 23 (telnet)
2020-06-12 15:26:11
165.22.31.24 attackspam
CMS (WordPress or Joomla) login attempt.
2020-06-12 15:29:19
49.232.5.172 attackspambots
Jun 12 02:32:11 r.ca sshd[20949]: Failed password for invalid user elmar from 49.232.5.172 port 43088 ssh2
2020-06-12 14:52:35
174.138.64.163 attackspambots
Invalid user kaiwei from 174.138.64.163 port 48696
2020-06-12 15:20:44
196.52.43.106 attackspambots
 TCP (SYN) 196.52.43.106:50887 -> port 5907, len 44
2020-06-12 15:23:01
222.186.175.217 attackbotsspam
Jun 12 08:44:49 minden010 sshd[13201]: Failed password for root from 222.186.175.217 port 37694 ssh2
Jun 12 08:44:53 minden010 sshd[13201]: Failed password for root from 222.186.175.217 port 37694 ssh2
Jun 12 08:44:56 minden010 sshd[13201]: Failed password for root from 222.186.175.217 port 37694 ssh2
Jun 12 08:45:00 minden010 sshd[13201]: Failed password for root from 222.186.175.217 port 37694 ssh2
...
2020-06-12 15:04:03
159.65.163.234 attackbotsspam
Port scan denied
2020-06-12 15:25:49
122.116.33.54 attackbots
Jun 12 13:55:24 web1 sshd[15205]: Invalid user admin from 122.116.33.54 port 57440
Jun 12 13:55:24 web1 sshd[15205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.33.54
Jun 12 13:55:24 web1 sshd[15205]: Invalid user admin from 122.116.33.54 port 57440
Jun 12 13:55:27 web1 sshd[15205]: Failed password for invalid user admin from 122.116.33.54 port 57440 ssh2
Jun 12 13:55:28 web1 sshd[15225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.33.54  user=root
Jun 12 13:55:30 web1 sshd[15225]: Failed password for root from 122.116.33.54 port 57505 ssh2
Jun 12 13:55:31 web1 sshd[15238]: Invalid user admin from 122.116.33.54 port 57577
Jun 12 13:55:32 web1 sshd[15238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.33.54
Jun 12 13:55:31 web1 sshd[15238]: Invalid user admin from 122.116.33.54 port 57577
Jun 12 13:55:34 web1 sshd[15238]: Failed passwo
...
2020-06-12 15:03:12
106.12.86.193 attackspam
2020-06-12T08:26:05.675687galaxy.wi.uni-potsdam.de sshd[31869]: Invalid user ec2-user from 106.12.86.193 port 39028
2020-06-12T08:26:05.680810galaxy.wi.uni-potsdam.de sshd[31869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.86.193
2020-06-12T08:26:05.675687galaxy.wi.uni-potsdam.de sshd[31869]: Invalid user ec2-user from 106.12.86.193 port 39028
2020-06-12T08:26:07.550871galaxy.wi.uni-potsdam.de sshd[31869]: Failed password for invalid user ec2-user from 106.12.86.193 port 39028 ssh2
2020-06-12T08:27:23.833311galaxy.wi.uni-potsdam.de sshd[32023]: Invalid user lgq from 106.12.86.193 port 53716
2020-06-12T08:27:23.838563galaxy.wi.uni-potsdam.de sshd[32023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.86.193
2020-06-12T08:27:23.833311galaxy.wi.uni-potsdam.de sshd[32023]: Invalid user lgq from 106.12.86.193 port 53716
2020-06-12T08:27:25.417648galaxy.wi.uni-potsdam.de sshd[32023]: Failed pa
...
2020-06-12 14:55:00
123.21.151.71 attack
Unauthorized IMAP connection attempt
2020-06-12 15:13:13
202.137.20.58 attackbots
Jun 12 08:54:40 vps687878 sshd\[565\]: Failed password for invalid user 123456 from 202.137.20.58 port 15051 ssh2
Jun 12 08:58:40 vps687878 sshd\[1082\]: Invalid user mwecur123SS from 202.137.20.58 port 34113
Jun 12 08:58:40 vps687878 sshd\[1082\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.137.20.58
Jun 12 08:58:42 vps687878 sshd\[1082\]: Failed password for invalid user mwecur123SS from 202.137.20.58 port 34113 ssh2
Jun 12 09:02:36 vps687878 sshd\[1556\]: Invalid user test from 202.137.20.58 port 53138
Jun 12 09:02:36 vps687878 sshd\[1556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.137.20.58
...
2020-06-12 15:03:48
185.234.219.113 attackspam
smtpd Brute Force
2020-06-12 15:31:20
202.163.126.134 attackbotsspam
$f2bV_matches
2020-06-12 15:26:35
184.105.139.116 attack
srv02 Mass scanning activity detected Target: 123(ntp) ..
2020-06-12 15:25:28

最近上报的IP列表

1.1.223.204 172.236.30.166 223.160.123.22 43.110.36.191
3.148.197.255 54.251.192.155 45.155.68.242 182.10.97.8
104.248.129.234 185.197.250.178 74.7.227.31 68.221.64.54
211.72.242.46 142.93.20.121 125.105.82.30 125.105.82.73
221.203.132.175 155.138.138.177 194.71.23.24 194.132.61.61