必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Singapore

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#


NetRange:       8.208.0.0 - 8.223.255.255
CIDR:           8.208.0.0/12
NetName:        APNIC
NetHandle:      NET-8-208-0-0-1
Parent:         NET8 (NET-8-0-0-0-0)
NetType:        Early Registrations, Transferred to APNIC
OriginAS:       
Organization:   Asia Pacific Network Information Centre (APNIC)
RegDate:        2018-04-24
Updated:        2018-04-24
Ref:            https://rdap.arin.net/registry/ip/8.208.0.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois://whois.apnic.net


OrgName:        Asia Pacific Network Information Centre
OrgId:          APNIC
Address:        PO Box 3646
City:           South Brisbane
StateProv:      QLD
PostalCode:     4101
Country:        AU
RegDate:        
Updated:        2012-01-24
Ref:            https://rdap.arin.net/registry/entity/APNIC

ReferralServer:  whois://whois.apnic.net
ResourceLink:  https://apps.db.ripe.net/db-web-ui/query

OrgAbuseHandle: AWC12-ARIN
OrgAbuseName:   APNIC Whois Contact
OrgAbusePhone:  +61 7 3858 3188 
OrgAbuseEmail:  search-apnic-not-arin@apnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN

OrgTechHandle: AWC12-ARIN
OrgTechName:   APNIC Whois Contact
OrgTechPhone:  +61 7 3858 3188 
OrgTechEmail:  search-apnic-not-arin@apnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.apnic.net.

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '8.208.0.0 - 8.223.255.255'

% Abuse contact for '8.208.0.0 - 8.223.255.255' is 'abuse@alibaba-inc.com'

inetnum:        8.208.0.0 - 8.223.255.255
netname:        ASEPL-SG
descr:          Alibaba Cloud (Singapore) Private Limited
descr:          51 Bras Basah Road #03-06 Lazada One Singapore 189554, Singapore
country:        SG
org:            ORG-ASEP1-AP
admin-c:        ASEP1-AP
tech-c:         ASEP1-AP
abuse-c:        AA1926-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-ASEPL-SG
mnt-routes:     MAINT-ASEPL-SG
mnt-irt:        IRT-ASEPL-SG
last-modified:  2023-11-09T06:37:20Z
source:         APNIC

irt:            IRT-ASEPL-SG
address:        1 Raffles Place
e-mail:         abuse@alibaba-inc.com
abuse-mailbox:  abuse@alibaba-inc.com
admin-c:        ASEP1-AP
tech-c:         ASEP1-AP
auth:           # Filtered
remarks:        abuse@alibaba-inc.com is invalid
mnt-by:         MAINT-ASEPL-SG
last-modified:  2025-10-29T13:08:56Z
source:         APNIC

organisation:   ORG-ASEP1-AP
org-name:       Alibaba Cloud (Singapore) Private Limited
org-type:       LIR
country:        SG
address:        51 Bras Basah Road # 03-06 Lazada One Singapore 189554
phone:          +8657185022088-76449
e-mail:         abuse@alibaba-inc.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2024-07-11T12:55:24Z
source:         APNIC

role:           ABUSE ASEPLSG
country:        ZZ
address:        1 Raffles Place
phone:          +000000000
e-mail:         abuse@alibaba-inc.com
admin-c:        ASEP1-AP
tech-c:         ASEP1-AP
nic-hdl:        AA1926-AP
remarks:        Generated from irt object IRT-ASEPL-SG
remarks:        abuse@alibaba-inc.com is invalid
abuse-mailbox:  abuse@alibaba-inc.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-10-29T13:10:14Z
source:         APNIC

role:           Alibabacom Singapore E-Commerce Private Limited a
address:        1 Raffles Place #59-00 One Raffles Place, Tower One Singapore, Singapore
country:        SG
phone:          +86-571-85022088
fax-no:         +86-571-85022088
e-mail:         abuse@alibaba-inc.com
admin-c:        ASEP1-AP
tech-c:         ASEP1-AP
nic-hdl:        ASEP1-AP
mnt-by:         MAINT-ASEPL-SG
last-modified:  2025-07-01T06:25:24Z
source:         APNIC

