必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Hong Kong

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
117.48.193.118 attackbots
2020-01-11 dovecot_login authenticator failed for \(**REMOVED**\) \[117.48.193.118\]: 535 Incorrect authentication data \(set_id=nologin\)
2020-01-11 dovecot_login authenticator failed for \(**REMOVED**\) \[117.48.193.118\]: 535 Incorrect authentication data \(set_id=sales@**REMOVED**\)
2020-01-11 dovecot_login authenticator failed for \(**REMOVED**\) \[117.48.193.118\]: 535 Incorrect authentication data \(set_id=sales\)
2020-01-11 20:46:33
117.48.193.118 attackspam
2020-01-08 dovecot_login authenticator failed for \(**REMOVED**\) \[117.48.193.118\]: 535 Incorrect authentication data \(set_id=nologin\)
2020-01-08 dovecot_login authenticator failed for \(**REMOVED**\) \[117.48.193.118\]: 535 Incorrect authentication data \(set_id=contact@**REMOVED**\)
2020-01-08 dovecot_login authenticator failed for \(**REMOVED**\) \[117.48.193.118\]: 535 Incorrect authentication data \(set_id=contact\)
2020-01-09 05:01:17
117.48.193.118 attackbots
2019-12-30T06:30:15.690668beta postfix/smtpd[11703]: warning: unknown[117.48.193.118]: SASL LOGIN authentication failed: authentication failure
2019-12-30T06:30:19.845757beta postfix/smtpd[11703]: warning: unknown[117.48.193.118]: SASL LOGIN authentication failed: authentication failure
2019-12-30T06:30:24.406861beta postfix/smtpd[11703]: warning: unknown[117.48.193.118]: SASL LOGIN authentication failed: authentication failure
...
2019-12-30 15:15:28
117.48.193.118 attackbotsspam
Dec 28 01:25:11 web1 postfix/smtpd[21791]: warning: unknown[117.48.193.118]: SASL LOGIN authentication failed: authentication failure
...
2019-12-28 18:14:17
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '117.48.192.0 - 117.48.255.255'

% Abuse contact for '117.48.192.0 - 117.48.255.255' is 'ipas@cnnic.cn'

inetnum:        117.48.192.0 - 117.48.255.255
netname:        CloudVsp
descr:          CloudVsp.Inc
country:        CN
admin-c:        HL2919-AP
tech-c:         HL2919-AP
abuse-c:        AC1601-AP
status:         ALLOCATED PORTABLE
mnt-by:         MAINT-CNNIC-AP
mnt-irt:        IRT-CNNIC-CN
last-modified:  2021-11-24T23:57:39Z
source:         APNIC

irt:            IRT-CNNIC-CN
address:        Beijing, China
e-mail:         ipas@cnnic.cn
abuse-mailbox:  ipas@cnnic.cn
admin-c:        IP50-AP
tech-c:         IP50-AP
auth:           # Filtered
remarks:        Please note that CNNIC is not an ISP and is not
remarks:        empowered to investigate complaints of network abuse.
remarks:        Please contact the tech-c or admin-c of the network.
remarks:        ipas@cnnic.cn is invalid
mnt-by:         MAINT-CNNIC-AP
last-modified:  2025-11-17T23:08:37Z
source:         APNIC

role:           ABUSE CNNICCN
country:        ZZ
address:        Beijing, China
phone:          +000000000
e-mail:         ipas@cnnic.cn
admin-c:        IP50-AP
tech-c:         IP50-AP
nic-hdl:        AC1601-AP
remarks:        Generated from irt object IRT-CNNIC-CN
remarks:        ipas@cnnic.cn is invalid
abuse-mailbox:  ipas@cnnic.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-19T17:20:32Z
source:         APNIC

