必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Chengdu

省份(region): Sichuan

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       132.232.0.0 - 132.232.255.255
CIDR:           132.232.0.0/16
NetName:        APNIC
NetHandle:      NET-132-232-0-0-1
Parent:         NET132 (NET-132-0-0-0-0)
NetType:        Early Registrations, Transferred to APNIC
OriginAS:       
Organization:   Asia Pacific Network Information Centre (APNIC)
RegDate:        2017-11-16
Updated:        2017-11-16
Ref:            https://rdap.arin.net/registry/ip/132.232.0.0



OrgName:        Asia Pacific Network Information Centre
OrgId:          APNIC
Address:        PO Box 3646
City:           South Brisbane
StateProv:      QLD
PostalCode:     4101
Country:        AU
RegDate:        
Updated:        2012-01-24
Ref:            https://rdap.arin.net/registry/entity/APNIC

ReferralServer:  whois://whois.apnic.net
ResourceLink:  http://wq.apnic.net/whois-search/static/search.html

OrgTechHandle: AWC12-ARIN
OrgTechName:   APNIC Whois Contact
OrgTechPhone:  +61 7 3858 3188 
OrgTechEmail:  search-apnic-not-arin@apnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN

OrgAbuseHandle: AWC12-ARIN
OrgAbuseName:   APNIC Whois Contact
OrgAbusePhone:  +61 7 3858 3188 
OrgAbuseEmail:  search-apnic-not-arin@apnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.apnic.net.

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '132.232.0.0 - 132.232.255.255'

% Abuse contact for '132.232.0.0 - 132.232.255.255' is 'abuse@tencent.com'

inetnum:        132.232.0.0 - 132.232.255.255
netname:        TENCENT-CN
descr:          Tencent Cloud Computing (Beijing) Co., Ltd
descr:          Floor 6, Yinke Building, 38 Haidian St, Haidian District
country:        CN
org:            ORG-TCCC1-AP
admin-c:        TCA15-AP
tech-c:         TCA15-AP
abuse-c:        AT992-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-TENCENT-CN
mnt-routes:     MAINT-TENCENT-CN
mnt-irt:        IRT-TENCENT-CN
last-modified:  2020-07-22T13:10:59Z
source:         APNIC

irt:            IRT-TENCENT-CN
address:        Floor 6, Yinke Building, 38 Haidian St, Haidian District, Beijing Beijing 100080
e-mail:         tencent_noc@tencent.com
abuse-mailbox:  abuse@tencent.com
admin-c:        TCA15-AP
tech-c:         TCA15-AP
auth:           # Filtered
remarks:        abuse@tencent.com was validated on 2025-10-29
remarks:        tencent_noc@tencent.com was validated on 2025-10-29
mnt-by:         MAINT-COMSENZ1-CN
last-modified:  2025-11-18T00:31:31Z
source:         APNIC

organisation:   ORG-TCCC1-AP
org-name:       Tencent Cloud Computing (Beijing) Co., Ltd
org-type:       LIR
country:        CN
address:        309 West Zone, 3F. 49 Zhichun Road. Haidian District.
phone:          +86-10-62671299
fax-no:         +86-10-82602088-41299
e-mail:         tencent_idc@tencent.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:16:21Z
source:         APNIC

role:           ABUSE TENCENTCN
country:        ZZ
address:        Floor 6, Yinke Building, 38 Haidian St, Haidian District, Beijing Beijing 100080
phone:          +000000000
e-mail:         tencent_noc@tencent.com
admin-c:        TCA15-AP
tech-c:         TCA15-AP
nic-hdl:        AT992-AP
remarks:        Generated from irt object IRT-TENCENT-CN
remarks:        abuse@tencent.com was validated on 2025-10-29
remarks:        tencent_noc@tencent.com was validated on 2025-10-29
abuse-mailbox:  abuse@tencent.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-10-29T07:07:38Z
source:         APNIC

role:           Tencent Cloud administrator
address:        Floor 6, Yinke Building, 38 Haidian St, Haidian District, Beijing Beijing 100080
country:        CN
phone:          +86-10-62671299
e-mail:         tencent_idc@tencent.com
admin-c:        TCA15-AP
tech-c:         TCA15-AP
nic-hdl:        TCA15-AP
mnt-by:         MAINT-AP-DIALPAD
fax-no:         +86-10-62671299
last-modified:  2017-04-04T10:34:03Z
source:         APNIC

