必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): China Unicom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '112.224.0.0 - 112.255.255.255'

% Abuse contact for '112.224.0.0 - 112.255.255.255' is 'zhaoyz3@chinaunicom.cn'

inetnum:        112.224.0.0 - 112.255.255.255
netname:        UNICOM-SD
descr:          China Unicom Shandong province network
descr:          China Unicom
country:        CN
admin-c:        CH1302-AP
tech-c:         XZ14-AP
abuse-c:        AC1718-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CNCGROUP
mnt-lower:      MAINT-CNCGROUP-SD
mnt-routes:     MAINT-CNCGROUP-RR
mnt-irt:        IRT-CU-CN
last-modified:  2025-01-22T13:07:36Z
source:         APNIC

irt:            IRT-CU-CN
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
e-mail:         zhaoyz3@chinaunicom.cn
abuse-mailbox:  zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
auth:           # Filtered
remarks:        zhaoyz3@chinaunicom.cn was validated on 2025-10-17
mnt-by:         MAINT-CNCGROUP
last-modified:  2025-11-18T00:26:20Z
source:         APNIC

role:           ABUSE CUCN
country:        ZZ
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
phone:          +000000000
e-mail:         zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
nic-hdl:        AC1718-AP
remarks:        Generated from irt object IRT-CU-CN
remarks:        zhaoyz3@chinaunicom.cn was validated on 2025-10-17
abuse-mailbox:  zhaoyz3@chinaunicom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-10-17T02:26:56Z
source:         APNIC

person:         ChinaUnicom Hostmaster
nic-hdl:        CH1302-AP
e-mail:         hqs-ipabuse@chinaunicom.cn
address:        No.21,Jin-Rong Street
address:        Beijing,100033
address:        P.R.China
phone:          +86-10-66259764
fax-no:         +86-10-66259764
country:        CN
mnt-by:         MAINT-CNCGROUP
last-modified:  2017-08-17T06:13:16Z
source:         APNIC

person:         XIAOFENG ZHANG
nic-hdl:        XZ14-AP
e-mail:         ip@pub.sd.cninfo.net
address:        Jinan,Shandong P.R China
phone:          +86-531-6666666
fax-no:         +86-531-6666666
country:        CN
mnt-by:         MAINT-ZXF
last-modified:  2008-09-04T07:29:35Z
source:         APNIC

% Information related to '112.224.0.0/11AS4837'

