必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '101.4.0.0 - 101.7.255.255'

% Abuse contact for '101.4.0.0 - 101.7.255.255' is 'abuse@cernet.edu.cn'

inetnum:        101.4.0.0 - 101.7.255.255
netname:        BJR-CERNET
descr:          China Education and Research Network
descr:          Beijing Regional Network
country:        CN
admin-c:        CER-AP
tech-c:         CER-AP
abuse-c:        AC1685-AP
status:         ALLOCATED PORTABLE
remarks:        origin AS4538
remarks:        confederation
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CERNET-AP
mnt-routes:     MAINT-CERNET-AP
mnt-irt:        IRT-CERNET-AP
last-modified:  2020-09-03T09:16:24Z
source:         APNIC

irt:            IRT-CERNET-AP
address:        Network Center,
address:        FIT-3-220, Tsinghua Univ
address:        Beijing 100084, China
phone:          +86-10-62784301
fax-no:         +86-10-62785933
e-mail:         abuse@cernet.edu.cn
abuse-mailbox:  abuse@cernet.edu.cn
admin-c:        CER-AP
tech-c:         CER-AP
auth:           # Filtered
remarks:        timezone GMT+8
remarks:        abuse@cernet.edu.cn was validated on 2026-03-05
mnt-by:         MAINT-CERNET-AP
last-modified:  2026-03-05T06:39:56Z
source:         APNIC

role:           ABUSE CERNETAP
country:        ZZ
address:        Network Center,
address:        FIT-3-220, Tsinghua Univ
address:        Beijing 100084, China
phone:          +86-10-62784301
e-mail:         abuse@cernet.edu.cn
admin-c:        CER-AP
tech-c:         CER-AP
nic-hdl:        AC1685-AP
remarks:        Generated from irt object IRT-CERNET-AP
remarks:        abuse@cernet.edu.cn was validated on 2026-03-05
abuse-mailbox:  abuse@cernet.edu.cn
mnt-by:         APNIC-ABUSE
last-modified:  2026-03-05T06:40:20Z
source:         APNIC

role:           CERNET Helpdesk
address:        CERNET Center
address:        Beijing 100084, China
country:        CN
phone:          +86-10-6278-4049
fax-no:         +86-10-6278-5933
e-mail:         helpdesk@cernet.edu.cn
remarks:        abuse@cernet.edu.cn
admin-c:        XL1-CN
tech-c:         SZ2-AP
nic-hdl:        CER-AP
mnt-by:         MAINT-CERNET-AP
last-modified:  2020-09-03T09:14:12Z
source:         APNIC

% Information related to '101.4.0.0/14AS4538'

