必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Changzhou

省份(region): Jiangsu

国家(country): China

运营商(isp): China Unicom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '122.192.203.0 - 122.192.203.255'

% Abuse contact for '122.192.203.0 - 122.192.203.255' is 'zhaoyz3@chinaunicom.cn'

inetnum:        122.192.203.0 - 122.192.203.255
netname:        JIANGSUGROUP
country:        CN
descr:          JIANGSU GROUP CO.,NANJING,JIANGSU PROVINCE
admin-c:        LL58-AP
tech-c:         LL58-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-CNCGROUP-JS
last-modified:  2010-10-22T07:38:05Z
source:         APNIC

person:         Lan Li
nic-hdl:        LL58-AP
e-mail:         js-cu-ipmanage@chinaunicom.cn
address:        No. 65 Beijing West Road,Nanjing,China
phone:          +86257900060
fax-no:         +86252900280
country:        CN
mnt-by:         MAINT-NEW
last-modified:  2013-08-15T02:13:11Z
source:         APNIC

% Information related to '122.192.0.0/14AS4837'

route:          122.192.0.0/14
descr:          CNC Group CHINA169 Jiangsu Province Network
country:        CN
origin:         AS4837
mnt-by:         MAINT-CNCGROUP-RR
last-modified:  2008-09-04T07:54:52Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.192.203.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32037
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;122.192.203.45.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026030500 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 05 22:03:47 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 45.203.192.122.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 45.203.192.122.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
46.217.14.42 attack
Unauthorized connection attempt from IP address 46.217.14.42 on Port 445(SMB)
2019-12-10 04:59:56
37.147.42.92 attack
mail auth brute force
2019-12-10 05:16:57
42.157.129.46 attack
Dec  9 21:05:56 hcbbdb sshd\[8037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.157.129.46  user=news
Dec  9 21:05:58 hcbbdb sshd\[8037\]: Failed password for news from 42.157.129.46 port 40414 ssh2
Dec  9 21:11:58 hcbbdb sshd\[8758\]: Invalid user 12345 from 42.157.129.46
Dec  9 21:11:58 hcbbdb sshd\[8758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.157.129.46
Dec  9 21:12:00 hcbbdb sshd\[8758\]: Failed password for invalid user 12345 from 42.157.129.46 port 41156 ssh2
2019-12-10 05:22:55
182.18.194.135 attackspambots
Dec  9 10:54:02 kapalua sshd\[6846\]: Invalid user kuhnz from 182.18.194.135
Dec  9 10:54:02 kapalua sshd\[6846\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=myskynms.skybb.ph
Dec  9 10:54:04 kapalua sshd\[6846\]: Failed password for invalid user kuhnz from 182.18.194.135 port 35546 ssh2
Dec  9 11:01:31 kapalua sshd\[7545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=myskynms.skybb.ph  user=root
Dec  9 11:01:33 kapalua sshd\[7545\]: Failed password for root from 182.18.194.135 port 45044 ssh2
2019-12-10 05:13:15
151.66.46.30 attack
Automatic report - Port Scan Attack
2019-12-10 05:33:27
180.176.110.7 attackspambots
Web Attack: Shenzhen TVT DVR Remote Code Execution
2019-12-10 05:10:34
123.185.202.218 attack
Mon Dec  9 17:00:43 2019 \[pid 17105\] \[lexgold\] FTP response: Client "123.185.202.218", "530 Permission denied."
Mon Dec  9 17:00:48 2019 \[pid 17115\] \[lexgold\] FTP response: Client "123.185.202.218", "530 Permission denied."
