必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '180.152.0.0 - 180.159.255.255'

% Abuse contact for '180.152.0.0 - 180.159.255.255' is 'anti-spam@chinatelecom.cn'

inetnum:        180.152.0.0 - 180.159.255.255
netname:        CHINANET-SH
descr:          CHINANET SHANGHAI PROVINCE NETWORK
descr:          China Telecom
descr:          No.31,jingrong street
descr:          Beijing 100032
country:        CN
admin-c:        WWQ4-AP
tech-c:         WWQ4-AP
abuse-c:        AC1573-AP
status:         ALLOCATED PORTABLE
remarks:        service provider
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CHINANET-SH
mnt-irt:        IRT-CHINANET-CN
last-modified:  2021-06-15T08:04:51Z
source:         APNIC

irt:            IRT-CHINANET-CN
address:        No.31 ,jingrong street,beijing
address:        100032
e-mail:         anti-spam@chinatelecom.cn
abuse-mailbox:  anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
auth:           # Filtered
remarks:        anti-spam@chinatelecom.cn was validated on 2025-04-24
mnt-by:         MAINT-CHINANET
last-modified:  2025-09-04T00:59:42Z
source:         APNIC

role:           ABUSE CHINANETCN
country:        ZZ
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +000000000
e-mail:         anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
nic-hdl:        AC1573-AP
remarks:        Generated from irt object IRT-CHINANET-CN
remarks:        anti-spam@chinatelecom.cn was validated on 2025-04-24
abuse-mailbox:  anti-spam@chinatelecom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-04-24T03:21:54Z
source:         APNIC

person:         Weng Wen Qian
address:        Room 2405,357 Songlin Road,Shanghai 200122
country:        CN
phone:          +86-21-68405784
fax-no:         +86-21-50623458
e-mail:         shizhiming.sh@chinatelecom.cn
nic-hdl:        WWQ4-AP
mnt-by:         MAINT-CHINANET-SH
last-modified:  2023-02-07T08:25:17Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 180.153.236.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25233
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;180.153.236.8.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025102400 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 25 01:00:16 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 8.236.153.180.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 8.236.153.180.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
117.146.173.98 attack
SSH Login Bruteforce
2020-02-07 08:46:46
180.121.135.212 attackspam
lfd: (smtpauth) Failed SMTP AUTH login from 180.121.135.212 (CN/China/-): 5 in the last 3600 secs - Tue Jan  1 15:19:12 2019
2020-02-07 08:15:29
51.89.28.247 attack
Feb  6 20:54:21 srv206 sshd[13356]: Invalid user rym from 51.89.28.247
Feb  6 20:54:21 srv206 sshd[13356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip247.ip-51-89-28.eu
Feb  6 20:54:21 srv206 sshd[13356]: Invalid user rym from 51.89.28.247
Feb  6 20:54:24 srv206 sshd[13356]: Failed password for invalid user rym from 51.89.28.247 port 49558 ssh2
...
2020-02-07 08:50:23
182.72.154.30 attackspam
Feb  6 23:09:14 mout sshd[11041]: Invalid user mlu from 182.72.154.30 port 5840
2020-02-07 08:19:52
182.75.103.30 attack
lfd: (smtpauth) Failed SMTP AUTH login from 182.75.103.30 (IN/India/nsg-static-30.103.75.182-airtel.com): 5 in the last 3600 secs - Thu Dec 27 14:55:46 2018
2020-02-07 08:41:44
185.43.209.180 attackspam
lfd: (smtpauth) Failed SMTP AUTH login from 185.43.209.180 (GB/United Kingdom/host180-209-43-185.static.arubacloud.com): 5 in the last 3600 secs - Mon Dec 31 16:37:44 2018
2020-02-07 08:18:02
51.254.58.226 attackspam
Brute force blocker - service: exim2 - aantal: 25 - Sun Dec 30 06:30:11 2018
2020-02-07 08:24:30
80.82.67.221 attackbots
Brute force blocker - service: exim2 - aantal: 25 - Sun Dec 30 06:40:15 2018
2020-02-07 08:21:52
40.113.220.108 attackspam
lfd: (smtpauth) Failed SMTP AUTH login from 40.113.220.108 (US/United States/-): 5 in the last 3600 secs - Sat Dec 29 12:23:20 2018
2020-02-07 08:29:55
118.89.62.112 attackspam
Feb  6 09:49:06 wbs sshd\[19253\]: Invalid user zhi from 118.89.62.112
Feb  6 09:49:06 wbs sshd\[19253\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.62.112
Feb  6 09:49:07 wbs sshd\[19253\]: Failed password for invalid user zhi from 118.89.62.112 port 33282 ssh2
Feb  6 09:54:55 wbs sshd\[19707\]: Invalid user cbt from 118.89.62.112
Feb  6 09:54:55 wbs sshd\[19707\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.62.112
2020-02-07 08:12:03
104.42.188.89 attackbots
Brute force blocker - service: exim2 - aantal: 25 - Fri Dec 28 06:40:09 2018
2020-02-07 08:32:43
1.204.203.55 attackspambots
Brute force blocker - service: proftpd1 - aantal: 99 - Sun Dec 30 01:45:17 2018
2020-02-07 08:26:00
14.116.187.31 attackbotsspam
Feb  6 20:36:07 icinga sshd[37377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.116.187.31 
Feb  6 20:36:10 icinga sshd[37377]: Failed password for invalid user vsa from 14.116.187.31 port 47712 ssh2
Feb  6 20:54:52 icinga sshd[63068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.116.187.31 
...
2020-02-07 08:16:58
156.196.199.145 attack
lfd: (smtpauth) Failed SMTP AUTH login from 156.196.199.145 (EG/Egypt/host-156.196.145.199-static.tedata.net): 5 in the last 3600 secs - Wed Jan  2 10:48:39 2019
2020-02-07 08:11:30
51.255.86.223 attackbots
2020-02-07 00:32:37 dovecot_login authenticator failed for \(ADMIN\) \[51.255.86.223\]: 535 Incorrect authentication data \(set_id=giorgio@opso.it\)
2020-02-07 00:32:42 dovecot_login authenticator failed for \(ADMIN\) \[51.255.86.223\]: 535 Incorrect authentication data \(set_id=giuseppe@opso.it\)
2020-02-07 00:32:53 dovecot_login authenticator failed for \(ADMIN\) \[51.255.86.223\]: 535 Incorrect authentication data \(set_id=hostmaster@nopcommerce.it\)
2020-02-07 00:32:55 dovecot_login authenticator failed for \(ADMIN\) \[51.255.86.223\]: 535 Incorrect authentication data \(set_id=no-reply@opso.it\)
2020-02-07 00:32:56 dovecot_login authenticator failed for \(ADMIN\) \[51.255.86.223\]: 535 Incorrect authentication data \(set_id=fotografie@opso.it\)
2020-02-07 00:32:57 dovecot_login authenticator failed for \(ADMIN\) \[51.255.86.223\]: 535 Incorrect authentication data \(set_id=gaudy@opso.it\)
2020-02-07 08:43:13

最近上报的IP列表

169.150.203.237 59.82.83.51 59.82.135.21 59.82.83.156
172.178.115.83 78.198.88.142 59.82.135.179 59.82.135.91
51.158.61.186 154.12.94.119 91.92.243.11 158.44.128.120
32.36.244.67 5.127.198.137 203.91.72.3 5.188.9.122
92.84.40.215 9.155.10.205 98.93.164.96 59.82.83.175