必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): China Unicom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '113.224.0.0 - 113.239.255.255'

% Abuse contact for '113.224.0.0 - 113.239.255.255' is 'zhaoyz3@chinaunicom.cn'

inetnum:        113.224.0.0 - 113.239.255.255
netname:        UNICOM-LN
descr:          China Unicom Liaoning province network
descr:          China Unicom
country:        CN
admin-c:        CH1302-AP
tech-c:         GZ84-AP
abuse-c:        AC1718-AP
status:         ALLOCATED PORTABLE
remarks:        service provider
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CNCGROUP
mnt-lower:      MAINT-CNCGROUP-LN
mnt-routes:     MAINT-CNCGROUP-RR
mnt-irt:        IRT-CU-CN
last-modified:  2025-01-22T13:20:44Z
source:         APNIC

irt:            IRT-CU-CN
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
e-mail:         zhaoyz3@chinaunicom.cn
abuse-mailbox:  zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
auth:           # Filtered
remarks:        zhaoyz3@chinaunicom.cn was validated on 2025-10-17
mnt-by:         MAINT-CNCGROUP
last-modified:  2025-10-17T02:26:26Z
source:         APNIC

role:           ABUSE CUCN
country:        ZZ
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
phone:          +000000000
e-mail:         zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
nic-hdl:        AC1718-AP
remarks:        Generated from irt object IRT-CU-CN
remarks:        zhaoyz3@chinaunicom.cn was validated on 2025-10-17
abuse-mailbox:  zhaoyz3@chinaunicom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-10-17T02:26:56Z
source:         APNIC

person:         ChinaUnicom Hostmaster
nic-hdl:        CH1302-AP
e-mail:         hqs-ipabuse@chinaunicom.cn
address:        No.21,Jin-Rong Street
address:        Beijing,100033
address:        P.R.China
phone:          +86-10-66259764
fax-no:         +86-10-66259764
country:        CN
mnt-by:         MAINT-CNCGROUP
last-modified:  2017-08-17T06:13:16Z
source:         APNIC

person:         Guangyu Zhan
nic-hdl:        GZ84-AP
e-mail:         hqs-ipabuse@chinaunicom.cn
address:        DATA Communication Bureau of Liaoning Province,China
address:        38 Lianhe Road,Dadong District Shenyang 110044,China
phone:          +86-24-22800809
fax-no:         +86-24-22800077
country:        CN
mnt-by:         MAINT-CNCGROUP-LN
last-modified:  2017-08-17T06:16:09Z
source:         APNIC

% Information related to '113.224.0.0/12AS4837'

