必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '101.134.0.0 - 101.135.255.255'

% Abuse contact for '101.134.0.0 - 101.135.255.255' is 'ipas@cnnic.cn'

inetnum:        101.134.0.0 - 101.135.255.255
netname:        CHINA-21VIANET
descr:          21ViaNet(China),Inc.
descr:          BOE Science Park, 10 Jiuxianqiao Road, Chaoyang,
descr:          Beijing 100016, China
country:        CN
admin-c:        ML2382-AP
tech-c:         BW667-AP
abuse-c:        AC1601-AP
status:         ALLOCATED PORTABLE
mnt-by:         MAINT-CNNIC-AP
mnt-lower:      MAINT-CN-21VIANET
mnt-routes:     MAINT-CNNIC-AP
mnt-irt:        IRT-CNNIC-CN
last-modified:  2021-06-16T01:28:47Z
source:         APNIC

irt:            IRT-CNNIC-CN
address:        Beijing, China
e-mail:         ipas@cnnic.cn
abuse-mailbox:  ipas@cnnic.cn
admin-c:        IP50-AP
tech-c:         IP50-AP
auth:           # Filtered
remarks:        Please note that CNNIC is not an ISP and is not
remarks:        empowered to investigate complaints of network abuse.
remarks:        Please contact the tech-c or admin-c of the network.
remarks:        ipas@cnnic.cn is invalid
mnt-by:         MAINT-CNNIC-AP
last-modified:  2025-11-17T23:08:37Z
source:         APNIC

role:           ABUSE CNNICCN
country:        ZZ
address:        Beijing, China
phone:          +000000000
e-mail:         ipas@cnnic.cn
admin-c:        IP50-AP
tech-c:         IP50-AP
nic-hdl:        AC1601-AP
remarks:        Generated from irt object IRT-CNNIC-CN
remarks:        ipas@cnnic.cn is invalid
abuse-mailbox:  ipas@cnnic.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-19T17:20:32Z
source:         APNIC

person:         Cao Wentao
address:        BOE Science Park, 10 Jiuxianqiao Road, Chaoyang,Beijing 100016, China
country:        CN
phone:          +86-10-84562121
fax-no:         +86-10-84564234
e-mail:         abusemail1010@sina.com
nic-hdl:        BW667-AP
mnt-by:         MAINT-CNNIC-AP
last-modified:  2014-12-26T06:30:02Z
source:         APNIC

person:         Li  Xuesong
address:        BOE Science Park, 10 Jiuxianqiao Road, Chaoyang,Beijing 100016, China
country:        CN
phone:          +86-10-84562121
fax-no:         +86-10-84564234
e-mail:         abuse@21viamail.com
nic-hdl:        ML2382-AP
mnt-by:         MAINT-CNNIC-AP
last-modified:  2014-12-26T06:30:02Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 101.134.8.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16008
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;101.134.8.201.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041402 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 15 07:14:43 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 201.8.134.101.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 201.8.134.101.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
190.56.108.214 attackbotsspam
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-10-26 06:50:17
58.216.180.210 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 42 - port: 1433 proto: TCP cat: Misc Attack
2019-10-26 07:08:46
89.33.8.34 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 86 - port: 53 proto: UDP cat: Misc Attack
2019-10-26 07:02:26
112.44.251.114 attackspam
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-10-26 06:57:09
35.197.227.71 attackbots
Oct 26 00:05:30 server sshd\[31148\]: Invalid user jboss from 35.197.227.71
Oct 26 00:05:30 server sshd\[31148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.227.197.35.bc.googleusercontent.com 
Oct 26 00:05:33 server sshd\[31148\]: Failed password for invalid user jboss from 35.197.227.71 port 51352 ssh2
Oct 26 01:15:40 server sshd\[16240\]: Invalid user support from 35.197.227.71
Oct 26 01:15:40 server sshd\[16240\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.227.197.35.bc.googleusercontent.com 
...
2019-10-26 06:36:12
77.252.68.106 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 67 - port: 1433 proto: TCP cat: Misc Attack
2019-10-26 06:44:03
159.203.201.134 attack
ET DROP Dshield Block Listed Source group 1 - port: 992 proto: TCP cat: Misc Attack
2019-10-26 06:40:27
49.88.112.114 attackbotsspam
Oct 25 12:13:40 friendsofhawaii sshd\[1517\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
Oct 25 12:13:42 friendsofhawaii sshd\[1517\]: Failed password for root from 49.88.112.114 port 13168 ssh2
Oct 25 12:14:26 friendsofhawaii sshd\[1577\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
Oct 25 12:14:28 friendsofhawaii sshd\[1577\]: Failed password for root from 49.88.112.114 port 21432 ssh2
Oct 25 12:15:13 friendsofhawaii sshd\[1667\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
2019-10-26 06:37:17
89.248.174.215 attackbots
10/25/2019-18:43:18.010966 89.248.174.215 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 98
2019-10-26 07:00:55
46.209.209.74 attackspambots
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-10-26 07:09:45
91.202.16.63 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 89 - port: 1433 proto: TCP cat: Misc Attack
2019-10-26 07:00:40
59.70.207.9 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 48 - port: 1433 proto: TCP cat: Misc Attack
2019-10-26 07:08:10
71.6.146.185 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 64 - port: 9869 proto: TCP cat: Misc Attack
2019-10-26 07:06:51
218.97.60.18 attack
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-10-26 06:47:43
45.143.220.14 attackspambots
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-10-26 07:10:15

最近上报的IP列表

2606:4700:10::6816:4673 2606:4700:10::ac43:1342 2606:4700:10::6814:7937 95.218.80.102
2606:4700:10::6814:5051 252.233.65.2 189.57.6.38 49.75.17.17
219.65.245.130 128.158.158.220 139.182.105.136 47.237.71.72
171.213.191.162 111.172.6.50 165.22.12.19 109.162.246.183
2606:4700:10::6814:7121 2606:4700:10::6814:6695 4.205.60.171 45.144.212.96