必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '119.38.0.0 - 119.38.127.255'

% Abuse contact for '119.38.0.0 - 119.38.127.255' is 'lhm@srt.com.cn'

inetnum:        119.38.0.0 - 119.38.127.255
netname:        SRT
descr:          Silk Road Technologies co., ltd
descr:          Hangzhou, Zhejiang, P.R.China
country:        CN
admin-c:        LHM26-AP
tech-c:         SRT8-AP
abuse-c:        AC1601-AP
status:         ALLOCATED PORTABLE
mnt-by:         MAINT-CNNIC-AP
mnt-irt:        IRT-SRT-CN
last-modified:  2023-11-28T00:56:59Z
source:         APNIC

irt:            IRT-SRT-CN
address:        Hangzhou, Zhejiang, P.R.China
e-mail:         lhm@srt.com.cn
abuse-mailbox:  lhm@srt.com.cn
admin-c:        PJ324-AP
tech-c:         PJ324-AP
auth:           # Filtered
mnt-by:         MAINT-CNNIC-AP
last-modified:  2025-11-18T00:35:08Z
source:         APNIC

role:           ABUSE CNNICCN
country:        ZZ
address:        Beijing, China
phone:          +000000000
e-mail:         ipas@cnnic.cn
admin-c:        IP50-AP
tech-c:         IP50-AP
nic-hdl:        AC1601-AP
remarks:        Generated from irt object IRT-CNNIC-CN
remarks:        ipas@cnnic.cn is invalid
abuse-mailbox:  ipas@cnnic.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-19T17:20:32Z
source:         APNIC

person:         Lin HuiMing
address:        2 Longtan Road, Cangqian street, Yuhang District, Hangzhou City, Zhejiang Province, 310012,China
country:        CN
phone:          +86-13735810001
e-mail:         lhm@srt.com.cn
nic-hdl:        LHM26-AP
mnt-by:         MAINT-CNNIC-AP
last-modified:  2020-06-15T06:00:03Z
source:         APNIC

person:         Chu Tao
address:        2 Longtan Road, Cangqian street, Yuhang District, Hangzhou City, Zhejiang Province,310012,China
country:        CN
phone:          +86-0-13735810001-78006
e-mail:         support@srt.com.cn
nic-hdl:        SRT8-AP
mnt-by:         MAINT-CNNIC-AP
last-modified:  2024-09-20T05:57:43Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.38.117.228
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27560
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.38.117.228.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026033100 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 31 15:22:37 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 228.117.38.119.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 228.117.38.119.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
74.56.131.113 attack
(sshd) Failed SSH login from 74.56.131.113 (CA/Canada/modemcable113.131-56-74.mc.videotron.ca): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 16 16:13:43 srv sshd[1748]: Invalid user daniel from 74.56.131.113 port 50968
Jun 16 16:13:46 srv sshd[1748]: Failed password for invalid user daniel from 74.56.131.113 port 50968 ssh2
Jun 16 17:01:15 srv sshd[2378]: Invalid user abhinav from 74.56.131.113 port 55006
Jun 16 17:01:17 srv sshd[2378]: Failed password for invalid user abhinav from 74.56.131.113 port 55006 ssh2
Jun 16 17:04:31 srv sshd[2482]: Invalid user zhangyansen from 74.56.131.113 port 55160
2020-06-17 02:56:29
112.17.77.5 attackspambots
(smtpauth) Failed SMTP AUTH login from 112.17.77.5 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-06-16 16:47:55 login authenticator failed for (ADMIN) [112.17.77.5]: 535 Incorrect authentication data (set_id=mail@abidarya.ir)
2020-06-17 02:29:34
167.172.36.232 attack
2020-06-16T12:30:52.952860randservbullet-proofcloud-66.localdomain sshd[22179]: Invalid user eg from 167.172.36.232 port 39440
2020-06-16T12:30:52.957530randservbullet-proofcloud-66.localdomain sshd[22179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.36.232
2020-06-16T12:30:52.952860randservbullet-proofcloud-66.localdomain sshd[22179]: Invalid user eg from 167.172.36.232 port 39440
2020-06-16T12:30:54.727280randservbullet-proofcloud-66.localdomain sshd[22179]: Failed password for invalid user eg from 167.172.36.232 port 39440 ssh2
...
2020-06-17 02:30:24
165.22.48.131 attackspambots
Unauthorized SSH login attempts
2020-06-17 02:34:23
34.75.31.157 attack
The IP address [34.75.31.157] experienced 10 failed attempts when attempting to log into Synology NAS within 5 minutes, and was blocked at Sun Jun  7 22:25:14 2020.
2020-06-17 02:59:15
105.112.112.186 attackspambots
1592309864 - 06/16/2020 14:17:44 Host: 105.112.112.186/105.112.112.186 Port: 445 TCP Blocked
2020-06-17 02:41:35
64.250.163.12 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2020-06-17 02:50:15
43.243.127.148 attackbotsspam
$f2bV_matches
2020-06-17 02:44:10
134.175.124.91 attackbotsspam
Jun 16 20:44:10 webhost01 sshd[21457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.124.91
Jun 16 20:44:13 webhost01 sshd[21457]: Failed password for invalid user vadmin from 134.175.124.91 port 57930 ssh2
...
2020-06-17 02:42:02
112.33.13.124 attackspambots
Aug 14 19:35:25 ms-srv sshd[9235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.33.13.124
Aug 14 19:35:27 ms-srv sshd[9235]: Failed password for invalid user hf from 112.33.13.124 port 54022 ssh2
2020-06-17 02:57:51
125.25.227.105 attackspambots
Port Scan detected!
...
2020-06-17 02:33:01
5.196.75.47 attackbotsspam
Jun 16 19:04:52 mail sshd[2916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.75.47 
Jun 16 19:04:54 mail sshd[2916]: Failed password for invalid user paulo from 5.196.75.47 port 47716 ssh2
...
2020-06-17 02:50:43
49.235.163.198 attackspambots
Jun 16 19:51:38 icinga sshd[59565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.163.198 
Jun 16 19:51:40 icinga sshd[59565]: Failed password for invalid user dwf from 49.235.163.198 port 64978 ssh2
Jun 16 20:05:30 icinga sshd[18861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.163.198 
...
2020-06-17 02:46:43
72.42.170.60 attack
frenzy
2020-06-17 02:28:22
185.137.88.240 attackspambots
Automatic report - Banned IP Access
2020-06-17 02:39:34

最近上报的IP列表

110.10.154.185 139.162.119.94 138.197.87.148 2606:4700:10::6814:5184
2606:4700:10::6814:9754 2606:4700:10::ac43:601 2606:4700:10::6814:9437 2606:4700:10::6816:2002
2606:4700:10::6816:4704 2606:4700:10::6816:3062 2606:4700:10::ac43:1918 110.78.154.148
2606:4700:10::6814:7971 81.109.38.131 95.196.203.250 79.134.196.146
89.139.173.226 21.216.119.102 2606:4700:10::ac43:1004 2606:4700:10::6816:4863