必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Shanghai

省份(region): Shanghai

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '124.220.0.0 - 124.223.255.255'

% Abuse contact for '124.220.0.0 - 124.223.255.255' is 'abuse@tencent.com'

inetnum:        124.220.0.0 - 124.223.255.255
netname:        TencentCloud
descr:          Tencent cloud computing (Beijing) Co., Ltd.
descr:          Floor 6, Yinke Building, 38 Haidian St, Haidian District Beijing
country:        CN
admin-c:        JT1125-AP
tech-c:         JX1747-AP
abuse-c:        AC1601-AP
status:         ALLOCATED PORTABLE
mnt-by:         MAINT-CNNIC-AP
mnt-irt:        IRT-TENCENTCLOUD-CN
last-modified:  2023-11-28T00:57:04Z
source:         APNIC

irt:            IRT-TencentCloud-CN
address:        9F, FIYTA Building, Gaoxinnanyi Road, Southern
address:        District of Hi-tech Park, Shenzhen
e-mail:         tencent_noc@tencent.com
admin-c:        JT1125-AP
tech-c:         JX1747-AP
abuse-mailbox:  abuse@tencent.com
remarks:        abuse@tencent.com was validated on 2025-10-29
remarks:        tencent_noc@tencent.com was validated on 2025-10-29
auth:           # Filtered
mnt-by:         MAINT-CNNIC-AP
last-modified:  2025-11-18T00:34:40Z
source:         APNIC

role:           ABUSE CNNICCN
country:        ZZ
address:        Beijing, China
phone:          +000000000
e-mail:         ipas@cnnic.cn
admin-c:        IP50-AP
tech-c:         IP50-AP
nic-hdl:        AC1601-AP
remarks:        Generated from irt object IRT-CNNIC-CN
remarks:        ipas@cnnic.cn is invalid
abuse-mailbox:  ipas@cnnic.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-19T17:20:32Z
source:         APNIC

person:         James Tian
address:        9F, FIYTA Building, Gaoxinnanyi Road,Southern
address:        District of Hi-tech Park, Shenzhen
country:        CN
phone:          +86-755-86013388-84952
e-mail:         johnsonqu@tencent.com
nic-hdl:        JT1125-AP
mnt-by:         MAINT-CNNIC-AP
last-modified:  2024-03-19T08:21:31Z
source:         APNIC

person:         Jimmy Xiao
address:        9F, FIYTA Building, Gaoxinnanyi Road,Southern
address:        District of Hi-tech Park, Shenzhen
country:        CN
phone:          +86-755-86013388-80224
e-mail:         klayliang@tencent.com
nic-hdl:        JX1747-AP
mnt-by:         MAINT-CNNIC-AP
last-modified:  2021-09-17T00:38:09Z
source:         APNIC

% Information related to '124.220.0.0/14AS45090'

route:          124.220.0.0/14
origin:         AS45090
descr:          China Internet Network Information Center
                Floor1, Building No.1 C/-Chinese Academy of Sciences
                4, South 4th Street
                Haidian District,
mnt-by:         MAINT-CNNIC-AP
last-modified:  2021-10-11T01:50:32Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.221.236.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64110
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;124.221.236.99.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040602 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 07 08:00:51 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 99.236.221.124.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 99.236.221.124.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
179.221.89.34 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 06:05:32
113.31.102.157 attack
$f2bV_matches
2020-02-15 06:22:25
119.28.73.77 attackspam
Automatic report - Banned IP Access
2020-02-15 05:58:54
112.85.42.182 attackbots
SSH Brute-Force attacks
2020-02-15 06:29:21
35.221.158.235 attackspam
Feb 14 17:20:07 MK-Soft-Root2 sshd[9939]: Failed password for root from 35.221.158.235 port 43354 ssh2
...
2020-02-15 06:12:30
179.220.199.220 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 06:13:14
182.188.39.81 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 06:24:59
179.223.217.117 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 05:54:29
81.31.235.93 attackspam
Automatic report - Port Scan Attack
2020-02-15 06:21:56
221.14.155.156 attackbots
Attempted to connect 2 times to port 23 TCP
2020-02-15 06:00:18
94.50.18.165 attackspam
unauthorized ssh connection attempt
2020-02-15 06:15:52
125.141.56.230 attack
Feb 11 23:46:18 km20725 sshd[7842]: Invalid user rouse from 125.141.56.230
Feb 11 23:46:18 km20725 sshd[7842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.141.56.230
Feb 11 23:46:19 km20725 sshd[7842]: Failed password for invalid user rouse from 125.141.56.230 port 50208 ssh2
Feb 11 23:46:19 km20725 sshd[7842]: Received disconnect from 125.141.56.230: 11: Bye Bye [preauth]
Feb 12 00:00:29 km20725 sshd[8552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.141.56.230  user=www-data
Feb 12 00:00:31 km20725 sshd[8552]: Failed password for www-data from 125.141.56.230 port 45476 ssh2
Feb 12 00:00:32 km20725 sshd[8552]: Received disconnect from 125.141.56.230: 11: Bye Bye [preauth]
Feb 12 00:04:46 km20725 sshd[8744]: Invalid user irmserv from 125.141.56.230
Feb 12 00:04:46 km20725 sshd[8744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.1........
-------------------------------
2020-02-15 06:01:47
179.220.189.238 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 06:17:07
69.229.6.8 attackbots
2020-02-14T21:55:24.398052  sshd[21852]: Invalid user 123 from 69.229.6.8 port 56116
2020-02-14T21:55:24.411888  sshd[21852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.229.6.8
2020-02-14T21:55:24.398052  sshd[21852]: Invalid user 123 from 69.229.6.8 port 56116
2020-02-14T21:55:26.532097  sshd[21852]: Failed password for invalid user 123 from 69.229.6.8 port 56116 ssh2
...
2020-02-15 06:11:07
37.187.97.33 attackbots
Feb 14 06:30:56 web9 sshd\[19012\]: Invalid user bandit from 37.187.97.33
Feb 14 06:30:56 web9 sshd\[19012\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.97.33
Feb 14 06:30:58 web9 sshd\[19012\]: Failed password for invalid user bandit from 37.187.97.33 port 57504 ssh2
Feb 14 06:34:04 web9 sshd\[19503\]: Invalid user zhun123 from 37.187.97.33
Feb 14 06:34:04 web9 sshd\[19503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.97.33
2020-02-15 06:07:43

最近上报的IP列表

216.118.251.134 109.162.251.235 110.77.187.161 2606:4700:10::6814:7438
2606:4700:10::6814:9332 2606:4700:10::6816:3544 2606:4700:10::ac43:2053 2606:4700:10::ac43:1717
2606:4700:10::6816:1445 2606:4700:10::6814:6399 2606:4700:10::6814:7388 202.213.129.125
109.22.68.15 109.22.68.67 221.247.208.14 176.228.83.170
213.89.250.79 216.118.251.94 107.170.46.98 104.199.4.112