必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '113.136.0.0 - 113.143.255.255'

% Abuse contact for '113.136.0.0 - 113.143.255.255' is 'anti-spam@chinatelecom.cn'

inetnum:        113.136.0.0 - 113.143.255.255
netname:        CHINANET-SN
descr:          CHINANET SHAANXI PROVINCE NETWORK
descr:          China Telecom
descr:          No.56,gaoxin street
descr:          Beijing 100032
country:        CN
admin-c:        XC9-AP
tech-c:         XC9-AP
abuse-c:        AC1573-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CHINANET-SHAANXI
mnt-routes:     MAINT-CHINANET-SHAANXI
mnt-irt:        IRT-CHINANET-CN
last-modified:  2021-06-15T08:06:14Z
source:         APNIC

irt:            IRT-CHINANET-CN
address:        No.31 ,jingrong street,beijing
address:        100032
e-mail:         anti-spam@chinatelecom.cn
abuse-mailbox:  anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
auth:           # Filtered
remarks:        anti-spam@chinatelecom.cn was validated on 2025-04-24
mnt-by:         MAINT-CHINANET
last-modified:  2025-09-04T00:59:42Z
source:         APNIC

role:           ABUSE CHINANETCN
country:        ZZ
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +000000000
e-mail:         anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
nic-hdl:        AC1573-AP
remarks:        Generated from irt object IRT-CHINANET-CN
remarks:        anti-spam@chinatelecom.cn was validated on 2025-04-24
abuse-mailbox:  anti-spam@chinatelecom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-04-24T03:21:54Z
source:         APNIC

person:         Xianghong Cao
address:        Shanxi provice data communication Bureau
address:        185# zhuque Road
address:        Xi'an city, Shanxi provice 710061
country:        CN
phone:          +8629-523-3633
fax-no:         +8629-522-8093
e-mail:         sxic@public.xa.sn.cn
nic-hdl:        XC9-AP
mnt-by:         MAINT-CHINANET
last-modified:  2017-03-17T01:44:04Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.141.88.101
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61320
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.141.88.101.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025101201 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Oct 13 06:30:10 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 101.88.141.113.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 101.88.141.113.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
195.130.246.72 attackspam
Unauthorized connection attempt from IP address 195.130.246.72 on Port 445(SMB)
2019-07-25 15:27:09
87.120.240.214 attack
:
2019-07-25 16:08:23
185.211.245.198 attack
Jul 25 09:16:14 relay postfix/smtpd\[28634\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 25 09:16:23 relay postfix/smtpd\[28619\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 25 09:22:19 relay postfix/smtpd\[28634\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 25 09:22:32 relay postfix/smtpd\[32276\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 25 09:26:58 relay postfix/smtpd\[28634\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-07-25 15:28:36
51.255.71.7 attackbotsspam
2019-07-25 09:03:13,375 fail2ban.actions        [16526]: NOTICE  [portsentry] Ban 51.255.71.7
...
2019-07-25 16:26:30
112.78.147.10 attackspambots
Unauthorized connection attempt from IP address 112.78.147.10 on Port 445(SMB)
2019-07-25 15:58:38
162.193.139.240 attack
Jul 25 03:16:07 plusreed sshd[16282]: Invalid user shekhar from 162.193.139.240
...
2019-07-25 15:33:46
51.68.198.119 attackbots
Jul 25 07:29:58 animalibera sshd[28167]: Invalid user dave from 51.68.198.119 port 39132
...
2019-07-25 15:35:47
200.92.215.34 attackspambots
Unauthorized connection attempt from IP address 200.92.215.34 on Port 445(SMB)
2019-07-25 15:42:19
118.25.61.152 attackbots
Jul 25 09:57:21 SilenceServices sshd[29318]: Failed password for root from 118.25.61.152 port 60382 ssh2
Jul 25 10:02:07 SilenceServices sshd[403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.61.152
Jul 25 10:02:09 SilenceServices sshd[403]: Failed password for invalid user temp from 118.25.61.152 port 35918 ssh2
2019-07-25 16:11:36
172.104.116.36 attackbots
" "
2019-07-25 16:16:06
176.31.162.82 attack
2019-07-25T09:17:04.537142cavecanem sshd[2553]: Invalid user android from 176.31.162.82 port 41140
2019-07-25T09:17:04.540671cavecanem sshd[2553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.162.82
2019-07-25T09:17:04.537142cavecanem sshd[2553]: Invalid user android from 176.31.162.82 port 41140
2019-07-25T09:17:06.848278cavecanem sshd[2553]: Failed password for invalid user android from 176.31.162.82 port 41140 ssh2
2019-07-25T09:21:10.987816cavecanem sshd[8356]: Invalid user manage from 176.31.162.82 port 34066
2019-07-25T09:21:10.991954cavecanem sshd[8356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.162.82
2019-07-25T09:21:10.987816cavecanem sshd[8356]: Invalid user manage from 176.31.162.82 port 34066
2019-07-25T09:21:13.404630cavecanem sshd[8356]: Failed password for invalid user manage from 176.31.162.82 port 34066 ssh2
2019-07-25T09:25:11.721076cavecanem sshd[13707]: Invalid us
...
2019-07-25 15:27:40
207.154.209.159 attack
Jul 25 10:17:48 OPSO sshd\[6671\]: Invalid user lincoln from 207.154.209.159 port 52892
Jul 25 10:17:48 OPSO sshd\[6671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.209.159
Jul 25 10:17:50 OPSO sshd\[6671\]: Failed password for invalid user lincoln from 207.154.209.159 port 52892 ssh2
Jul 25 10:21:51 OPSO sshd\[7467\]: Invalid user test from 207.154.209.159 port 48344
Jul 25 10:21:51 OPSO sshd\[7467\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.209.159
2019-07-25 16:23:23
54.36.149.29 attackbotsspam
Automatic report - Banned IP Access
2019-07-25 16:24:56
59.63.203.152 attack
Unauthorized connection attempt from IP address 59.63.203.152 on Port 445(SMB)
2019-07-25 15:52:05
103.52.52.22 attackbots
Jul 25 06:07:26 mail sshd\[9420\]: Invalid user poliana from 103.52.52.22\
Jul 25 06:07:28 mail sshd\[9420\]: Failed password for invalid user poliana from 103.52.52.22 port 47087 ssh2\
Jul 25 06:12:24 mail sshd\[9491\]: Invalid user joana from 103.52.52.22\
Jul 25 06:12:25 mail sshd\[9491\]: Failed password for invalid user joana from 103.52.52.22 port 42024 ssh2\
Jul 25 06:17:11 mail sshd\[9513\]: Invalid user www from 103.52.52.22\
Jul 25 06:17:13 mail sshd\[9513\]: Failed password for invalid user www from 103.52.52.22 port 36964 ssh2\
2019-07-25 16:26:59

最近上报的IP列表

48.210.11.197 39.191.209.32 20.64.106.222 101.36.118.228
125.122.33.93 36.41.65.209 36.41.64.81 113.141.84.149
162.216.149.223 20.29.8.147 207.167.64.10 8.219.231.66
8.219.246.23 10.30.9.188 3.252.240.65 1.0.252.79
87.120.191.104 18.201.138.116 110.45.57.215 105.253.69.54