必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): China Unicom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '27.192.0.0 - 27.223.255.255'

% Abuse contact for '27.192.0.0 - 27.223.255.255' is 'zhaoyz3@chinaunicom.cn'

inetnum:        27.192.0.0 - 27.223.255.255
netname:        UNICOM-SD
descr:          China Unicom Shandong province network
descr:          China Unicom
country:        CN
admin-c:        CH1302-AP
tech-c:         XZ14-AP
abuse-c:        AC1718-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CNCGROUP
mnt-lower:      MAINT-CNCGROUP-SD
mnt-routes:     MAINT-CNCGROUP-RR
mnt-irt:        IRT-CU-CN
last-modified:  2025-01-22T13:11:14Z
source:         APNIC

irt:            IRT-CU-CN
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
e-mail:         zhaoyz3@chinaunicom.cn
abuse-mailbox:  zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
auth:           # Filtered
remarks:        zhaoyz3@chinaunicom.cn was validated on 2025-10-17
mnt-by:         MAINT-CNCGROUP
last-modified:  2025-10-17T02:26:26Z
source:         APNIC

role:           ABUSE CUCN
country:        ZZ
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
phone:          +000000000
e-mail:         zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
nic-hdl:        AC1718-AP
remarks:        Generated from irt object IRT-CU-CN
remarks:        zhaoyz3@chinaunicom.cn was validated on 2025-10-17
abuse-mailbox:  zhaoyz3@chinaunicom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-10-17T02:26:56Z
source:         APNIC

person:         ChinaUnicom Hostmaster
nic-hdl:        CH1302-AP
e-mail:         hqs-ipabuse@chinaunicom.cn
address:        No.21,Jin-Rong Street
address:        Beijing,100033
address:        P.R.China
phone:          +86-10-66259764
fax-no:         +86-10-66259764
country:        CN
mnt-by:         MAINT-CNCGROUP
last-modified:  2017-08-17T06:13:16Z
source:         APNIC

person:         XIAOFENG ZHANG
nic-hdl:        XZ14-AP
e-mail:         ip@pub.sd.cninfo.net
address:        Jinan,Shandong P.R China
phone:          +86-531-6666666
fax-no:         +86-531-6666666
country:        CN
mnt-by:         MAINT-ZXF
last-modified:  2008-09-04T07:29:35Z
source:         APNIC

% Information related to '27.192.0.0/11AS4837'

route:          27.192.0.0/11
descr:          China Unicom Shandong Province Network
country:        CN
origin:         AS4837
mnt-by:         MAINT-CNCGROUP-RR
last-modified:  2010-04-14T05:24:01Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 27.220.213.235
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7656
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;27.220.213.235.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025110601 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 07 03:30:29 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 235.213.220.27.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 235.213.220.27.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
41.218.215.138 attack
SSH Brute Force
2019-11-01 21:49:44
222.119.20.239 attack
detected by Fail2Ban
2019-11-01 22:20:23
183.148.130.222 attack
Oct 31 11:52:14 mxgate1 postfix/postscreen[5251]: CONNECT from [183.148.130.222]:52116 to [176.31.12.44]:25
Oct 31 11:52:14 mxgate1 postfix/dnsblog[5253]: addr 183.148.130.222 listed by domain cbl.abuseat.org as 127.0.0.2
Oct 31 11:52:14 mxgate1 postfix/dnsblog[5256]: addr 183.148.130.222 listed by domain zen.spamhaus.org as 127.0.0.4
Oct 31 11:52:14 mxgate1 postfix/dnsblog[5256]: addr 183.148.130.222 listed by domain zen.spamhaus.org as 127.0.0.3
Oct 31 11:52:14 mxgate1 postfix/dnsblog[5256]: addr 183.148.130.222 listed by domain zen.spamhaus.org as 127.0.0.11
Oct 31 11:52:14 mxgate1 postfix/dnsblog[5252]: addr 183.148.130.222 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Oct 31 11:52:14 mxgate1 postfix/dnsblog[5255]: addr 183.148.130.222 listed by domain b.barracudacentral.org as 127.0.0.2
Oct 31 11:52:15 mxgate1 postfix/postscreen[5251]: PREGREET 18 after 1.7 from [183.148.130.222]:52116: EHLO 1stfire.com

