必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Shanghai

省份(region): Shanghai

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '114.80.0.0 - 114.95.255.255'

% Abuse contact for '114.80.0.0 - 114.95.255.255' is 'anti-spam@chinatelecom.cn'

inetnum:        114.80.0.0 - 114.95.255.255
netname:        CHINANET-SH
descr:          CHINANET SHANGHAI PROVINCE NETWORK
descr:          China Telecom
descr:          No.31,jingrong street
descr:          Beijing 100032
country:        CN
admin-c:        WWQ4-AP
tech-c:         WWQ4-AP
abuse-c:        AC1573-AP
status:         ALLOCATED PORTABLE
remarks:        service provider
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CHINANET
mnt-lower:      MAINT-CHINANET-SH
mnt-irt:        IRT-CHINANET-CN
last-modified:  2021-06-15T08:05:34Z
source:         APNIC

irt:            IRT-CHINANET-CN
address:        No.31 ,jingrong street,beijing
address:        100032
e-mail:         anti-spam@chinatelecom.cn
abuse-mailbox:  anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
auth:           # Filtered
remarks:        anti-spam@chinatelecom.cn was validated on 2025-11-13
mnt-by:         MAINT-CHINANET
last-modified:  2026-03-13T07:12:20Z
source:         APNIC

role:           ABUSE CHINANETCN
country:        ZZ
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +000000000
e-mail:         anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
nic-hdl:        AC1573-AP
remarks:        Generated from irt object IRT-CHINANET-CN
remarks:        anti-spam@chinatelecom.cn was validated on 2025-11-13
abuse-mailbox:  anti-spam@chinatelecom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-11-13T14:15:15Z
source:         APNIC

person:         Weng Wen Qian
address:        Room 2405,357 Songlin Road,Shanghai 200122
country:        CN
phone:          +86-21-68405784
fax-no:         +86-21-50623458
e-mail:         shizhiming.sh@chinatelecom.cn
nic-hdl:        WWQ4-AP
mnt-by:         MAINT-CHINANET-SH
last-modified:  2023-02-07T08:25:17Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.88.4.253
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49613
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.88.4.253.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032302 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 24 09:47:53 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
Host 253.4.88.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 253.4.88.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
123.180.60.235 attackspambots
Sep  3 17:32:18 nirvana postfix/smtpd[31178]: connect from unknown[123.180.60.235]
Sep  3 17:32:18 nirvana postfix/smtpd[31178]: lost connection after EHLO from unknown[123.180.60.235]
Sep  3 17:32:18 nirvana postfix/smtpd[31178]: disconnect from unknown[123.180.60.235]
Sep  3 17:35:46 nirvana postfix/smtpd[24554]: connect from unknown[123.180.60.235]
Sep  3 17:35:46 nirvana postfix/smtpd[24554]: lost connection after CONNECT from unknown[123.180.60.235]
Sep  3 17:35:46 nirvana postfix/smtpd[24554]: disconnect from unknown[123.180.60.235]
Sep  3 17:39:15 nirvana postfix/smtpd[25407]: connect from unknown[123.180.60.235]
Sep  3 17:39:15 nirvana postfix/smtpd[25407]: warning: unknown[123.180.60.235]: SASL LOGIN authentication failed: authentication failure
Sep  3 17:39:17 nirvana postfix/smtpd[25407]: warning: unknown[123.180.60.235]: SASL LOGIN authentication failed: authentication failure
Sep  3 17:39:19 nirvana postfix/smtpd[25407]: warning: unknown[123.180.60.235]: SA........
-------------------------------
2020-09-04 19:45:58
119.28.221.132 attackspam
$f2bV_matches
2020-09-04 19:45:31
174.217.9.21 attackbotsspam
Brute forcing email accounts
2020-09-04 19:55:36
45.142.120.93 attackbots
2020-09-04 14:58:50 dovecot_login authenticator failed for \(User\) \[45.142.120.93\]: 535 Incorrect authentication data \(set_id=uu@org.ua\)2020-09-04 14:59:25 dovecot_login authenticator failed for \(User\) \[45.142.120.93\]: 535 Incorrect authentication data \(set_id=trips@org.ua\)2020-09-04 15:00:02 dovecot_login authenticator failed for \(User\) \[45.142.120.93\]: 535 Incorrect authentication data \(set_id=isajax@org.ua\)
...
2020-09-04 20:00:37
207.180.196.207 attackspambots
[portscan] tcp/22 [SSH]
in blocklist.de:'listed [ssh]'
*(RWIN=65535)(09040932)
2020-09-04 20:13:49
109.227.63.3 attackspam
Sep  4 13:37:56 eventyay sshd[2475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.227.63.3
Sep  4 13:37:58 eventyay sshd[2475]: Failed password for invalid user chungheon from 109.227.63.3 port 49284 ssh2
Sep  4 13:42:03 eventyay sshd[2606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.227.63.3
...
2020-09-04 19:52:28
84.17.47.110 attackspam
(From turbomavro@gmail.com) The leader in short-term investing in the cryptocurrency market.   
The leader in payments for the affiliate program.   
 
 
Investment program: 
 
Investment currency: BTC. 
The investment period is 2 days. 
Minimum profit is 10% 
 
Registration here:  https://bit.ly/3gr3l6q     
 
Get + 10% every 2 days to your personal Bitcoin wallet in addition to your balance. 
 
For example: invest 0.1 bitcoins today, in 2 days you will receive 0.11 bitcoins in your personal bitcoin wallet. 
 
 
The best affiliate program - a real find for MLM agents   
 
5% for the referral of the first level (direct registration) 
3% for the referral of the second level 
1% for the referral of the third level 
 
Referral bonuses are paid the next day after the referral donation. 
The bonus goes to your BTC address the day after the novice's donation. 
Any reinvestment of participants, the leader receives a full bonus! 
 
Registration here:  https://bit.ly/3gr3l6q
2020-09-04 20:01:25
139.99.219.208 attackspambots
Invalid user wanglj from 139.99.219.208 port 58809
2020-09-04 19:45:06
142.4.4.229 attackspambots
142.4.4.229 - - \[04/Sep/2020:13:59:58 +0200\] "POST /wp-login.php HTTP/1.1" 200 12843 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
142.4.4.229 - - \[04/Sep/2020:14:00:05 +0200\] "POST /wp-login.php HTTP/1.1" 200 12712 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2020-09-04 20:11:31
23.129.64.197 attackspam
SSH brutforce
2020-09-04 20:18:23
122.118.114.118 attack
Honeypot attack, port: 445, PTR: 122-118-114-118.dynamic-ip.hinet.net.
2020-09-04 19:58:50
87.241.163.224 attack
DATE:2020-09-03 18:41:00, IP:87.241.163.224, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-09-04 20:14:57
172.81.239.252 attackbots
" "
2020-09-04 20:17:10
115.60.56.119 attackbotsspam
port scan and connect, tcp 1433 (ms-sql-s)
2020-09-04 19:54:22
191.242.217.110 attackspambots
Invalid user zj from 191.242.217.110 port 2223
2020-09-04 20:22:41

最近上报的IP列表

103.31.238.120 159.13.39.187 103.6.222.1 103.6.223.1
101.227.69.37 103.20.248.1 103.20.249.1 103.36.132.1
103.36.135.1 168.98.205.133 2606:4700:10::6814:9607 2606:4700:10::6814:7625
2606:4700:10::6814:6016 2606:4700:10::6816:2577 2606:4700:10::ac43:2852 135.250.165.17
12.57.177.62 118.63.230.32 66.102.189.240 74.126.83.120