route:          113.224.0.0/12
descr:          CNC Group CHINA169 Liaoning Province Network
country:        CN
origin:         AS4837
mnt-by:         MAINT-CNCGROUP-RR
last-modified:  2008-12-10T02:05:32Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.231.174.209
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51133
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.231.174.209.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025102401 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 25 08:43:39 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 209.174.231.113.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 209.174.231.113.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
187.74.210.118 attack
Dec 18 01:55:46 [host] sshd[15122]: Invalid user singrod from 187.74.210.118
Dec 18 01:55:46 [host] sshd[15122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.74.210.118
Dec 18 01:55:48 [host] sshd[15122]: Failed password for invalid user singrod from 187.74.210.118 port 42454 ssh2
2019-12-18 09:00:09
124.30.44.214 attack
Dec 18 02:33:42 sauna sshd[5317]: Failed password for root from 124.30.44.214 port 61869 ssh2
Dec 18 02:40:08 sauna sshd[5612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.30.44.214
...
2019-12-18 09:03:45
111.132.5.27 attackbotsspam
Dec 18 01:49:26 debian-2gb-nbg1-2 kernel: \[282942.973455\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=111.132.5.27 DST=195.201.40.59 LEN=60 TOS=0x04 PREC=0x00 TTL=44 ID=7195 DF PROTO=TCP SPT=42270 DPT=8088 WINDOW=29200 RES=0x00 SYN URGP=0
2019-12-18 08:56:47
190.117.62.241 attackspambots
Dec 18 02:00:10 mail sshd[27260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.117.62.241 
Dec 18 02:00:11 mail sshd[27260]: Failed password for invalid user ouyang from 190.117.62.241 port 49354 ssh2
Dec 18 02:06:38 mail sshd[28336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.117.62.241
2019-12-18 09:20:55
209.141.62.184 attackbots
$f2bV_matches
2019-12-18 08:48:43
104.36.149.205 attack
Dec 17 14:43:53 web9 sshd\[31410\]: Invalid user eggi from 104.36.149.205
Dec 17 14:43:53 web9 sshd\[31410\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.36.149.205
Dec 17 14:43:55 web9 sshd\[31410\]: Failed password for invalid user eggi from 104.36.149.205 port 40738 ssh2
Dec 17 14:49:35 web9 sshd\[32288\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.36.149.205  user=root
Dec 17 14:49:38 web9 sshd\[32288\]: Failed password for root from 104.36.149.205 port 50758 ssh2
2019-12-18 09:04:37
167.99.183.65 attackspambots
Dec 18 01:29:01 sso sshd[17804]: Failed password for mysql from 167.99.183.65 port 54084 ssh2
...
2019-12-18 09:21:17
118.114.237.85 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-18 08:45:44
103.98.176.248 attack
$f2bV_matches
2019-12-18 09:08:46
128.199.154.60 attackspambots
Dec 17 14:25:20 php1 sshd\[10313\]: Invalid user lobello from 128.199.154.60
Dec 17 14:25:20 php1 sshd\[10313\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.154.60
Dec 17 14:25:23 php1 sshd\[10313\]: Failed password for invalid user lobello from 128.199.154.60 port 53478 ssh2
Dec 17 14:32:18 php1 sshd\[11076\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.154.60  user=root
Dec 17 14:32:20 php1 sshd\[11076\]: Failed password for root from 128.199.154.60 port 59896 ssh2
2019-12-18 08:53:11
81.92.149.58 attackbotsspam
Dec 18 01:15:57 nextcloud sshd\[19132\]: Invalid user eu from 81.92.149.58
Dec 18 01:15:57 nextcloud sshd\[19132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.92.149.58
Dec 18 01:15:59 nextcloud sshd\[19132\]: Failed password for invalid user eu from 81.92.149.58 port 40623 ssh2
...
2019-12-18 08:50:53
115.159.185.71 attackbots
Dec 17 14:36:14 web9 sshd\[30138\]: Invalid user ragndi from 115.159.185.71
Dec 17 14:36:14 web9 sshd\[30138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.185.71
Dec 17 14:36:16 web9 sshd\[30138\]: Failed password for invalid user ragndi from 115.159.185.71 port 50604 ssh2
Dec 17 14:42:28 web9 sshd\[31138\]: Invalid user test from 115.159.185.71
Dec 17 14:42:28 web9 sshd\[31138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.185.71
2019-12-18 09:04:08
142.93.15.179 attackspam
Dec 18 01:04:08 minden010 sshd[17511]: Failed password for backup from 142.93.15.179 port 47246 ssh2
Dec 18 01:08:39 minden010 sshd[19738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.15.179
Dec 18 01:08:41 minden010 sshd[19738]: Failed password for invalid user gongwer from 142.93.15.179 port 52044 ssh2
...
2019-12-18 08:42:55
106.13.78.218 attackspambots
Dec 17 14:25:49 web9 sshd\[28505\]: Invalid user test from 106.13.78.218
Dec 17 14:25:49 web9 sshd\[28505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.78.218
Dec 17 14:25:50 web9 sshd\[28505\]: Failed password for invalid user test from 106.13.78.218 port 42824 ssh2
Dec 17 14:33:37 web9 sshd\[29687\]: Invalid user deicher from 106.13.78.218
Dec 17 14:33:37 web9 sshd\[29687\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.78.218
2019-12-18 08:36:12
222.127.30.130 attackbots
Dec 18 02:12:25 mail sshd[29148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.127.30.130 
Dec 18 02:12:27 mail sshd[29148]: Failed password for invalid user password from 222.127.30.130 port 11407 ssh2
Dec 18 02:19:34 mail sshd[30141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.127.30.130
2019-12-18 09:20:40

最近上报的IP列表

101.30.81.84 59.82.135.238 171.111.166.137 45.55.64.180
162.216.149.221 198.235.24.238 113.215.188.14 171.10.70.116
60.222.140.234 116.113.0.55 115.60.164.78 115.56.116.150
111.85.129.250 52.178.223.71 42.239.181.72 27.205.67.214
182.91.200.180 144.126.159.64 120.85.40.90 118.212.85.242