必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): China Unicom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '171.116.0.0 - 171.119.255.255'

% Abuse contact for '171.116.0.0 - 171.119.255.255' is 'zhaoyz3@chinaunicom.cn'

inetnum:        171.116.0.0 - 171.119.255.255
netname:        UNICOM-SX
descr:          China Unicom Shanxi province network
descr:          China Unicom
country:        CN
admin-c:        YZ225-AP
tech-c:         YZ225-AP
abuse-c:        AC1718-AP
status:         ALLOCATED PORTABLE
remarks:        service provider
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CNCGROUP
mnt-lower:      MAINT-CNCGROUP-SX
mnt-routes:     MAINT-CNCGROUP-RR
mnt-irt:        IRT-CU-CN
last-modified:  2025-01-22T13:15:10Z
source:         APNIC

irt:            IRT-CU-CN
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
e-mail:         zhaoyz3@chinaunicom.cn
abuse-mailbox:  zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
auth:           # Filtered
remarks:        zhaoyz3@chinaunicom.cn was validated on 2025-10-17
mnt-by:         MAINT-CNCGROUP
last-modified:  2025-10-17T02:26:26Z
source:         APNIC

role:           ABUSE CUCN
country:        ZZ
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
phone:          +000000000
e-mail:         zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
nic-hdl:        AC1718-AP
remarks:        Generated from irt object IRT-CU-CN
remarks:        zhaoyz3@chinaunicom.cn was validated on 2025-10-17
abuse-mailbox:  zhaoyz3@chinaunicom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-10-17T02:26:56Z
source:         APNIC

person:         Ying Zhao
nic-hdl:        YZ225-AP
e-mail:         zhy0607@public.ty.sx.cn
address:        Taiyuan Shanxi
phone:          +86-351-4091749
fax-no:         +86-351-4088347
country:        CN
mnt-by:         MAINT-NEW
last-modified:  2008-09-04T07:30:24Z
source:         APNIC

% Information related to '171.116.0.0/14AS4837'

route:          171.116.0.0/14
descr:          China Unicom shanxi Province Network
country:        CN
origin:         AS4837
mnt-by:         MAINT-CNCGROUP-RR
last-modified:  2011-03-23T06:06:01Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 171.117.10.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62122
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;171.117.10.212.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025110500 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 06 01:30:13 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 212.10.117.171.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 212.10.117.171.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.55.86.19 attackspam
Feb 16 01:32:50 legacy sshd[28842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.86.19
Feb 16 01:32:52 legacy sshd[28842]: Failed password for invalid user q1w2e3r4 from 45.55.86.19 port 60617 ssh2
Feb 16 01:35:53 legacy sshd[29019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.86.19
...
2020-02-16 10:24:05
154.8.164.214 attackbots
Feb 16 03:26:27 silence02 sshd[24581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.164.214
Feb 16 03:26:29 silence02 sshd[24581]: Failed password for invalid user dougie from 154.8.164.214 port 36737 ssh2
Feb 16 03:31:04 silence02 sshd[26671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.164.214
2020-02-16 10:43:35
82.64.204.164 attackspambots
...
2020-02-16 10:29:45
112.118.63.183 attackbots
firewall-block, port(s): 23/tcp
2020-02-16 10:32:06
222.186.180.223 attackbots
Feb 16 02:09:06 sshgateway sshd\[11448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.223  user=root
Feb 16 02:09:07 sshgateway sshd\[11448\]: Failed password for root from 222.186.180.223 port 47746 ssh2
Feb 16 02:09:21 sshgateway sshd\[11448\]: error: maximum authentication attempts exceeded for root from 222.186.180.223 port 47746 ssh2 \[preauth\]
2020-02-16 10:18:25
116.236.79.37 attackspambots
Feb 15 22:44:50 prox sshd[6878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.236.79.37 
Feb 15 22:44:52 prox sshd[6878]: Failed password for invalid user coolbean from 116.236.79.37 port 55686 ssh2
2020-02-16 10:28:08
203.75.119.17 attack
Unauthorized connection attempt from IP address 203.75.119.17 on Port 445(SMB)
2020-02-16 10:15:32
185.156.73.52 attack
02/15/2020-21:42:31.110325 185.156.73.52 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-02-16 10:44:40
193.31.24.113 attack
02/16/2020-03:30:45.988446 193.31.24.113 Protocol: 6 SURICATA TLS invalid record/traffic
2020-02-16 10:45:38
140.213.54.232 attack
Unauthorized connection attempt from IP address 140.213.54.232 on Port 445(SMB)
2020-02-16 10:11:12
37.98.224.105 attackspam
Jan 11 05:22:07 pi sshd[26759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.98.224.105 
Jan 11 05:22:09 pi sshd[26759]: Failed password for invalid user omu from 37.98.224.105 port 59540 ssh2
2020-02-16 10:31:43
188.247.65.179 attack
Jan 19 06:33:15 pi sshd[26062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.247.65.179 
Jan 19 06:33:18 pi sshd[26062]: Failed password for invalid user dsj from 188.247.65.179 port 59218 ssh2
2020-02-16 10:22:46
202.106.149.130 attackspambots
Feb 16 05:06:16 gw1 sshd[22503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.106.149.130
Feb 16 05:06:18 gw1 sshd[22503]: Failed password for invalid user admin from 202.106.149.130 port 63913 ssh2
...
2020-02-16 10:27:05
95.70.241.166 attackspam
Automatic report - Port Scan Attack
2020-02-16 10:30:27
175.6.140.14 attackspam
$f2bV_matches
2020-02-16 10:45:57

最近上报的IP列表

35.203.210.112 199.244.88.232 180.153.236.86 180.153.236.163
121.201.122.3 141.98.197.31 78.135.107.199 45.153.34.14
14.213.49.223 115.60.45.53 54.88.251.164 54.209.126.68
44.204.27.243 107.20.3.176 27.46.69.11 195.184.76.89
154.16.10.170 185.91.127.97 91.231.89.148 91.231.89.144