必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): China Unicom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '123.4.0.0 - 123.7.255.255'

% Abuse contact for '123.4.0.0 - 123.7.255.255' is 'zhaoyz3@chinaunicom.cn'

inetnum:        123.4.0.0 - 123.7.255.255
netname:        UNICOM-HA
descr:          China Unicom Henan province network
descr:          China Unicom
country:        CN
admin-c:        CH1302-AP
tech-c:         WW444-AP
abuse-c:        AC1718-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CNCGROUP-HA
mnt-routes:     MAINT-CNCGROUP-RR
mnt-irt:        IRT-CU-CN
last-modified:  2025-01-22T13:07:33Z
source:         APNIC

irt:            IRT-CU-CN
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
e-mail:         zhaoyz3@chinaunicom.cn
abuse-mailbox:  zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
auth:           # Filtered
remarks:        zhaoyz3@chinaunicom.cn was validated on 2025-10-17
mnt-by:         MAINT-CNCGROUP
last-modified:  2025-11-18T00:26:20Z
source:         APNIC

role:           ABUSE CUCN
country:        ZZ
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
phone:          +000000000
e-mail:         zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
nic-hdl:        AC1718-AP
remarks:        Generated from irt object IRT-CU-CN
remarks:        zhaoyz3@chinaunicom.cn was validated on 2025-10-17
abuse-mailbox:  zhaoyz3@chinaunicom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-10-17T02:26:56Z
source:         APNIC

person:         ChinaUnicom Hostmaster
nic-hdl:        CH1302-AP
e-mail:         hqs-ipabuse@chinaunicom.cn
address:        No.21,Jin-Rong Street
address:        Beijing,100033
address:        P.R.China
phone:          +86-10-66259764
fax-no:         +86-10-66259764
country:        CN
mnt-by:         MAINT-CNCGROUP
last-modified:  2017-08-17T06:13:16Z
source:         APNIC

person:         Wei Wang
nic-hdl:        WW444-AP
e-mail:         abuse@public.zz.ha.cn
address:        #55 San Quan Road, Zhengzhou, Henan Provice
phone:          +86-371-65952358
fax-no:         +86-371-65968952
country:        CN
mnt-by:         MAINT-CNCGROUP-HA
last-modified:  2010-03-05T08:20:01Z
source:         APNIC

% Information related to '123.4.0.0/14AS4837'

