必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): China Mobile

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '218.203.160.0 - 218.203.223.255'

% Abuse contact for '218.203.160.0 - 218.203.223.255' is 'abuse@chinamobile.com'

inetnum:        218.203.160.0 - 218.203.223.255
netname:        CMNET-gansu
descr:          China Mobile Communications Corporation - gansu
country:        CN
admin-c:        JZ665-AP
tech-c:         JZ665-AP
mnt-by:         MAINT-CN-CMCC
mnt-lower:      MAINT-CN-CMCC-CHONGQING
remarks:        ------------------------------
remarks:        Please send abuse e-mail to
remarks:        zjf780211@chinaren.com
remarks:        Please send probe e-mail to
remarks:        zjf780211@chinaren.com
remarks:        -------------------------------
status:         ALLOCATED NON-PORTABLE
last-modified:  2008-09-04T06:59:25Z
source:         APNIC

person:         jinfeng zhang
nic-hdl:        JZ665-AP
e-mail:         zhangjinfeng_wg@gs.chinamobile.com
address:        No.579,Yantan Gaoxin Jishu Kaifaqu,Lanzhou city ,Gansu Provice
phone:          +86-13893214448
fax-no:         +86-0931-8557365
country:        cn
mnt-by:         MAINT-CN-CMCC-GANSU
last-modified:  2008-09-04T07:32:18Z
source:         APNIC

% Information related to '218.200.0.0/14AS9808'

route:          218.200.0.0/14
descr:          China Mobile communications corporation
origin:         AS9808
mnt-by:         MAINT-CN-CMCC
last-modified:  2012-02-15T02:36:16Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 218.203.193.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2907
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;218.203.193.138.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025102301 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 24 10:58:04 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 138.193.203.218.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.193.203.218.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
221.202.168.254 attackspam
Automatic report - Port Scan Attack
2019-09-13 03:13:55
211.18.250.201 attackbots
Sep 12 16:49:35 bouncer sshd\[8667\]: Invalid user testftp from 211.18.250.201 port 38277
Sep 12 16:49:35 bouncer sshd\[8667\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.18.250.201 
Sep 12 16:49:36 bouncer sshd\[8667\]: Failed password for invalid user testftp from 211.18.250.201 port 38277 ssh2
...
2019-09-13 03:35:44
168.227.96.236 attackspam
SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-09-13 03:13:02
92.53.90.179 attack
3325/tcp 33801/tcp 33936/tcp...
[2019-09-10/12]31pkt,31pt.(tcp)
2019-09-13 02:59:39
92.53.90.177 attack
Port scan on 3 port(s): 2589 33391 33983
2019-09-13 03:10:36
107.175.36.135 attack
TCP src-port=53543   dst-port=25    dnsbl-sorbs spam-sorbs megarbl         (730)
2019-09-13 03:21:33
123.207.7.130 attackbots
Sep 12 20:58:00 saschabauer sshd[353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.7.130
Sep 12 20:58:02 saschabauer sshd[353]: Failed password for invalid user dev from 123.207.7.130 port 53676 ssh2
2019-09-13 03:33:19
139.59.13.223 attack
$f2bV_matches
2019-09-13 03:44:53
159.203.201.202 attackspambots
2019-09-12 16:41:03 SMTP protocol synchronization error (input sent whostnamehout wahostnameing for greeting): rejected connection from H=[159.203.201.202] input="026003001"
2019-09-12 16:41:07 SMTP protocol synchronization error (input sent whostnamehout wahostnameing for greeting): rejected connection from H=[159.203.201.202] input="026003001"
2019-09-12 16:41:20 SMTP protocol synchronization error (input sent whostnamehout wahostnameing for greeting): rejected connection from H=[159.203.201.202] input="026003001"


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=159.203.201.202
2019-09-13 03:11:37
94.23.208.211 attackbotsspam
Sep 12 15:15:31 plusreed sshd[32341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.208.211  user=postgres
Sep 12 15:15:33 plusreed sshd[32341]: Failed password for postgres from 94.23.208.211 port 49248 ssh2
...
2019-09-13 03:27:12
89.252.146.24 attack
89.252.146.0 - 89.252.146.255
2019-09-13 03:30:37
61.250.144.195 attackbotsspam
Sep 12 09:13:17 php2 sshd\[22106\]: Invalid user 12345 from 61.250.144.195
Sep 12 09:13:17 php2 sshd\[22106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.solmo.co.kr
Sep 12 09:13:18 php2 sshd\[22106\]: Failed password for invalid user 12345 from 61.250.144.195 port 61012 ssh2
Sep 12 09:20:20 php2 sshd\[23080\]: Invalid user test4321 from 61.250.144.195
Sep 12 09:20:20 php2 sshd\[23080\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.solmo.co.kr
2019-09-13 03:34:24
143.137.128.68 attackbots
SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-09-13 03:28:13
106.12.206.253 attackspambots
Sep 12 05:49:59 lcdev sshd\[24243\]: Invalid user ts3server from 106.12.206.253
Sep 12 05:49:59 lcdev sshd\[24243\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.206.253
Sep 12 05:50:02 lcdev sshd\[24243\]: Failed password for invalid user ts3server from 106.12.206.253 port 40540 ssh2
Sep 12 05:57:23 lcdev sshd\[24852\]: Invalid user node from 106.12.206.253
Sep 12 05:57:23 lcdev sshd\[24852\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.206.253
2019-09-13 03:26:11
179.187.152.182 attack
Triggered by Fail2Ban at Vostok web server
2019-09-13 03:18:40

最近上报的IP列表

197.82.86.43 59.82.83.234 59.82.83.189 59.82.83.182
59.82.83.177 59.82.83.148 59.82.83.120 59.82.83.11
59.82.83.107 59.82.135.218 106.36.192.162 104.249.173.98
59.82.83.183 59.82.83.154 59.82.135.14 59.82.135.101
60.187.0.224 59.82.83.22 59.82.135.205 59.82.135.204