必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
118.239.32.8 attackbotsspam
FTP/21 MH Probe, BF, Hack -
2019-07-10 10:40:50
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '118.239.0.0 - 118.239.255.255'

% Abuse contact for '118.239.0.0 - 118.239.255.255' is 'anti-spam@chinatelecom.cn'

inetnum:        118.239.0.0 - 118.239.255.255
netname:        CHINANET-HN
descr:          CHINANET Hunan province network
descr:          China Telecom
descr:          No.31,jingrong street
descr:          Beijing 100032
country:        CN
admin-c:        CH93-AP
tech-c:         CH636-AP
abuse-c:        AC1573-AP
status:         ALLOCATED PORTABLE
remarks:        service provider
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CHINANET-HN
mnt-routes:     MAINT-CHINANET-HN
mnt-irt:        IRT-CHINANET-CN
last-modified:  2021-06-15T08:05:25Z
source:         APNIC

irt:            IRT-CHINANET-CN
address:        No.31 ,jingrong street,beijing
address:        100032
e-mail:         anti-spam@chinatelecom.cn
abuse-mailbox:  anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
auth:           # Filtered
remarks:        anti-spam@chinatelecom.cn was validated on 2025-11-13
mnt-by:         MAINT-CHINANET
last-modified:  2025-11-18T00:26:23Z
source:         APNIC

role:           ABUSE CHINANETCN
country:        ZZ
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +000000000
e-mail:         anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
nic-hdl:        AC1573-AP
remarks:        Generated from irt object IRT-CHINANET-CN
remarks:        anti-spam@chinatelecom.cn was validated on 2025-11-13
abuse-mailbox:  anti-spam@chinatelecom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-11-13T14:15:15Z
source:         APNIC

role:           CHINANET HUNAN
address:        No.1 TuanJie road,ChangSha,Hunan 410005
country:        CN
phone:          +86 731 4792092
fax-no:         +86 731 4792007
e-mail:         13348615181@189.cn
remarks:        send spam reports to 13348615181@189.cn
remarks:        and abuse reports to 13348615181@189.cn
remarks:        Please include detailed information and
remarks:        times in UTC
admin-c:        CH632-AP
tech-c:         CS499-AP
nic-hdl:        CH636-AP
mnt-by:         MAINT-CHINANET-HN
last-modified:  2020-07-02T13:36:27Z
source:         APNIC

