必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '113.62.0.0 - 113.63.255.255'

% Abuse contact for '113.62.0.0 - 113.63.255.255' is 'anti-spam@chinatelecom.cn'

inetnum:        113.62.0.0 - 113.63.255.255
netname:        CHINANET-XZ
descr:          CHINANET XIZANG PROVINCE NETWORK
descr:          Tibet Telecom
descr:          China Telecom
country:        CN
admin-c:        CH93-AP
tech-c:         LT113-AP
abuse-c:        AC1573-AP
status:         ALLOCATED PORTABLE
remarks:        service provider
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
notify:         deximd@163.com
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CHINANET-XZ
mnt-routes:     MAINT-CHINANET-XZ
mnt-irt:        IRT-CHINANET-CN
last-modified:  2021-06-15T08:04:52Z
source:         APNIC

irt:            IRT-CHINANET-CN
address:        No.31 ,jingrong street,beijing
address:        100032
e-mail:         anti-spam@chinatelecom.cn
abuse-mailbox:  anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
auth:           # Filtered
remarks:        anti-spam@chinatelecom.cn was validated on 2025-11-13
mnt-by:         MAINT-CHINANET
last-modified:  2025-11-18T00:26:23Z
source:         APNIC

role:           ABUSE CHINANETCN
country:        ZZ
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +000000000
e-mail:         anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
nic-hdl:        AC1573-AP
remarks:        Generated from irt object IRT-CHINANET-CN
remarks:        anti-spam@chinatelecom.cn was validated on 2025-11-13
abuse-mailbox:  anti-spam@chinatelecom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-11-13T14:15:15Z
source:         APNIC

person:         Chinanet Hostmaster
nic-hdl:        CH93-AP
e-mail:         anti-spam@chinatelecom.cn
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +86-10-58501724
fax-no:         +86-10-58501724
country:        CN
mnt-by:         MAINT-CHINANET
last-modified:  2022-02-28T06:53:44Z
source:         APNIC

person:         LHASH Tibet-chinanet
address:        NO.59  ,XIZANG LASA ,BEIJING  STREET
country:        CN
phone:          +86-0891-6812990
fax-no:         +86-0891-6812991
e-mail:         jiangst@163.com
nic-hdl:        LT113-AP
mnt-by:         MAINT-CHINANET-XZ
last-modified:  2009-09-01T09:18:07Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.63.34.90
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13982
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.63.34.90.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026013100 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 31 20:57:14 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
Host 90.34.63.113.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 90.34.63.113.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
64.64.247.147 attackbots
2020-04-29T14:30:44.644206mail.thespaminator.com sshd[2846]: Invalid user deploy from 64.64.247.147 port 51304
2020-04-29T14:30:46.644688mail.thespaminator.com sshd[2846]: Failed password for invalid user deploy from 64.64.247.147 port 51304 ssh2
...
2020-04-30 02:32:43
180.89.58.27 attack
$f2bV_matches
2020-04-30 02:00:28
106.12.192.204 attack
Failed password for root from 106.12.192.204 port 49816 ssh2
2020-04-30 02:12:04
221.165.252.143 attackspam
Invalid user testing from 221.165.252.143 port 48464
2020-04-30 01:54:21
178.128.121.180 attack
Apr 29 13:54:40 ip-172-31-62-245 sshd\[1865\]: Invalid user tibi from 178.128.121.180\
Apr 29 13:54:42 ip-172-31-62-245 sshd\[1865\]: Failed password for invalid user tibi from 178.128.121.180 port 60840 ssh2\
Apr 29 13:57:07 ip-172-31-62-245 sshd\[1888\]: Invalid user yun from 178.128.121.180\
Apr 29 13:57:08 ip-172-31-62-245 sshd\[1888\]: Failed password for invalid user yun from 178.128.121.180 port 39148 ssh2\
Apr 29 13:59:42 ip-172-31-62-245 sshd\[1907\]: Invalid user original from 178.128.121.180\
2020-04-30 02:01:01
68.228.98.246 attack
Invalid user test1 from 68.228.98.246 port 40992
2020-04-30 02:15:28
176.31.250.160 attackbotsspam
SSH auth scanning - multiple failed logins
2020-04-30 02:31:15
106.13.123.73 attackbots
Failed password for postgres from 106.13.123.73 port 33236 ssh2
2020-04-30 02:11:39
49.233.169.58 attackspam
Invalid user cunt from 49.233.169.58 port 25096
2020-04-30 02:33:31
134.209.242.156 attackbots
Invalid user rt from 134.209.242.156 port 56448
2020-04-30 02:06:35
196.29.238.8 attackspambots
Invalid user adam from 196.29.238.8 port 57108
2020-04-30 01:56:09
27.76.106.0 attack
Invalid user admin from 27.76.106.0 port 58956
2020-04-30 02:28:36
182.52.52.2 attackbots
Invalid user noc from 182.52.52.2 port 63003
2020-04-30 01:59:19
202.43.167.234 attackbotsspam
2020-04-29T17:04:43.478602abusebot-2.cloudsearch.cf sshd[3998]: Invalid user nilesh from 202.43.167.234 port 41072
2020-04-29T17:04:43.485083abusebot-2.cloudsearch.cf sshd[3998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.43.167.234
2020-04-29T17:04:43.478602abusebot-2.cloudsearch.cf sshd[3998]: Invalid user nilesh from 202.43.167.234 port 41072
2020-04-29T17:04:45.615623abusebot-2.cloudsearch.cf sshd[3998]: Failed password for invalid user nilesh from 202.43.167.234 port 41072 ssh2
2020-04-29T17:09:07.155744abusebot-2.cloudsearch.cf sshd[4067]: Invalid user support from 202.43.167.234 port 46264
2020-04-29T17:09:07.163044abusebot-2.cloudsearch.cf sshd[4067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.43.167.234
2020-04-29T17:09:07.155744abusebot-2.cloudsearch.cf sshd[4067]: Invalid user support from 202.43.167.234 port 46264
2020-04-29T17:09:09.203177abusebot-2.cloudsearch.cf sshd[4067]: 
...
2020-04-30 01:55:48
27.71.227.197 attackbots
Invalid user um from 27.71.227.197 port 59012
2020-04-30 02:22:26

最近上报的IP列表

167.172.177.68 165.232.125.139 164.92.174.223 66.249.77.97
184.73.104.41 156.238.226.251 47.92.241.103 20.64.105.242
110.19.100.45 39.99.132.30 39.98.108.112 104.200.30.32
182.107.120.233 47.92.199.86 140.235.143.101 43.142.37.59
1.161.34.126 165.245.178.22 217.154.23.3 123.58.10.198