% Information related to '132.232.0.0/16AS45090'

route:          132.232.0.0/16
origin:         AS45090
descr:          Tencent Cloud Computing (Beijing) Co., Ltd
                309 West Zone, 3F. 49 Zhichun Road. Haidian District.
mnt-by:         MAINT-TENCENT-CN
last-modified:  2017-12-28T07:19:14Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.232.235.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4235
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.232.235.147.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040800 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 08 21:46:27 CST 2026
;; MSG SIZE  rcvd: 108
HOST信息:
Host 147.235.232.132.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 147.235.232.132.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
49.235.33.73 attackbots
Unauthorized connection attempt detected from IP address 49.235.33.73 to port 2220 [J]
2020-01-20 16:22:13
222.186.30.145 attackbots
Unauthorized connection attempt detected from IP address 222.186.30.145 to port 22 [J]
2020-01-20 16:31:19
222.186.180.9 attackbotsspam
" "
2020-01-20 16:15:13
86.35.37.186 attackbots
Jan 20 06:55:33 vtv3 sshd[26546]: Failed password for root from 86.35.37.186 port 34450 ssh2
Jan 20 07:00:21 vtv3 sshd[28913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.35.37.186 
Jan 20 07:00:22 vtv3 sshd[28913]: Failed password for invalid user bitbucket from 86.35.37.186 port 35186 ssh2
Jan 20 07:13:48 vtv3 sshd[2769]: Failed password for root from 86.35.37.186 port 37088 ssh2
Jan 20 07:18:16 vtv3 sshd[4994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.35.37.186 
Jan 20 07:18:18 vtv3 sshd[4994]: Failed password for invalid user admin from 86.35.37.186 port 37702 ssh2
Jan 20 07:31:25 vtv3 sshd[11488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.35.37.186 
Jan 20 07:31:27 vtv3 sshd[11488]: Failed password for invalid user oracle from 86.35.37.186 port 39660 ssh2
Jan 20 07:35:58 vtv3 sshd[13700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ss
2020-01-20 16:36:15
185.111.183.42 attackspam
Postfix RBL failed
2020-01-20 16:22:36
73.100.211.143 attackspambots
Unauthorized connection attempt detected from IP address 73.100.211.143 to port 2220 [J]
2020-01-20 16:33:09
122.110.40.29 attackbots
Unauthorized connection attempt detected from IP address 122.110.40.29 to port 23 [J]
2020-01-20 16:08:18
202.65.170.174 attackspambots
Unauthorized IMAP connection attempt
2020-01-20 16:40:52
178.128.127.31 attackbotsspam
Jan 20 08:48:24 vps691689 sshd[26001]: Failed password for root from 178.128.127.31 port 63502 ssh2
Jan 20 08:50:56 vps691689 sshd[26075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.127.31
...
2020-01-20 16:06:49
178.252.147.76 attackspambots
Unauthorized connection attempt detected from IP address 178.252.147.76 to port 2220 [J]
2020-01-20 16:42:23
185.209.0.32 attackspam
Jan 20 09:17:56 debian-2gb-nbg1-2 kernel: \[1767563.127639\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.209.0.32 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=47428 PROTO=TCP SPT=46535 DPT=5775 WINDOW=1024 RES=0x00 SYN URGP=0
2020-01-20 16:21:14
103.124.89.186 attackspam
1579496064 - 01/20/2020 05:54:24 Host: 103.124.89.186/103.124.89.186 Port: 445 TCP Blocked
2020-01-20 16:16:37
60.250.31.107 attack
Unauthorized connection attempt detected from IP address 60.250.31.107 to port 2220 [J]
2020-01-20 16:41:38
175.158.216.20 attackspambots
Looking for resource vulnerabilities
2020-01-20 16:24:45
154.117.154.34 attack
Scanning random ports - tries to find possible vulnerable services
2020-01-20 16:21:29

最近上报的IP列表

129.218.147.188 2606:4700:10::6816:2047 2606:4700:10::6814:7746 2606:4700:10::ac43:1407
2606:4700:10::6816:2314 2606:4700:10::6814:6696 3.250.239.238 25.139.133.160
8.66.14.175 2606:4700:10::6816:4656 2606:4700:10::6816:2552 2606:4700:10::6814:9168
2606:4700:10::6814:5307 2606:4700:10::6814:8585 140.98.1.73 24.177.94.37
39.189.20.9 39.154.25.232 39.154.112.168 39.149.216.56