必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '111.208.0.0 - 111.211.255.255'

% Abuse contact for '111.208.0.0 - 111.211.255.255' is 'jsz_1981_10@sina.com'

inetnum:        111.208.0.0 - 111.211.255.255
netname:        JSCNNET
descr:          JIANGSU BROADCASTING DATA NETWORK CORPORATION LIMITED
descr:          BUILDING NO.11 WINDOWS TO THE WORLD SOFTWARE PARK NO.12 DINGHUAIMEN,NANJING,CHINA
country:        CN
admin-c:        ML1838-AP
tech-c:         BW690-AP
abuse-c:        AC1601-AP
status:         ALLOCATED PORTABLE
mnt-by:         MAINT-CNNIC-AP
mnt-irt:        IRT-JSCNNET-CN
mnt-lower:      MAINT-CNNIC-AP
mnt-routes:     MAINT-CNNIC-AP
last-modified:  2023-11-28T00:56:52Z
source:         APNIC

irt:            IRT-JSCNNET-CN
address:        BUILDING NO.11 WINDOWS TO THE WORLD SOFTWARE PARK NO.12 DINGHUAIMEN,NANJING,CHINA
e-mail:         jsz_1981_10@sina.com
abuse-mailbox:  jsz_1981_10@sina.com
admin-c:        ML1838-AP
tech-c:         BW690-AP
auth:           # Filtered
mnt-by:         MAINT-CNNIC-AP
last-modified:  2025-11-18T00:35:12Z
source:         APNIC

role:           ABUSE CNNICCN
country:        ZZ
address:        Beijing, China
phone:          +000000000
e-mail:         ipas@cnnic.cn
admin-c:        IP50-AP
tech-c:         IP50-AP
nic-hdl:        AC1601-AP
remarks:        Generated from irt object IRT-CNNIC-CN
remarks:        ipas@cnnic.cn is invalid
abuse-mailbox:  ipas@cnnic.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-19T17:20:32Z
source:         APNIC

person:         Wei Fan
address:        BUILDING NO.11 WINDOWS TO THE WORLD SOFTWARE PARK NO.12 DINGHUAIMEN,NANJING,CHINA
country:        CN
phone:          +86-18662702968
e-mail:         fanwei@jscndata.com
nic-hdl:        BW690-AP
mnt-by:         MAINT-CNNIC-AP
last-modified:  2013-01-05T02:12:01Z
source:         APNIC

person:         Ning Ji
address:        BUILDING NO.11 WINDOWS TO THE WORLD SOFTWARE PARK NO.12 DINGHUAIMEN,NANJING,CHINA
country:        CN
phone:          +86-18651888996
e-mail:         jsz_1981_10@sina.com
nic-hdl:        ML1838-AP
mnt-by:         MAINT-CNNIC-AP
last-modified:  2013-01-05T02:12:01Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 111.208.80.115
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48480
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;111.208.80.115.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026052101 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 21 22:30:25 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 115.80.208.111.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 115.80.208.111.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
122.51.243.223 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-07-29T20:24:37Z and 2020-07-29T20:27:32Z
2020-07-30 05:49:25
49.232.140.7 attackspambots
Jul 29 23:27:29 sso sshd[15536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.140.7
Jul 29 23:27:32 sso sshd[15536]: Failed password for invalid user gcj from 49.232.140.7 port 49330 ssh2
...
2020-07-30 06:00:42
51.91.110.170 attackspambots
SSH Invalid Login
2020-07-30 05:53:56
76.186.123.165 attackbots
Jul 29 23:02:53 ip106 sshd[30805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.186.123.165 
Jul 29 23:02:56 ip106 sshd[30805]: Failed password for invalid user jinzhang from 76.186.123.165 port 50238 ssh2
...
2020-07-30 06:05:57
195.54.160.21 attackbotsspam
SmallBizIT.US 3 packets to tcp(6379,6800,8088)
2020-07-30 06:11:26
78.128.113.115 attack
Jul 29 23:52:54 mail.srvfarm.net postfix/smtpd[3435195]: warning: unknown[78.128.113.115]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 29 23:52:54 mail.srvfarm.net postfix/smtpd[3435195]: lost connection after AUTH from unknown[78.128.113.115]
Jul 29 23:52:59 mail.srvfarm.net postfix/smtpd[3436084]: lost connection after AUTH from unknown[78.128.113.115]
Jul 29 23:53:04 mail.srvfarm.net postfix/smtpd[3436103]: lost connection after AUTH from unknown[78.128.113.115]
Jul 29 23:53:09 mail.srvfarm.net postfix/smtpd[3435195]: lost connection after AUTH from unknown[78.128.113.115]
2020-07-30 06:10:46
89.248.168.2 attackspam
(pop3d) Failed POP3 login from 89.248.168.2 (NL/Netherlands/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jul 30 01:30:40 ir1 dovecot[3110802]: pop3-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=89.248.168.2, lip=5.63.12.44, session=
2020-07-30 06:15:39
207.246.240.125 attack
3 failed ftp login attempts in 3600s
2020-07-30 05:46:47
222.173.12.35 attack
SSH bruteforce
2020-07-30 05:59:40
107.174.44.184 attackbots
Jul 29 23:31:38 vps639187 sshd\[27870\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.174.44.184  user=debian
Jul 29 23:31:39 vps639187 sshd\[27870\]: Failed password for debian from 107.174.44.184 port 47284 ssh2
Jul 29 23:35:38 vps639187 sshd\[27970\]: Invalid user zhanghw from 107.174.44.184 port 33106
Jul 29 23:35:38 vps639187 sshd\[27970\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.174.44.184
...
2020-07-30 05:42:27
175.24.49.95 attackspam
$f2bV_matches
2020-07-30 06:15:13
123.207.94.252 attack
Jul 30 02:16:00 gw1 sshd[970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.94.252
Jul 30 02:16:01 gw1 sshd[970]: Failed password for invalid user guanhuimin from 123.207.94.252 port 16504 ssh2
...
2020-07-30 06:02:36
202.131.152.2 attackbotsspam
Total attacks: 2
2020-07-30 05:43:53
208.109.12.104 attackspam
SSH Invalid Login
2020-07-30 05:54:38
80.82.77.212 attackspambots
SmallBizIT.US 3 packets to udp(17185,32769,49152)
2020-07-30 06:05:13

最近上报的IP列表

110.17.84.222 134.35.157.102 3.87.31.169 2606:4700:10::6816:3332
110.78.153.77 111.208.78.115 66.132.172.197 42.48.38.47
195.96.139.15 171.105.76.96 2606:4700:10::ac43:1959 10.101.111.112
149.18.47.24 125.123.70.203 20.102.116.167 169.150.196.106
66.132.172.106 208.84.100.117 2606:4700:10::6816:2795 94.177.131.9