route:          123.4.0.0/14
descr:          CNC Group CHINA169 Henan Province Network
country:        CN
origin:         AS4837
mnt-by:         MAINT-CNCGROUP-RR
last-modified:  2008-09-04T07:54:53Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 123.5.98.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44803
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;123.5.98.129.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040703 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 08 10:01:33 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
129.98.5.123.in-addr.arpa domain name pointer hn.kd.ny.adsl.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
129.98.5.123.in-addr.arpa	name = hn.kd.ny.adsl.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
202.46.129.204 attack
C1,WP GET /suche/wp-login.php
2019-10-16 07:31:54
171.6.81.56 attackbotsspam
Oct 15 19:10:34 Tower sshd[34218]: Connection from 171.6.81.56 port 61988 on 192.168.10.220 port 22
Oct 15 19:10:36 Tower sshd[34218]: Failed password for root from 171.6.81.56 port 61988 ssh2
Oct 15 19:10:36 Tower sshd[34218]: Received disconnect from 171.6.81.56 port 61988:11: Bye Bye [preauth]
Oct 15 19:10:36 Tower sshd[34218]: Disconnected from authenticating user root 171.6.81.56 port 61988 [preauth]
2019-10-16 07:48:09
149.28.11.98 attackspambots
SASL broute force
2019-10-16 07:56:38
49.234.28.54 attack
Oct 15 13:43:10 php1 sshd\[29723\]: Invalid user hhhhh from 49.234.28.54
Oct 15 13:43:10 php1 sshd\[29723\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.28.54
Oct 15 13:43:12 php1 sshd\[29723\]: Failed password for invalid user hhhhh from 49.234.28.54 port 35950 ssh2
Oct 15 13:47:48 php1 sshd\[30088\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.28.54  user=root
Oct 15 13:47:50 php1 sshd\[30088\]: Failed password for root from 49.234.28.54 port 46404 ssh2
2019-10-16 07:51:22
27.84.166.140 attack
fail2ban
2019-10-16 07:36:22
81.22.45.190 attackspam
2019-10-16T01:20:17.853461+02:00 lumpi kernel: [1004027.347247] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.190 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=47014 PROTO=TCP SPT=48732 DPT=9327 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-10-16 07:44:57
92.119.160.143 attackbotsspam
Portscan or hack attempt detected by psad/fwsnort
2019-10-16 07:43:02
45.95.55.25 attackspambots
Oct 16 01:05:19 mail sshd[5521]: Invalid user virtual from 45.95.55.25
Oct 16 01:05:19 mail sshd[5521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.95.55.25
Oct 16 01:05:19 mail sshd[5521]: Invalid user virtual from 45.95.55.25
Oct 16 01:05:22 mail sshd[5521]: Failed password for invalid user virtual from 45.95.55.25 port 40552 ssh2
Oct 16 01:13:16 mail sshd[17345]: Invalid user postgres from 45.95.55.25
...
2019-10-16 07:48:27
94.23.70.116 attackbotsspam
Oct 16 00:17:39 Ubuntu-1404-trusty-64-minimal sshd\[16106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.70.116  user=root
Oct 16 00:17:41 Ubuntu-1404-trusty-64-minimal sshd\[16106\]: Failed password for root from 94.23.70.116 port 55576 ssh2
Oct 16 00:43:38 Ubuntu-1404-trusty-64-minimal sshd\[6421\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.70.116  user=root
Oct 16 00:43:40 Ubuntu-1404-trusty-64-minimal sshd\[6421\]: Failed password for root from 94.23.70.116 port 33560 ssh2
Oct 16 00:50:51 Ubuntu-1404-trusty-64-minimal sshd\[13786\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.70.116  user=root
2019-10-16 07:37:04
106.52.116.101 attackspam
Oct 15 20:56:26 work-partkepr sshd\[9421\]: Invalid user marvin from 106.52.116.101 port 40816
Oct 15 20:56:26 work-partkepr sshd\[9421\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.116.101
...
2019-10-16 07:58:51
106.13.217.93 attackspam
Oct 15 21:25:51 venus sshd[32307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.217.93  user=r.r
Oct 15 21:25:54 venus sshd[32307]: Failed password for r.r from 106.13.217.93 port 50746 ssh2
Oct 15 21:30:10 venus sshd[670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.217.93  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.13.217.93
2019-10-16 07:56:50
187.162.57.18 attackbotsspam
Automatic report - Port Scan Attack
2019-10-16 07:27:19
114.67.80.39 attackspam
$f2bV_matches
2019-10-16 07:30:20
190.8.80.42 attackspam
fraudulent SSH attempt
2019-10-16 07:33:45
191.96.25.105 attackbots
Oct 15 12:54:41 h1637304 sshd[2592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.96.25.105  user=r.r
Oct 15 12:54:43 h1637304 sshd[2592]: Failed password for r.r from 191.96.25.105 port 37240 ssh2
Oct 15 12:54:43 h1637304 sshd[2592]: Received disconnect from 191.96.25.105: 11: Bye Bye [preauth]
Oct 15 13:04:21 h1637304 sshd[11873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.96.25.105 
Oct 15 13:04:24 h1637304 sshd[11873]: Failed password for invalid user techsupport from 191.96.25.105 port 47384 ssh2
Oct 15 13:04:24 h1637304 sshd[11873]: Received disconnect from 191.96.25.105: 11: Bye Bye [preauth]
Oct 15 13:08:41 h1637304 sshd[16475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.96.25.105 
Oct 15 13:08:43 h1637304 sshd[16475]: Failed password for invalid user paul from 191.96.25.105 port 58690 ssh2
Oct 15 13:08:43 h1637304 sshd........
-------------------------------
2019-10-16 07:29:52

最近上报的IP列表

139.135.59.49 123.12.44.106 123.12.42.152 120.230.20.184
120.230.14.95 115.50.192.57 112.242.48.196 101.26.28.203
171.242.137.185 2606:4700:10::6814:9460 2606:4700:10::6816:4311 2606:4700:10::6816:1963
2606:4700:10::6816:748 2606:4700:10::6816:1633 39.146.31.106 39.146.27.74
223.88.64.180 223.79.60.147 20.219.69.68 183.253.120.92