必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): China Unicom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '171.116.0.0 - 171.119.255.255'

% Abuse contact for '171.116.0.0 - 171.119.255.255' is 'zhaoyz3@chinaunicom.cn'

inetnum:        171.116.0.0 - 171.119.255.255
netname:        UNICOM-SX
descr:          China Unicom Shanxi province network
descr:          China Unicom
country:        CN
admin-c:        YZ225-AP
tech-c:         YZ225-AP
abuse-c:        AC1718-AP
status:         ALLOCATED PORTABLE
remarks:        service provider
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CNCGROUP
mnt-lower:      MAINT-CNCGROUP-SX
mnt-routes:     MAINT-CNCGROUP-RR
mnt-irt:        IRT-CU-CN
last-modified:  2025-01-22T13:15:10Z
source:         APNIC

irt:            IRT-CU-CN
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
e-mail:         zhaoyz3@chinaunicom.cn
abuse-mailbox:  zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
auth:           # Filtered
remarks:        zhaoyz3@chinaunicom.cn was validated on 2025-10-17
mnt-by:         MAINT-CNCGROUP
last-modified:  2025-10-17T02:26:26Z
source:         APNIC

role:           ABUSE CUCN
country:        ZZ
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
phone:          +000000000
e-mail:         zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
nic-hdl:        AC1718-AP
remarks:        Generated from irt object IRT-CU-CN
remarks:        zhaoyz3@chinaunicom.cn was validated on 2025-10-17
abuse-mailbox:  zhaoyz3@chinaunicom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-10-17T02:26:56Z
source:         APNIC

person:         Ying Zhao
nic-hdl:        YZ225-AP
e-mail:         zhy0607@public.ty.sx.cn
address:        Taiyuan Shanxi
phone:          +86-351-4091749
fax-no:         +86-351-4088347
country:        CN
mnt-by:         MAINT-NEW
last-modified:  2008-09-04T07:30:24Z
source:         APNIC

% Information related to '171.116.0.0/14AS4837'

