必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Beijing

省份(region): Beijing

国家(country): China

运营商(isp): China Unicom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '111.192.0.0 - 111.207.255.255'

% Abuse contact for '111.192.0.0 - 111.207.255.255' is 'zhaoyz3@chinaunicom.cn'

inetnum:        111.192.0.0 - 111.207.255.255
netname:        UNICOM-BJ
descr:          China Unicom Beijing province network
descr:          China Unicom
country:        CN
admin-c:        CH1302-AP
tech-c:         SY21-AP
abuse-c:        AC1718-AP
status:         ALLOCATED PORTABLE
remarks:        service provider
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CNCGROUP
mnt-lower:      MAINT-CNCGROUP-BJ
mnt-routes:     MAINT-CNCGROUP-RR
mnt-irt:        IRT-CU-CN
last-modified:  2023-10-21T03:42:11Z
source:         APNIC

irt:            IRT-CU-CN
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
e-mail:         zhaoyz3@chinaunicom.cn
abuse-mailbox:  zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
auth:           # Filtered
remarks:        zhaoyz3@chinaunicom.cn was validated on 2025-10-17
mnt-by:         MAINT-CNCGROUP
last-modified:  2025-11-18T00:26:20Z
source:         APNIC

role:           ABUSE CUCN
country:        ZZ
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
phone:          +000000000
e-mail:         zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
nic-hdl:        AC1718-AP
remarks:        Generated from irt object IRT-CU-CN
remarks:        zhaoyz3@chinaunicom.cn was validated on 2025-10-17
abuse-mailbox:  zhaoyz3@chinaunicom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-10-17T02:26:56Z
source:         APNIC

person:         ChinaUnicom Hostmaster
nic-hdl:        CH1302-AP
e-mail:         hqs-ipabuse@chinaunicom.cn
address:        No.21,Jin-Rong Street
address:        Beijing,100033
address:        P.R.China
phone:          +86-10-66259764
fax-no:         +86-10-66259764
country:        CN
mnt-by:         MAINT-CNCGROUP
last-modified:  2017-08-17T06:13:16Z
source:         APNIC

person:         sun ying
address:        fu xing men nei da jie 97, Xicheng District
address:        Beijing 100800
country:        CN
phone:          +86-10-66030657
fax-no:         +86-10-66078815
e-mail:         hostmast@publicf.bta.net.cn
nic-hdl:        SY21-AP
mnt-by:         MAINT-CNCGROUP-BJ
last-modified:  2009-06-30T08:42:48Z
source:         APNIC

% Information related to '111.192.0.0/12AS4808'

route:          111.192.0.0/12
descr:          China Unicom Beijing Province Network
country:        CN
origin:         AS4808
mnt-by:         MAINT-CNCGROUP-RR
last-modified:  2016-05-20T01:24:03Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 111.201.247.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39873
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;111.201.247.66.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026012500 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 26 01:04:16 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 66.247.201.111.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.247.201.111.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
61.218.250.211 attackbots
WordPress login Brute force / Web App Attack on client site.
2019-07-24 04:52:54
139.59.46.253 attack
fail2ban honeypot
2019-07-24 05:05:29
185.238.29.12 attack
xmlrpc attack
2019-07-24 05:04:30
217.35.75.193 attackspambots
Invalid user phion from 217.35.75.193 port 40256
2019-07-24 04:35:53
43.225.48.10 attack
Automatic report - Port Scan Attack
2019-07-24 04:56:55
198.71.228.8 attackspam
fail2ban honeypot
2019-07-24 05:19:40
88.121.68.131 attack
Jul 23 22:22:52 mail sshd\[8138\]: Invalid user dany from 88.121.68.131
Jul 23 22:22:52 mail sshd\[8138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.121.68.131
Jul 23 22:22:53 mail sshd\[8138\]: Failed password for invalid user dany from 88.121.68.131 port 51558 ssh2
...
2019-07-24 04:50:06
37.156.28.18 attack
Jul 24 00:02:06 yabzik sshd[21558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.156.28.18
Jul 24 00:02:09 yabzik sshd[21558]: Failed password for invalid user oracle from 37.156.28.18 port 43919 ssh2
Jul 24 00:07:01 yabzik sshd[23038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.156.28.18
2019-07-24 05:16:34
92.63.194.47 attack
Jul 23 20:46:16 thevastnessof sshd[27687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.47
...
2019-07-24 04:58:30
81.215.206.46 attack
Automatic report - Port Scan Attack
2019-07-24 04:51:28
117.191.11.101 attack
Wordpress XMLRPC attack
2019-07-24 05:13:37
125.161.106.113 attack
Automatic report - Port Scan Attack
2019-07-24 04:41:56
159.192.134.61 attack
Jul 23 16:39:11 plusreed sshd[24143]: Invalid user teamspeak from 159.192.134.61
...
2019-07-24 04:47:01
185.244.25.227 attack
" "
2019-07-24 04:57:12
51.75.29.61 attackspambots
Jul 23 22:22:58 * sshd[26022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.29.61
Jul 23 22:23:00 * sshd[26022]: Failed password for invalid user csserver from 51.75.29.61 port 36544 ssh2
2019-07-24 04:48:07

最近上报的IP列表

162.243.60.61 195.248.78.210 93.66.87.98 93.66.85.158
109.118.83.242 203.172.63.76 74.222.3.79 74.222.3.163
74.222.3.154 223.244.8.41 172.208.24.40 150.255.109.232
204.12.215.54 77.83.39.69 39.108.149.232 223.104.42.140
54.224.229.32 162.216.149.66 180.153.236.156 180.153.236.134