route:          101.4.0.0/14
descr:          CERNET
origin:         AS4538
mnt-by:         MAINT-CERNET-AP
last-modified:  2010-12-13T06:08:01Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 101.4.117.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64561
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;101.4.117.82.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032700 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 27 14:24:13 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
Host 82.117.4.101.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 82.117.4.101.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
179.43.169.182 attackbotsspam
[MK-Root1] Blocked by UFW
2020-03-05 09:33:47
119.15.153.234 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-05 09:39:14
221.182.204.114 attack
failed_logins
2020-03-05 09:36:05
45.143.220.4 attackbotsspam
[2020-03-04 17:01:31] NOTICE[1148][C-0000e02c] chan_sip.c: Call from '' (45.143.220.4:40561) to extension '01148323395006' rejected because extension not found in context 'public'.
[2020-03-04 17:01:31] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-03-04T17:01:31.430-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="01148323395006",SessionID="0x7fd82c538db8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.220.4/5060",ACLName="no_extension_match"
[2020-03-04 17:07:44] NOTICE[1148][C-0000e02d] chan_sip.c: Call from '' (45.143.220.4:5219) to extension '90048323395006' rejected because extension not found in context 'public'.
[2020-03-04 17:07:44] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-03-04T17:07:44.561-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="90048323395006",SessionID="0x7fd82cb29a68",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.22
...
2020-03-05 09:48:35
118.71.23.33 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-05 09:56:08
222.186.42.155 attackspambots
2020-03-05T02:40:47.254736centos sshd\[19754\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155  user=root
2020-03-05T02:40:49.151515centos sshd\[19754\]: Failed password for root from 222.186.42.155 port 29360 ssh2
2020-03-05T02:40:51.589622centos sshd\[19754\]: Failed password for root from 222.186.42.155 port 29360 ssh2
2020-03-05 09:42:55
179.150.162.195 attack
Probing for vulnerable services
2020-03-05 09:40:15
62.122.244.227 attackbotsspam
SSH invalid-user multiple login try
2020-03-05 09:55:20
43.241.19.211 attackproxy
attack ldap
2020-03-05 11:33:41
59.180.230.146 attackbots
Mar  5 02:31:09 vpn01 sshd[25893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.180.230.146
Mar  5 02:31:11 vpn01 sshd[25893]: Failed password for invalid user celery from 59.180.230.146 port 56649 ssh2
...
2020-03-05 09:56:23
103.72.8.7 attackbots
Mar  5 02:17:22 debian-2gb-nbg1-2 kernel: \[5630214.126274\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=103.72.8.7 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=239 ID=32849 PROTO=TCP SPT=43335 DPT=12990 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-05 09:27:39
141.98.10.141 attack
2020-03-05 05:47:24 dovecot_login authenticator failed for \(User\) \[141.98.10.141\]: 535 Incorrect authentication data \(set_id=office@no-server.de\)
2020-03-05 05:51:34 dovecot_login authenticator failed for \(User\) \[141.98.10.141\]: 535 Incorrect authentication data \(set_id=aaaaaaaaaa\)
2020-03-05 05:53:36 dovecot_login authenticator failed for \(User\) \[141.98.10.141\]: 535 Incorrect authentication data \(set_id=office@no-server.de\)
2020-03-05 05:55:12 dovecot_login authenticator failed for \(User\) \[141.98.10.141\]: 535 Incorrect authentication data \(set_id=aaaaaaaaaa\)
2020-03-05 05:55:21 dovecot_login authenticator failed for \(User\) \[141.98.10.141\]: 535 Incorrect authentication data \(set_id=aaaaaaaaaa\)
...
2020-03-05 13:00:50
192.241.225.237 attackspambots
port scan and connect, tcp 2638 (sql-anywhere)
2020-03-05 09:49:05
59.188.73.200 attack
20/3/4@16:49:54: FAIL: Alarm-Network address from=59.188.73.200
20/3/4@16:49:54: FAIL: Alarm-Network address from=59.188.73.200
...
2020-03-05 09:23:29
190.143.39.211 attack
Mar  4 23:10:36 sd-53420 sshd\[19986\]: Invalid user gaochangfeng from 190.143.39.211
Mar  4 23:10:36 sd-53420 sshd\[19986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.143.39.211
Mar  4 23:10:39 sd-53420 sshd\[19986\]: Failed password for invalid user gaochangfeng from 190.143.39.211 port 53602 ssh2
Mar  4 23:20:19 sd-53420 sshd\[20750\]: Invalid user informix from 190.143.39.211
Mar  4 23:20:19 sd-53420 sshd\[20750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.143.39.211
...
2020-03-05 09:44:49

最近上报的IP列表

141.11.134.1 66.132.195.111 64.168.29.253 234.5.53.212
35.203.210.244 219.156.190.17 134.35.157.45 121.234.219.98
2606:4700:10::ac43:1703 2606:4700:10::6814:5684 2606:4700:10::6814:9920 2606:4700:10::ac43:2557
163.153.215.196 103.13.19.23 83.97.99.39 91.209.190.146
66.132.195.43 2606:4700:10::ac43:122e 2606:4700:10::6814:6539 2606:4700:10::6814:7721