route:          171.116.0.0/14
descr:          China Unicom shanxi Province Network
country:        CN
origin:         AS4837
mnt-by:         MAINT-CNCGROUP-RR
last-modified:  2011-03-23T06:06:01Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 171.118.62.152
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52025
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;171.118.62.152.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025111100 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Nov 12 01:00:19 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 152.62.118.171.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 152.62.118.171.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
104.248.22.250 attackspam
104.248.22.250 - - [18/Jun/2020:09:56:25 +0200] "GET /wp-login.php HTTP/1.1" 200 5983 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.22.250 - - [18/Jun/2020:09:56:28 +0200] "POST /wp-login.php HTTP/1.1" 200 6213 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.22.250 - - [18/Jun/2020:09:56:30 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-06-18 16:35:12
213.92.204.213 attackbotsspam
(PL/Poland/-) SMTP Bruteforcing attempts
2020-06-18 16:29:39
104.168.71.152 attackspam
(sshd) Failed SSH login from 104.168.71.152 (US/United States/104-168-71-152-host.colocrossing.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 18 09:34:51 amsweb01 sshd[10984]: Invalid user www-data from 104.168.71.152 port 56111
Jun 18 09:34:53 amsweb01 sshd[10984]: Failed password for invalid user www-data from 104.168.71.152 port 56111 ssh2
Jun 18 09:40:33 amsweb01 sshd[11763]: Invalid user sftp_user from 104.168.71.152 port 55927
Jun 18 09:40:35 amsweb01 sshd[11763]: Failed password for invalid user sftp_user from 104.168.71.152 port 55927 ssh2
Jun 18 09:51:31 amsweb01 sshd[13339]: Invalid user ninja from 104.168.71.152 port 55567
2020-06-18 16:19:44
123.206.41.68 attackspam
Invalid user reception from 123.206.41.68 port 35486
2020-06-18 16:03:14
186.233.223.99 attackbots
 TCP (SYN) 186.233.223.99:28851 -> port 80, len 44
2020-06-18 16:14:23
106.54.140.250 attackbots
Jun 18 08:33:13 sigma sshd\[16637\]: Failed password for root from 106.54.140.250 port 60056 ssh2Jun 18 08:43:59 sigma sshd\[16826\]: Invalid user dem from 106.54.140.250
...
2020-06-18 16:23:47
181.48.18.130 attackbotsspam
$f2bV_matches
2020-06-18 16:17:43
104.194.83.8 attackspam
Invalid user pay from 104.194.83.8 port 40444
2020-06-18 15:56:40
200.66.123.187 attack
Jun 18 05:41:19 mail.srvfarm.net postfix/smtps/smtpd[1342981]: warning: unknown[200.66.123.187]: SASL PLAIN authentication failed: 
Jun 18 05:41:19 mail.srvfarm.net postfix/smtps/smtpd[1342981]: lost connection after AUTH from unknown[200.66.123.187]
Jun 18 05:41:41 mail.srvfarm.net postfix/smtps/smtpd[1343122]: warning: unknown[200.66.123.187]: SASL PLAIN authentication failed: 
Jun 18 05:41:42 mail.srvfarm.net postfix/smtps/smtpd[1343122]: lost connection after AUTH from unknown[200.66.123.187]
Jun 18 05:46:00 mail.srvfarm.net postfix/smtpd[1342867]: warning: unknown[200.66.123.187]: SASL PLAIN authentication failed:
2020-06-18 15:59:28
85.98.43.101 attack
Automatic report - Port Scan Attack
2020-06-18 16:07:26
58.20.68.239 attackbotsspam
(ftpd) Failed FTP login from 58.20.68.239 (CN/China/-): 10 in the last 300 secs
2020-06-18 15:58:15
46.38.150.188 attackbotsspam
Jun 18 09:55:07 relay postfix/smtpd\[18150\]: warning: unknown\[46.38.150.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 18 09:56:09 relay postfix/smtpd\[4249\]: warning: unknown\[46.38.150.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 18 09:56:25 relay postfix/smtpd\[18152\]: warning: unknown\[46.38.150.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 18 09:57:32 relay postfix/smtpd\[19845\]: warning: unknown\[46.38.150.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 18 09:57:53 relay postfix/smtpd\[18150\]: warning: unknown\[46.38.150.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-18 16:02:19
218.92.0.220 attackspam
Unauthorized connection attempt detected from IP address 218.92.0.220 to port 22
2020-06-18 16:17:20
210.183.46.232 attackspambots
Invalid user gaurav from 210.183.46.232 port 65330
2020-06-18 16:10:06
92.55.194.41 attackbots
Jun 18 05:29:29 mail.srvfarm.net postfix/smtps/smtpd[1342632]: warning: unknown[92.55.194.41]: SASL PLAIN authentication failed: 
Jun 18 05:29:29 mail.srvfarm.net postfix/smtps/smtpd[1342632]: lost connection after AUTH from unknown[92.55.194.41]
Jun 18 05:33:23 mail.srvfarm.net postfix/smtps/smtpd[1343119]: warning: unknown[92.55.194.41]: SASL PLAIN authentication failed: 
Jun 18 05:33:23 mail.srvfarm.net postfix/smtps/smtpd[1343119]: lost connection after AUTH from unknown[92.55.194.41]
Jun 18 05:34:47 mail.srvfarm.net postfix/smtps/smtpd[1343122]: warning: unknown[92.55.194.41]: SASL PLAIN authentication failed:
2020-06-18 16:36:40

最近上报的IP列表

54.237.244.221 138.118.102.31 31.42.9.242 47.84.19.225
47.84.116.196 66.76.243.130 79.176.33.31 192.168.102.10
177.11.54.103 183.160.195.185 180.153.236.2 180.153.236.158
150.255.248.127 118.212.123.136 112.112.182.86 240e:b31:19d2:b210:8d44:3916:1269:7304
185.247.137.241 91.239.216.8 162.216.149.248 152.32.188.207