必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Beijing

省份(region): Beijing

国家(country): China

运营商(isp): China Unicom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '101.16.0.0 - 101.31.255.255'

% Abuse contact for '101.16.0.0 - 101.31.255.255' is 'zhaoyz3@chinaunicom.cn'

inetnum:        101.16.0.0 - 101.31.255.255
netname:        CNCGROUP-HE
descr:          China Unicom Hebei province network
descr:          China Unicom
descr:          No.21,Ji-Rong Street,
descr:          Beijing 100140
country:        CN
admin-c:        CH455-AP
tech-c:         KL984-AP
abuse-c:        AC1718-AP
status:         ALLOCATED PORTABLE
remarks:        service provider
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CNCGROUP
mnt-lower:      MAINT-CNCGROUP-HE
mnt-routes:     MAINT-CNCGROUP-RR
mnt-irt:        IRT-CU-CN
last-modified:  2023-10-21T03:32:34Z
source:         APNIC

irt:            IRT-CU-CN
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
e-mail:         zhaoyz3@chinaunicom.cn
abuse-mailbox:  zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
auth:           # Filtered
remarks:        zhaoyz3@chinaunicom.cn was validated on 2025-10-17
mnt-by:         MAINT-CNCGROUP
last-modified:  2025-10-17T02:26:26Z
source:         APNIC

role:           ABUSE CUCN
country:        ZZ
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
phone:          +000000000
e-mail:         zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
nic-hdl:        AC1718-AP
remarks:        Generated from irt object IRT-CU-CN
remarks:        zhaoyz3@chinaunicom.cn was validated on 2025-10-17
abuse-mailbox:  zhaoyz3@chinaunicom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-10-17T02:26:56Z
source:         APNIC

role:           CNCGroup Hostmaster
e-mail:         hqs-ipabuse@chinaunicom.cn
address:        No.156,Fu-Xing-Men-Nei Street,
address:        Beijing,100031,P.R.China
nic-hdl:        CH455-AP
phone:          +86-10-82993155
fax-no:         +86-10-82993102
country:        CN
admin-c:        CH444-AP
tech-c:         CH444-AP
mnt-by:         MAINT-CNCGROUP
last-modified:  2017-08-17T06:13:15Z
source:         APNIC

person:         Kong Lingfei
nic-hdl:        KL984-AP
e-mail:         konglf5@chinaunicom.cn
address:        45, Guang An Street, Shi Jiazhuang City, HeBei Province,050011,CN
phone:          +86-311-86681601
fax-no:         +86-311-86689210
country:        cn
mnt-by:         MAINT-CNCGROUP-HE
last-modified:  2009-02-06T02:31:32Z
source:         APNIC

% Information related to '101.16.0.0/12AS4837'