person:         Chinanet Hostmaster
nic-hdl:        CH93-AP
e-mail:         anti-spam@chinatelecom.cn
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +86-10-58501724
fax-no:         +86-10-58501724
country:        CN
mnt-by:         MAINT-CHINANET
last-modified:  2022-02-28T06:53:44Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.239.3.255
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47062
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.239.3.255.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026022000 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 20 19:46:21 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 255.3.239.118.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 255.3.239.118.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
163.172.72.190 attack
SSH Brute-Forcing (ownc)
2019-08-19 10:29:37
164.132.17.232 attackbots
Aug 18 16:14:55 friendsofhawaii sshd\[1624\]: Invalid user git from 164.132.17.232
Aug 18 16:14:55 friendsofhawaii sshd\[1624\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.17.232
Aug 18 16:14:57 friendsofhawaii sshd\[1624\]: Failed password for invalid user git from 164.132.17.232 port 36644 ssh2
Aug 18 16:19:09 friendsofhawaii sshd\[2070\]: Invalid user lucie from 164.132.17.232
Aug 18 16:19:09 friendsofhawaii sshd\[2070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.17.232
2019-08-19 10:25:04
128.199.55.13 attackspam
Aug 19 04:10:41 nextcloud sshd\[8174\]: Invalid user bei from 128.199.55.13
Aug 19 04:10:41 nextcloud sshd\[8174\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.55.13
Aug 19 04:10:43 nextcloud sshd\[8174\]: Failed password for invalid user bei from 128.199.55.13 port 57061 ssh2
...
2019-08-19 10:59:12
159.89.165.36 attack
Aug 19 04:50:35 pkdns2 sshd\[40176\]: Invalid user dev from 159.89.165.36Aug 19 04:50:38 pkdns2 sshd\[40176\]: Failed password for invalid user dev from 159.89.165.36 port 52148 ssh2Aug 19 04:55:27 pkdns2 sshd\[40404\]: Invalid user azureuser from 159.89.165.36Aug 19 04:55:29 pkdns2 sshd\[40404\]: Failed password for invalid user azureuser from 159.89.165.36 port 42112 ssh2Aug 19 05:00:12 pkdns2 sshd\[40641\]: Invalid user mqm from 159.89.165.36Aug 19 05:00:15 pkdns2 sshd\[40641\]: Failed password for invalid user mqm from 159.89.165.36 port 60420 ssh2
...
2019-08-19 10:17:50
124.156.181.66 attackbotsspam
*Port Scan* detected from 124.156.181.66 (HK/Hong Kong/-). 4 hits in the last 100 seconds
2019-08-19 10:48:02
119.146.148.46 attackspambots
Aug 19 05:52:09 server sshd\[10192\]: Invalid user minecraft from 119.146.148.46 port 39012
Aug 19 05:52:09 server sshd\[10192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.146.148.46
Aug 19 05:52:11 server sshd\[10192\]: Failed password for invalid user minecraft from 119.146.148.46 port 39012 ssh2
Aug 19 05:55:12 server sshd\[27223\]: Invalid user project from 119.146.148.46 port 52647
Aug 19 05:55:12 server sshd\[27223\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.146.148.46
2019-08-19 10:56:19
154.66.219.20 attack
Aug 18 22:14:04 TORMINT sshd\[21373\]: Invalid user leila from 154.66.219.20
Aug 18 22:14:04 TORMINT sshd\[21373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.66.219.20
Aug 18 22:14:07 TORMINT sshd\[21373\]: Failed password for invalid user leila from 154.66.219.20 port 49934 ssh2
...
2019-08-19 10:34:51
164.132.225.250 attackbots
Aug 19 00:03:03 mail sshd[31389]: Invalid user xu from 164.132.225.250
Aug 19 00:03:03 mail sshd[31389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.225.250
Aug 19 00:03:03 mail sshd[31389]: Invalid user xu from 164.132.225.250
Aug 19 00:03:06 mail sshd[31389]: Failed password for invalid user xu from 164.132.225.250 port 54360 ssh2
Aug 19 00:17:43 mail sshd[716]: Invalid user dlzhu from 164.132.225.250
...
2019-08-19 10:54:48
109.236.50.215 attackbots
Brute force attempt
2019-08-19 10:35:22
82.202.172.156 attack
Aug 19 03:09:30 legacy sshd[11813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.202.172.156
Aug 19 03:09:32 legacy sshd[11813]: Failed password for invalid user fulton from 82.202.172.156 port 43212 ssh2
Aug 19 03:13:42 legacy sshd[11981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.202.172.156
...
2019-08-19 10:24:08
159.203.82.104 attack
Aug 19 02:13:07 MK-Soft-VM6 sshd\[4599\]: Invalid user samba from 159.203.82.104 port 37661
Aug 19 02:13:07 MK-Soft-VM6 sshd\[4599\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.82.104
Aug 19 02:13:09 MK-Soft-VM6 sshd\[4599\]: Failed password for invalid user samba from 159.203.82.104 port 37661 ssh2
...
2019-08-19 11:03:29
178.182.254.51 attackbots
Automatic report - Banned IP Access
2019-08-19 10:29:17
45.170.73.52 attackspam
Aug 18 18:07:11 Tower sshd[15017]: Connection from 45.170.73.52 port 40135 on 192.168.10.220 port 22
Aug 18 18:07:19 Tower sshd[15017]: Invalid user etherpad from 45.170.73.52 port 40135
Aug 18 18:07:19 Tower sshd[15017]: error: Could not get shadow information for NOUSER
Aug 18 18:07:19 Tower sshd[15017]: Failed password for invalid user etherpad from 45.170.73.52 port 40135 ssh2
Aug 18 18:07:19 Tower sshd[15017]: Received disconnect from 45.170.73.52 port 40135:11: Bye Bye [preauth]
Aug 18 18:07:19 Tower sshd[15017]: Disconnected from invalid user etherpad 45.170.73.52 port 40135 [preauth]
2019-08-19 10:49:50
168.227.12.101 attack
$f2bV_matches
2019-08-19 10:33:25
162.243.151.46 attack
Portscan or hack attempt detected by psad/fwsnort
2019-08-19 10:43:12

最近上报的IP列表

64.82.228.45 45.83.31.38 45.249.245.88 38.248.246.148
168.100.163.190 130.89.144.168 23.225.40.170 40.124.175.39
210.122.210.88 103.48.31.201 49.229.153.18 188.166.217.188
96.44.172.138 172.18.232.122 106.34.19.227 39.98.57.214
47.92.164.63 204.152.198.183 68.183.215.167 175.54.62.225