person:         Huakun Li
nic-hdl:        HL2919-AP
e-mail:         lihuakun@cloudvsp.com
address:        NO.18 Building University of Technology
address:        Beijing Economic-Technological Development Area
phone:          +86-18101125590
fax-no:         +86-10-87529719
country:        CN
mnt-by:         MAINT-CNNIC-AP
last-modified:  2014-04-21T01:48:01Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.48.193.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7681
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.48.193.133.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026020302 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 04 10:16:23 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 133.193.48.117.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 133.193.48.117.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
141.8.183.90 attack
[Mon Mar 23 22:45:10.601907 2020] [:error] [pid 25293:tid 140519768332032] [client 141.8.183.90:39169] [client 141.8.183.90] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "103.27.207.197"] [uri "/"] [unique_id "XnjZhrdSec56q6n39A6CPwAAAqM"]
...
2020-03-24 03:58:58
71.62.129.30 attackbotsspam
DATE:2020-03-23 19:40:34, IP:71.62.129.30, PORT:ssh SSH brute force auth (docker-dc)
2020-03-24 04:09:49
27.115.15.8 attack
2020-03-23T17:08:33.739671  sshd[21444]: Invalid user info from 27.115.15.8 port 49806
2020-03-23T17:08:33.752838  sshd[21444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.115.15.8
2020-03-23T17:08:33.739671  sshd[21444]: Invalid user info from 27.115.15.8 port 49806
2020-03-23T17:08:35.608329  sshd[21444]: Failed password for invalid user info from 27.115.15.8 port 49806 ssh2
...
2020-03-24 03:44:14
183.83.68.65 attackspam
Unauthorized connection attempt from IP address 183.83.68.65 on Port 445(SMB)
2020-03-24 03:41:33
106.54.48.29 attackspam
[ssh] SSH attack
2020-03-24 04:04:31
186.94.73.69 attackbots
Unauthorized connection attempt from IP address 186.94.73.69 on Port 445(SMB)
2020-03-24 03:54:55
94.23.58.228 attackspambots
SSH Brute Force
2020-03-24 04:08:51
178.128.168.87 attackspambots
Mar 23 15:48:52 ny01 sshd[5874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.168.87
Mar 23 15:48:54 ny01 sshd[5874]: Failed password for invalid user jk from 178.128.168.87 port 53072 ssh2
Mar 23 15:51:56 ny01 sshd[7116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.168.87
2020-03-24 04:02:01
167.60.88.133 attackspambots
Automatic report - Port Scan Attack
2020-03-24 03:43:05
27.150.169.223 attackspambots
Mar 23 20:59:43 ArkNodeAT sshd\[19330\]: Invalid user ben from 27.150.169.223
Mar 23 20:59:43 ArkNodeAT sshd\[19330\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.150.169.223
Mar 23 20:59:46 ArkNodeAT sshd\[19330\]: Failed password for invalid user ben from 27.150.169.223 port 41386 ssh2
2020-03-24 04:05:23
45.125.65.42 attack
Mar 23 20:42:43 srv01 postfix/smtpd\[15497\]: warning: unknown\[45.125.65.42\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 23 20:44:28 srv01 postfix/smtpd\[15497\]: warning: unknown\[45.125.65.42\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 23 20:45:03 srv01 postfix/smtpd\[18106\]: warning: unknown\[45.125.65.42\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 23 20:45:21 srv01 postfix/smtpd\[15497\]: warning: unknown\[45.125.65.42\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 23 20:59:50 srv01 postfix/smtpd\[15497\]: warning: unknown\[45.125.65.42\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-03-24 04:14:15
175.24.36.114 attackspam
Mar 23 20:36:18 h2779839 sshd[10635]: Invalid user sinusbot from 175.24.36.114 port 47762
Mar 23 20:36:18 h2779839 sshd[10635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.36.114
Mar 23 20:36:18 h2779839 sshd[10635]: Invalid user sinusbot from 175.24.36.114 port 47762
Mar 23 20:36:20 h2779839 sshd[10635]: Failed password for invalid user sinusbot from 175.24.36.114 port 47762 ssh2
Mar 23 20:42:27 h2779839 sshd[10832]: Invalid user tighe from 175.24.36.114 port 43484
Mar 23 20:42:27 h2779839 sshd[10832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.36.114
Mar 23 20:42:27 h2779839 sshd[10832]: Invalid user tighe from 175.24.36.114 port 43484
Mar 23 20:42:29 h2779839 sshd[10832]: Failed password for invalid user tighe from 175.24.36.114 port 43484 ssh2
Mar 23 20:45:00 h2779839 sshd[10885]: Invalid user dc from 175.24.36.114 port 44786
...
2020-03-24 03:47:45
142.129.152.171 attackspam
Automatic report - Port Scan Attack
2020-03-24 03:57:31
123.192.82.27 attackbots
Unauthorized connection attempt from IP address 123.192.82.27 on Port 445(SMB)
2020-03-24 03:56:48
128.199.239.8 attackbotsspam
Unauthorized connection attempt from IP address 128.199.239.8 on Port 445(SMB)
2020-03-24 04:03:01

最近上报的IP列表

54.227.131.131 174.138.20.6 207.6.29.167 104.248.187.215
204.48.31.188 74.249.177.184 35.149.183.157 134.122.68.94
35.149.183.143 69.5.7.169 10.188.33.52 182.141.248.78
254.238.255.201 20.169.106.8 18.139.175.6 91.230.168.102
195.184.76.144 157.48.194.106 116.76.38.239 35.203.211.14