必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '240e:300::/24'

% Abuse contact for '240e:300::/24' is 'anti-spam@chinatelecom.cn'

inet6num:       240e:300::/24
netname:        CT-IPV6-BROADBAND-ADDRESS
descr:          Chinatelecom IPv6 address for fixed broadband
country:        CN
admin-c:        CH93-AP
tech-c:         CH93-AP
abuse-c:        AC1573-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-CHINANET-CN
mnt-irt:        IRT-CHINANET-CN
last-modified:  2023-02-06T10:05:28Z
source:         APNIC

irt:            IRT-CHINANET-CN
address:        No.31 ,jingrong street,beijing
address:        100032
e-mail:         anti-spam@chinatelecom.cn
abuse-mailbox:  anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
auth:           # Filtered
remarks:        anti-spam@chinatelecom.cn was validated on 2025-11-13
mnt-by:         MAINT-CHINANET
last-modified:  2026-03-13T07:12:20Z
source:         APNIC

role:           ABUSE CHINANETCN
country:        ZZ
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +000000000
e-mail:         anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
nic-hdl:        AC1573-AP
remarks:        Generated from irt object IRT-CHINANET-CN
remarks:        anti-spam@chinatelecom.cn was validated on 2025-11-13
abuse-mailbox:  anti-spam@chinatelecom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-11-13T14:15:15Z
source:         APNIC

person:         Chinanet Hostmaster
nic-hdl:        CH93-AP
e-mail:         anti-spam@chinatelecom.cn
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +86-10-58501724
fax-no:         +86-10-58501724
country:        CN
mnt-by:         MAINT-CHINANET
last-modified:  2022-02-28T06:53:44Z
source:         APNIC

% Information related to '240e::/20AS4134'

route6:         240e::/20
descr:          CHINANET-IPv6-ROUTE
origin:         AS4134
mnt-by:         MAINT-CHINANET
last-modified:  2018-08-21T08:05:25Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
DIG信息:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 240e:381:1529:4a00:736:eab6:1ac0:4e0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 27794
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;240e:381:1529:4a00:736:eab6:1ac0:4e0. IN A

;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Fri Mar 27 10:53:22 CST 2026
;; MSG SIZE  rcvd: 65

'
HOST信息:
Host 0.e.4.0.0.c.a.1.6.b.a.e.6.3.7.0.0.0.a.4.9.2.5.1.1.8.3.0.e.0.4.2.ip6.arpa not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 0.e.4.0.0.c.a.1.6.b.a.e.6.3.7.0.0.0.a.4.9.2.5.1.1.8.3.0.e.0.4.2.ip6.arpa: NXDOMAIN
最新评论:
IP 类型 评论内容 时间
106.104.172.173 attackspambots
Honeypot attack, port: 81, PTR: 106-104-172-173.adsl.static.seed.net.tw.
2020-07-01 16:28:49
123.25.218.61 attackbots
Unauthorized connection attempt from IP address 123.25.218.61 on Port 445(SMB)
2020-07-01 16:50:57
14.242.204.62 attackspambots
Attempted connection to port 81.
2020-07-01 16:52:21
167.172.198.117 attack
CMS Bruteforce / WebApp Attack attempt
2020-07-01 17:08:10
219.73.75.236 attack
 TCP (SYN) 219.73.75.236:64877 -> port 23, len 40
2020-07-01 16:17:10
36.111.184.80 attack
$f2bV_matches
2020-07-01 16:23:27
181.10.18.188 attack
Multiple SSH authentication failures from 181.10.18.188
2020-07-01 16:37:24
159.89.43.61 attackspam
firewall-block, port(s): 19877/tcp
2020-07-01 16:44:24
212.64.29.136 attack
Jun 30 11:19:23 ns382633 sshd\[13377\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.29.136  user=root
Jun 30 11:19:26 ns382633 sshd\[13377\]: Failed password for root from 212.64.29.136 port 37848 ssh2
Jun 30 11:29:16 ns382633 sshd\[15291\]: Invalid user test1 from 212.64.29.136 port 54334
Jun 30 11:29:16 ns382633 sshd\[15291\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.29.136
Jun 30 11:29:18 ns382633 sshd\[15291\]: Failed password for invalid user test1 from 212.64.29.136 port 54334 ssh2
2020-07-01 16:37:06
5.196.198.147 attackspambots
2020-06-30T21:45:01.813073afi-git.jinr.ru sshd[3396]: Invalid user daniel from 5.196.198.147 port 54202
2020-06-30T21:45:01.816368afi-git.jinr.ru sshd[3396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.198.147
2020-06-30T21:45:01.813073afi-git.jinr.ru sshd[3396]: Invalid user daniel from 5.196.198.147 port 54202
2020-06-30T21:45:03.455224afi-git.jinr.ru sshd[3396]: Failed password for invalid user daniel from 5.196.198.147 port 54202 ssh2
2020-06-30T21:47:42.440027afi-git.jinr.ru sshd[4157]: Invalid user oracle from 5.196.198.147 port 49082
...
2020-07-01 16:24:15
47.75.1.243 attackbotsspam
 TCP (SYN) 47.75.1.243:54526 -> port 9304, len 44
2020-07-01 16:56:59
111.229.204.204 attackspambots
Unauthorized connection attempt detected from IP address 111.229.204.204 to port 5818
2020-07-01 16:41:14
94.102.49.114 attackbots
firewall-block, port(s): 4034/tcp, 4043/tcp, 33334/tcp, 33353/tcp, 33386/tcp
2020-07-01 16:22:57
208.100.26.228 attack
[Tue Jun 02 03:54:34 2020] - DDoS Attack From IP: 208.100.26.228 Port: 40246
2020-07-01 17:03:33
192.241.224.53 attackspambots
135/tcp 2000/tcp 8081/tcp...
[2020-06-24/29]4pkt,4pt.(tcp)
2020-07-01 16:28:07

最近上报的IP列表

14.151.80.200 106.8.131.175 38.83.41.162 2606:4700:10::ac43:2558
2606:4700:10::ac43:2738 2606:4700:10::6814:8288 2606:4700:10::6814:4864 2606:4700:10::6816:1379
2606:4700:10::6814:6418 2606:4700:10::6816:3528 2606:4700:10::ac43:1656 14.207.194.66
14.207.194.15 2606:4700:10::6814:4717 110.78.154.171 2606:4700:10::6814:7225
164.155.74.141 110.77.248.7 58.34.148.42 44.220.185.82