route:          112.224.0.0/11
descr:          China Unicom CHINA169 Shandong Province Network
country:        CN
origin:         AS4837
mnt-by:         MAINT-CNCGROUP-RR
last-modified:  2009-02-11T01:12:50Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.247.55.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64854
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.247.55.45.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040303 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 04 08:21:02 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 45.55.247.112.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 112.247.55.45.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.24.106.222 attackbotsspam
Dec  4 09:38:44 hcbbdb sshd\[27083\]: Invalid user somebody from 218.24.106.222
Dec  4 09:38:44 hcbbdb sshd\[27083\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.24.106.222
Dec  4 09:38:46 hcbbdb sshd\[27083\]: Failed password for invalid user somebody from 218.24.106.222 port 48279 ssh2
Dec  4 09:47:09 hcbbdb sshd\[28002\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.24.106.222  user=root
Dec  4 09:47:10 hcbbdb sshd\[28002\]: Failed password for root from 218.24.106.222 port 52505 ssh2
2019-12-04 17:58:42
80.211.129.34 attackspambots
Dec  4 08:18:16 vs01 sshd[5453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.129.34 
Dec  4 08:18:18 vs01 sshd[5453]: Failed password for invalid user cheow from 80.211.129.34 port 44926 ssh2
Dec  4 08:24:02 vs01 sshd[9265]: Failed password for root from 80.211.129.34 port 55540 ssh2
2019-12-04 18:15:59
137.74.171.160 attackbotsspam
Dec  3 22:09:03 web1 sshd\[7994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.171.160  user=mysql
Dec  3 22:09:05 web1 sshd\[7994\]: Failed password for mysql from 137.74.171.160 port 48266 ssh2
Dec  3 22:14:29 web1 sshd\[8513\]: Invalid user test from 137.74.171.160
Dec  3 22:14:29 web1 sshd\[8513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.171.160
Dec  3 22:14:32 web1 sshd\[8513\]: Failed password for invalid user test from 137.74.171.160 port 58722 ssh2
2019-12-04 18:21:58
170.254.26.43 attack
Fail2Ban Ban Triggered
2019-12-04 18:02:27
178.128.20.4 attackspambots
Dec  4 10:48:45 legacy sshd[14132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.20.4
Dec  4 10:48:47 legacy sshd[14132]: Failed password for invalid user arsavir from 178.128.20.4 port 54984 ssh2
Dec  4 10:55:56 legacy sshd[14498]: Failed password for root from 178.128.20.4 port 37836 ssh2
...
2019-12-04 18:05:16
203.129.253.78 attackspam
Dec  4 10:46:45 andromeda sshd\[14566\]: Invalid user Zxcv from 203.129.253.78 port 41746
Dec  4 10:46:45 andromeda sshd\[14566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.129.253.78
Dec  4 10:46:47 andromeda sshd\[14566\]: Failed password for invalid user Zxcv from 203.129.253.78 port 41746 ssh2
2019-12-04 17:58:53
89.135.122.109 attack
Dec  4 05:46:09 firewall sshd[22869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.135.122.109
Dec  4 05:46:09 firewall sshd[22869]: Invalid user rpc from 89.135.122.109
Dec  4 05:46:11 firewall sshd[22869]: Failed password for invalid user rpc from 89.135.122.109 port 43400 ssh2
...
2019-12-04 17:53:40
58.210.169.162 attack
Dec  4 09:14:13 MK-Soft-VM6 sshd[29766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.210.169.162 
Dec  4 09:14:15 MK-Soft-VM6 sshd[29766]: Failed password for invalid user test from 58.210.169.162 port 53923 ssh2
...
2019-12-04 18:24:11
45.35.14.209 attackspambots
Host Scan
2019-12-04 18:05:37
121.66.224.90 attackspam
2019-12-04T08:15:00.605716shield sshd\[23691\]: Invalid user sicco from 121.66.224.90 port 39730
2019-12-04T08:15:00.609907shield sshd\[23691\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.66.224.90
2019-12-04T08:15:03.186822shield sshd\[23691\]: Failed password for invalid user sicco from 121.66.224.90 port 39730 ssh2
2019-12-04T08:23:11.367964shield sshd\[24986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.66.224.90  user=root
2019-12-04T08:23:14.015469shield sshd\[24986\]: Failed password for root from 121.66.224.90 port 48786 ssh2
2019-12-04 18:30:38
111.198.54.177 attack
Fail2Ban - SSH Bruteforce Attempt
2019-12-04 18:23:23
49.88.112.75 attackspam
Dec  4 17:05:45 webhost01 sshd[28478]: Failed password for root from 49.88.112.75 port 41348 ssh2
...
2019-12-04 18:16:31
213.241.46.78 attack
Dec  3 23:38:16 php1 sshd\[29943\]: Invalid user server from 213.241.46.78
Dec  3 23:38:16 php1 sshd\[29943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=kominywulkan.pl
Dec  3 23:38:18 php1 sshd\[29943\]: Failed password for invalid user server from 213.241.46.78 port 46850 ssh2
Dec  3 23:46:17 php1 sshd\[31243\]: Invalid user westonw from 213.241.46.78
Dec  3 23:46:17 php1 sshd\[31243\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=kominywulkan.pl
2019-12-04 18:01:59
222.186.173.226 attackspam
Dec  4 11:24:12 vmanager6029 sshd\[3947\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.226  user=root
Dec  4 11:24:14 vmanager6029 sshd\[3947\]: Failed password for root from 222.186.173.226 port 13612 ssh2
Dec  4 11:24:16 vmanager6029 sshd\[3947\]: Failed password for root from 222.186.173.226 port 13612 ssh2
2019-12-04 18:30:59
218.92.0.138 attackbots
Dec  3 23:51:58 hpm sshd\[18712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138  user=root
Dec  3 23:52:00 hpm sshd\[18712\]: Failed password for root from 218.92.0.138 port 13337 ssh2
Dec  3 23:52:03 hpm sshd\[18712\]: Failed password for root from 218.92.0.138 port 13337 ssh2
Dec  3 23:52:16 hpm sshd\[18739\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138  user=root
Dec  3 23:52:17 hpm sshd\[18739\]: Failed password for root from 218.92.0.138 port 44061 ssh2
2019-12-04 17:56:49

最近上报的IP列表

122.192.203.41 2606:4700:10::ac43:1266 2606:4700:10::6814:5975 2606:4700:10::6816:141
2606:4700:10::6814:4781 2606:4700:10::6816:4020 2606:4700:10::6814:7006 2606:4700:10::6816:4635
14.207.194.86 2606:4700:10::6814:7716 147.185.132.251 176.65.150.63
134.35.157.27 2606:4700:10::6814:7262 2606:4700:10::6816:3425 2606:4700:10::6814:7137
2606:4700:10::ac43:2916 2606:4700:10::ac43:2069 42.58.35.43 67.216.203.38