Oct 31 11:52:15 mxgate1 postfix/postscreen[5251]: DNSBL r........
-------------------------------
2019-11-01 21:50:03
187.250.21.168 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-01 22:22:40
151.80.254.74 attackspambots
Nov  1 03:19:47 hanapaa sshd\[19057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.254.74  user=root
Nov  1 03:19:49 hanapaa sshd\[19057\]: Failed password for root from 151.80.254.74 port 35722 ssh2
Nov  1 03:26:16 hanapaa sshd\[19620\]: Invalid user share from 151.80.254.74
Nov  1 03:26:16 hanapaa sshd\[19620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.254.74
Nov  1 03:26:18 hanapaa sshd\[19620\]: Failed password for invalid user share from 151.80.254.74 port 43728 ssh2
2019-11-01 21:52:50
217.182.193.61 attackbots
Nov  1 15:03:08 SilenceServices sshd[15623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.193.61
Nov  1 15:03:09 SilenceServices sshd[15623]: Failed password for invalid user munich from 217.182.193.61 port 48200 ssh2
Nov  1 15:06:56 SilenceServices sshd[28426]: Failed password for root from 217.182.193.61 port 54800 ssh2
2019-11-01 22:23:31
183.82.123.102 attackbots
4x Failed Password
2019-11-01 21:47:03
196.158.204.40 attackspambots
Oct 30 21:37:34 host2 sshd[3114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.158.204.40  user=r.r
Oct 30 21:37:36 host2 sshd[3114]: Failed password for r.r from 196.158.204.40 port 8590 ssh2
Oct 30 21:37:36 host2 sshd[3114]: Received disconnect from 196.158.204.40: 11: Bye Bye [preauth]
Oct 30 21:55:32 host2 sshd[4794]: Invalid user photon from 196.158.204.40
Oct 30 21:55:32 host2 sshd[4794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.158.204.40 
Oct 30 21:55:35 host2 sshd[4794]: Failed password for invalid user photon from 196.158.204.40 port 27211 ssh2
Oct 30 21:55:35 host2 sshd[4794]: Received disconnect from 196.158.204.40: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=196.158.204.40
2019-11-01 21:37:34
192.99.12.24 attack
Invalid user ullar from 192.99.12.24 port 48322
2019-11-01 21:55:53
157.245.115.45 attack
2019-11-01T13:30:50.947520abusebot-4.cloudsearch.cf sshd\[9622\]: Invalid user ys3server from 157.245.115.45 port 46726
2019-11-01 21:52:25
180.68.177.209 attackspambots
Nov  1 14:58:06 vps647732 sshd[15100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.68.177.209
Nov  1 14:58:07 vps647732 sshd[15100]: Failed password for invalid user Zombie from 180.68.177.209 port 59344 ssh2
...
2019-11-01 22:03:09
188.27.106.235 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-01 22:05:15
49.235.97.29 attack
Nov  1 12:52:34 dedicated sshd[4663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.97.29  user=root
Nov  1 12:52:37 dedicated sshd[4663]: Failed password for root from 49.235.97.29 port 41411 ssh2
2019-11-01 21:49:21
49.206.37.116 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/49.206.37.116/ 
 
 IN - 1H : (43)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : IN 
 NAME ASN : ASN24309 
 
 IP : 49.206.37.116 
 
 CIDR : 49.206.32.0/19 
 
 PREFIX COUNT : 171 
 
 UNIQUE IP COUNT : 165632 
 
 
 ATTACKS DETECTED ASN24309 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-01 12:51:55 
 
 INFO : Port SSH 22 Scan Detected and Blocked by ADMIN  - data recovery
2019-11-01 22:23:05
128.199.202.206 attack
$f2bV_matches
2019-11-01 22:07:16

最近上报的IP列表

36.159.128.36 223.91.70.247 223.88.17.118 223.73.27.178
183.198.0.57 123.5.96.85 121.24.146.112 120.230.198.223
112.51.40.133 112.10.238.145 111.41.245.203 98.81.211.21
54.91.222.126 44.201.216.24 34.239.124.83 164.92.253.38
164.90.214.41 164.90.173.214 139.59.136.29 8.217.205.52