Mon Dec  9 17:01:06 2019 \[pid 17201\] \[lexgold\] FTP response: Client "123.185.202.218", "530 Permission denied."
2019-12-10 04:55:38
106.12.112.49 attackbotsspam
Dec  9 20:18:23 localhost sshd\[779\]: Invalid user ying from 106.12.112.49
Dec  9 20:18:23 localhost sshd\[779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.112.49
Dec  9 20:18:25 localhost sshd\[779\]: Failed password for invalid user ying from 106.12.112.49 port 41486 ssh2
Dec  9 20:24:33 localhost sshd\[1085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.112.49  user=root
Dec  9 20:24:34 localhost sshd\[1085\]: Failed password for root from 106.12.112.49 port 48182 ssh2
...
2019-12-10 05:04:12
95.25.55.5 attackbotsspam
Unauthorized connection attempt from IP address 95.25.55.5 on Port 445(SMB)
2019-12-10 05:11:47
149.56.131.73 attackspam
Dec  9 17:31:03 *** sshd[29759]: Failed password for invalid user mirah from 149.56.131.73 port 37444 ssh2
Dec  9 17:40:42 *** sshd[29982]: Failed password for invalid user caruk from 149.56.131.73 port 48042 ssh2
Dec  9 17:46:18 *** sshd[30135]: Failed password for invalid user www from 149.56.131.73 port 57344 ssh2
Dec  9 17:51:24 *** sshd[30201]: Failed password for invalid user kscopy from 149.56.131.73 port 38400 ssh2
Dec  9 17:56:43 *** sshd[30282]: Failed password for invalid user magento from 149.56.131.73 port 47692 ssh2
Dec  9 18:02:08 *** sshd[30399]: Failed password for invalid user z from 149.56.131.73 port 56988 ssh2
Dec  9 18:18:17 *** sshd[30748]: Failed password for invalid user banki from 149.56.131.73 port 56638 ssh2
Dec  9 18:29:09 *** sshd[30993]: Failed password for invalid user za from 149.56.131.73 port 46998 ssh2
Dec  9 18:34:28 *** sshd[31079]: Failed password for invalid user kongshavn from 149.56.131.73 port 56294 ssh2
Dec  9 18:39:57 *** sshd[31214]: Failed password for invalid us
2019-12-10 05:13:43
51.68.231.147 attackspam
Dec  9 21:20:44 MK-Soft-VM3 sshd[15098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.231.147 
Dec  9 21:20:45 MK-Soft-VM3 sshd[15098]: Failed password for invalid user dbus from 51.68.231.147 port 44808 ssh2
...
2019-12-10 05:05:00
188.158.71.43 attack
Unauthorized connection attempt from IP address 188.158.71.43 on Port 445(SMB)
2019-12-10 04:52:48
139.59.169.103 attackspam
2019-12-09T21:06:00.463484abusebot-4.cloudsearch.cf sshd\[6992\]: Invalid user adine from 139.59.169.103 port 42988
2019-12-10 05:19:52
37.120.12.212 attack
Dec  9 08:05:21 eddieflores sshd\[9525\]: Invalid user dn from 37.120.12.212
Dec  9 08:05:21 eddieflores sshd\[9525\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.120.12.212
Dec  9 08:05:23 eddieflores sshd\[9525\]: Failed password for invalid user dn from 37.120.12.212 port 52989 ssh2
Dec  9 08:11:35 eddieflores sshd\[10208\]: Invalid user fr from 37.120.12.212
Dec  9 08:11:35 eddieflores sshd\[10208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.120.12.212
2019-12-10 05:36:09
85.105.73.91 attackspam
Unauthorized connection attempt detected from IP address 85.105.73.91 to port 445
2019-12-10 05:25:18

最近上报的IP列表

2606:4700:10::6814:5963 2606:4700:10::6814:5846 122.192.203.146 2606:4700:10::ac43:2159
2606:4700:10::6816:4655 2606:4700:10::6816:1637 2606:4700:10::ac43:1946 2606:4700:10::6814:9196
121.234.219.115 2606:4700:10::6816:880 110.77.187.86 2606:4700:10::6816:602
2606:4700:10::6814:9292 121.8.28.53 122.193.247.214 2606:4700:10::6816:3472
194.32.149.34 161.215.200.20 121.134.176.124 2606:4700:10::6814:8957