% Information related to '8.219.241.0/24AS134963'

route:          8.219.241.0/24
origin:         AS134963
descr:          Alibaba.com Singapore E-Commerce Private Limited
                8 Shenton Way, #45-01 AXA Tower, Singapore 068811
mnt-by:         MAINT-ASEPL-SG
last-modified:  2020-01-20T07:58:53Z
source:         APNIC

% Information related to '8.219.241.0/24AS45102'

route:          8.219.241.0/24
origin:         AS45102
descr:          Alibaba.com Singapore E-Commerce Private Limited
                8 Shenton Way, #45-01 AXA Tower, Singapore 068811
mnt-by:         MAINT-ASEPL-SG
last-modified:  2020-01-20T07:30:08Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 8.219.241.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34690
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;8.219.241.212.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025110901 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Nov 10 04:30:10 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 212.241.219.8.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 212.241.219.8.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
65.74.177.90 attackbots
65.74.177.90 - - \[20/Jan/2020:05:55:24 +0100\] "POST /wp-login.php HTTP/1.0" 200 7556 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
65.74.177.90 - - \[20/Jan/2020:05:55:27 +0100\] "POST /wp-login.php HTTP/1.0" 200 7381 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
65.74.177.90 - - \[20/Jan/2020:05:55:30 +0100\] "POST /wp-login.php HTTP/1.0" 200 7376 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-01-20 15:39:36
93.112.17.103 attackbots
" "
2020-01-20 16:04:03
59.153.87.166 attackspambots
20/1/19@23:54:44: FAIL: Alarm-Network address from=59.153.87.166
20/1/19@23:54:44: FAIL: Alarm-Network address from=59.153.87.166
...
2020-01-20 16:07:28
84.91.128.47 attackbots
Unauthorized connection attempt detected from IP address 84.91.128.47 to port 2220 [J]
2020-01-20 15:41:58
128.14.133.58 attack
Unauthorized connection attempt detected from IP address 128.14.133.58 to port 443 [J]
2020-01-20 16:00:26
129.211.82.237 attack
Invalid user ma from 129.211.82.237 port 45614
2020-01-20 15:31:54
120.227.0.236 attack
SSH invalid-user multiple login try
2020-01-20 16:00:12
42.62.2.130 attack
Unauthorized connection attempt detected from IP address 42.62.2.130 to port 1433 [J]
2020-01-20 15:34:18
138.246.253.21 attack
Port scan on 1 port(s): 53
2020-01-20 15:52:05
172.94.53.149 attackbotsspam
Jan 20 07:13:48 vtv3 sshd[2773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.94.53.149 
Jan 20 07:13:50 vtv3 sshd[2773]: Failed password for invalid user amax from 172.94.53.149 port 59924 ssh2
Jan 20 07:20:07 vtv3 sshd[5682]: Failed password for root from 172.94.53.149 port 46116 ssh2
Jan 20 07:31:59 vtv3 sshd[11716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.94.53.149 
Jan 20 07:32:01 vtv3 sshd[11716]: Failed password for invalid user IEUser from 172.94.53.149 port 46748 ssh2
Jan 20 07:38:00 vtv3 sshd[14445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.94.53.149 
Jan 20 07:49:47 vtv3 sshd[20007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.94.53.149 
Jan 20 07:49:48 vtv3 sshd[20007]: Failed password for invalid user upload from 172.94.53.149 port 33585 ssh2
Jan 20 07:55:46 vtv3 sshd[23161]: pam_unix(sshd:auth): authe
2020-01-20 15:31:24
159.203.197.148 attack
Web application attack detected by fail2ban
2020-01-20 15:57:37
185.153.199.242 attackbotsspam
unauthorized connection attempt
2020-01-20 15:47:05
181.165.166.151 attack
Unauthorized connection attempt detected from IP address 181.165.166.151 to port 2220 [J]
2020-01-20 15:39:11
187.167.193.222 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-20 15:44:36
62.234.152.218 attackbotsspam
Unauthorized connection attempt detected from IP address 62.234.152.218 to port 2220 [J]
2020-01-20 15:38:11

最近上报的IP列表

8.222.190.116 8.222.184.245 8.219.164.139 47.236.26.161
8.219.3.13 85.11.183.6 20.83.167.28 8.219.144.194
47.84.17.221 8.222.154.87 8.219.82.84 8.219.241.183
47.99.62.117 8.219.2.88 47.84.16.14 44.201.212.55
3.91.205.122 34.224.29.202 34.207.182.99 36.133.211.61