route:          101.16.0.0/12
descr:          China Unicom Hebei Province Network
country:        CN
origin:         AS4837
mnt-by:         MAINT-CNCGROUP-RR
last-modified:  2010-12-31T02:58:02Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 101.30.81.84
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13913
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;101.30.81.84.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025102401 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 25 08:31:09 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 84.81.30.101.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 84.81.30.101.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
172.105.57.157 attack
Oct 6 12:20:23 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:4a:cc:28:99:3a:4d:23:91:08:00 SRC=172.105.57.157 DST=173.212.244.83 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=44431 PROTO=TCP SPT=59454 DPT=2375 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 6 12:28:16 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:4a:cc:28:99:3a:4d:23:91:08:00 SRC=172.105.57.157 DST=173.212.244.83 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=20821 PROTO=TCP SPT=59911 DPT=2376 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 6 12:36:58 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:4a:cc:28:99:3a:4d:23:91:08:00 SRC=172.105.57.157 DST=173.212.244.83 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=53326 PROTO=TCP SPT=40368 DPT=2377 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 6 12:45:24 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:4a:cc:28:99:3a:4d:23:91:08:00 SRC=172.105.57.157 DST=173.212.244.83 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=64871 PROTO=TCP SPT=40850 DPT=4243 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 6 12:52:00 *hidd
...
2020-10-06 19:43:39
222.186.42.137 attack
2020-10-06T11:38:20.318951shield sshd\[17425\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.137  user=root
2020-10-06T11:38:22.487836shield sshd\[17425\]: Failed password for root from 222.186.42.137 port 16124 ssh2
2020-10-06T11:38:24.850543shield sshd\[17425\]: Failed password for root from 222.186.42.137 port 16124 ssh2
2020-10-06T11:38:27.624220shield sshd\[17425\]: Failed password for root from 222.186.42.137 port 16124 ssh2
2020-10-06T11:38:47.095350shield sshd\[17472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.137  user=root
2020-10-06 19:40:04
46.101.249.232 attackspambots
sshd: Failed password for .... from 46.101.249.232 port 60967 ssh2 (12 attempts)
2020-10-06 20:05:26
203.135.20.36 attackspam
Oct  6 10:29:21 s2 sshd[22036]: Failed password for root from 203.135.20.36 port 40156 ssh2
Oct  6 10:33:39 s2 sshd[22273]: Failed password for root from 203.135.20.36 port 42199 ssh2
2020-10-06 19:44:31
165.22.33.32 attackbotsspam
(sshd) Failed SSH login from 165.22.33.32 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  6 07:50:41 optimus sshd[20728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.33.32  user=root
Oct  6 07:50:43 optimus sshd[20728]: Failed password for root from 165.22.33.32 port 40452 ssh2
Oct  6 07:55:24 optimus sshd[21932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.33.32  user=root
Oct  6 07:55:25 optimus sshd[21932]: Failed password for root from 165.22.33.32 port 59882 ssh2
Oct  6 07:58:56 optimus sshd[22667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.33.32  user=root
2020-10-06 20:02:51
115.97.30.167 attackspambots
Telnet Honeypot -> Telnet Bruteforce / Login
2020-10-06 19:39:35
98.21.251.169 attackbotsspam
Automatic report - Banned IP Access
2020-10-06 19:50:06
51.15.84.255 attackbots
Invalid user informix from 51.15.84.255 port 47276
2020-10-06 20:11:14
185.191.171.34 attack
Web Server attack
2020-10-06 19:43:05
122.51.155.140 attackbots
SSH login attempts.
2020-10-06 20:10:50
111.231.18.208 attack
2020-10-06T10:18:54.184163abusebot-3.cloudsearch.cf sshd[26631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.18.208  user=root
2020-10-06T10:18:56.385173abusebot-3.cloudsearch.cf sshd[26631]: Failed password for root from 111.231.18.208 port 54140 ssh2
2020-10-06T10:22:05.307284abusebot-3.cloudsearch.cf sshd[26669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.18.208  user=root
2020-10-06T10:22:07.397563abusebot-3.cloudsearch.cf sshd[26669]: Failed password for root from 111.231.18.208 port 36700 ssh2
2020-10-06T10:24:57.727733abusebot-3.cloudsearch.cf sshd[26741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.18.208  user=root
2020-10-06T10:24:59.095571abusebot-3.cloudsearch.cf sshd[26741]: Failed password for root from 111.231.18.208 port 47490 ssh2
2020-10-06T10:27:40.222438abusebot-3.cloudsearch.cf sshd[26820]: pam_unix(sshd:auth):
...
2020-10-06 19:33:17
203.148.87.154 attackbotsspam
Oct  6 12:49:04 dev0-dcde-rnet sshd[2148]: Failed password for root from 203.148.87.154 port 51012 ssh2
Oct  6 12:51:47 dev0-dcde-rnet sshd[2188]: Failed password for root from 203.148.87.154 port 34856 ssh2
2020-10-06 19:32:51
217.62.155.9 attack
(smtpauth) Failed SMTP AUTH login from 217.62.155.9 (NL/Netherlands/217-62-155-9.cable.dynamic.v4.ziggo.nl): 5 in the last 3600 secs
2020-10-06 20:04:54
104.152.59.22 attackbots
(sshd) Failed SSH login from 104.152.59.22 (US/United States/-): 5 in the last 3600 secs
2020-10-06 20:03:35
77.28.185.104 attackspam
1601930231 - 10/05/2020 22:37:11 Host: 77.28.185.104/77.28.185.104 Port: 445 TCP Blocked
2020-10-06 19:31:41

最近上报的IP列表

110.87.250.49 113.231.174.209 59.82.135.238 171.111.166.137
45.55.64.180 162.216.149.221 198.235.24.238 113.215.188.14
171.10.70.116 60.222.140.234 116.113.0.55 115.60.164.78
115.56.116.150 111.85.129.250 52.178.223.71 42.239.181.72
27.205.67.214 182.91.200.180 144.126.159.64 120.85.40.90