必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Beijing

省份(region): Beijing

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '39.96.0.0 - 39.108.255.255'

% Abuse contact for '39.96.0.0 - 39.108.255.255' is 'ipas@cnnic.cn'

inetnum:        39.96.0.0 - 39.108.255.255
netname:        ALISOFT
descr:          Aliyun Computing Co., LTD
descr:          5F, Builing D, the West Lake International Plaza of S&T
descr:          No.391 Wen'er Road, Hangzhou, Zhejiang, China, 310099
country:        CN
admin-c:        ZM1015-AP
tech-c:         ZM877-AP
tech-c:         ZM876-AP
tech-c:         ZM875-AP
abuse-c:        AC1601-AP
status:         ALLOCATED PORTABLE
mnt-by:         MAINT-CNNIC-AP
mnt-irt:        IRT-CNNIC-CN
last-modified:  2021-06-16T01:29:48Z
source:         APNIC

irt:            IRT-CNNIC-CN
address:        Beijing, China
e-mail:         ipas@cnnic.cn
abuse-mailbox:  ipas@cnnic.cn
admin-c:        IP50-AP
tech-c:         IP50-AP
auth:           # Filtered
remarks:        Please note that CNNIC is not an ISP and is not
remarks:        empowered to investigate complaints of network abuse.
remarks:        Please contact the tech-c or admin-c of the network.
remarks:        ipas@cnnic.cn is invalid
mnt-by:         MAINT-CNNIC-AP
last-modified:  2025-09-19T17:19:56Z
source:         APNIC

role:           ABUSE CNNICCN
country:        ZZ
address:        Beijing, China
phone:          +000000000
e-mail:         ipas@cnnic.cn
admin-c:        IP50-AP
tech-c:         IP50-AP
nic-hdl:        AC1601-AP
remarks:        Generated from irt object IRT-CNNIC-CN
remarks:        ipas@cnnic.cn is invalid
abuse-mailbox:  ipas@cnnic.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-19T17:20:32Z
source:         APNIC

person:         Li Jia
address:        NO.969 West Wen Yi Road, Yu Hang District, Hangzhou
country:        CN
phone:          +86-0571-85022088
e-mail:         jiali.jl@alibaba-inc.com
nic-hdl:        ZM1015-AP
mnt-by:         MAINT-CNNIC-AP
last-modified:  2025-07-01T07:12:42Z
source:         APNIC

person:         Guoxin Gao
address:        5F, Builing D, the West Lake International Plaza of S&T
address:        No.391 Wen'er Road, Hangzhou City
address:        Zhejiang, China, 310099
country:        CN
phone:          +86-0571-85022600
fax-no:         +86-0571-85022600
e-mail:         anti-spam@list.alibaba-inc.com
nic-hdl:        ZM875-AP
mnt-by:         MAINT-CNNIC-AP
last-modified:  2014-07-30T01:56:01Z
source:         APNIC

person:         security trouble
e-mail:         abuse@alibaba-inc.com
address:        5th,floor,Building D,the West Lake International Plaza of S&T,391#Wen??r Road
address:        Hangzhou, Zhejiang, China
phone:          +86-0571-85022600
country:        CN
mnt-by:         MAINT-CNNIC-AP
nic-hdl:        ZM876-AP
last-modified:  2025-07-01T07:06:11Z
source:         APNIC

person:         Guowei Pan
address:        5F, Builing D, the West Lake International Plaza of S&T
address:        No.391 Wen'er Road, Hangzhou City
address:        Zhejiang, China, 310099
country:        CN
phone:          +86-0571-85022088-30763
fax-no:         +86-0571-85022600
e-mail:         abuse@alibaba-inc.com
nic-hdl:        ZM877-AP
mnt-by:         MAINT-CNNIC-AP
last-modified:  2025-07-01T07:05:46Z
source:         APNIC

% Information related to '39.96.0.0/13AS37963'

route:          39.96.0.0/13
descr:          Hangzhou Alibaba Advertising Co.,Ltd.
country:        CN
origin:         AS37963
mnt-by:         MAINT-CNNIC-AP
last-modified:  2019-08-07T23:28:06Z
source:         APNIC

% Information related to '39.96.0.0/13AS45102'

route:          39.96.0.0/13
descr:          Alibaba (US) Technology Co., Ltd.
country:        CN
origin:         AS45102
mnt-by:         MAINT-CNNIC-AP
last-modified:  2019-08-07T23:28:05Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 39.99.156.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58151
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;39.99.156.44.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025100302 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 04 05:30:10 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 44.156.99.39.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 44.156.99.39.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
150.95.110.73 attack
2019-09-21T04:58:35.7722871495-001 sshd\[29018\]: Invalid user olivia123 from 150.95.110.73 port 49450
2019-09-21T04:58:35.7754551495-001 sshd\[29018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v150-95-110-73.a00d.g.han1.static.cnode.io
2019-09-21T04:58:38.0872991495-001 sshd\[29018\]: Failed password for invalid user olivia123 from 150.95.110.73 port 49450 ssh2
2019-09-21T05:03:43.2049711495-001 sshd\[29403\]: Invalid user zaq1xsw2cde3 from 150.95.110.73 port 35316
2019-09-21T05:03:43.2084621495-001 sshd\[29403\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v150-95-110-73.a00d.g.han1.static.cnode.io
2019-09-21T05:03:44.8028861495-001 sshd\[29403\]: Failed password for invalid user zaq1xsw2cde3 from 150.95.110.73 port 35316 ssh2
...
2019-09-21 19:23:57
104.248.227.130 attackspambots
2019-09-21T07:33:50.747156abusebot-5.cloudsearch.cf sshd\[20083\]: Invalid user test2 from 104.248.227.130 port 32922
2019-09-21 19:01:04
213.151.59.43 attackspambots
Sep 21 05:47:56 mail kernel: [1150622.460713] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=213.151.59.43 DST=91.205.173.180 LEN=52 TOS=0x00 PREC=0x00 TTL=57 ID=46868 DF PROTO=TCP SPT=60810 DPT=23 WINDOW=65535 RES=0x00 SYN URGP=0 
Sep 21 05:47:57 mail kernel: [1150623.460144] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=213.151.59.43 DST=91.205.173.180 LEN=52 TOS=0x00 PREC=0x00 TTL=57 ID=46869 DF PROTO=TCP SPT=60810 DPT=23 WINDOW=65535 RES=0x00 SYN URGP=0 
Sep 21 05:47:59 mail kernel: [1150625.460096] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=213.151.59.43 DST=91.205.173.180 LEN=52 TOS=0x00 PREC=0x00 TTL=57 ID=46870 DF PROTO=TCP SPT=60810 DPT=23 WINDOW=65535 RES=0x00 SYN URGP=0
2019-09-21 19:41:31
180.126.218.70 attackspam
Invalid user admin from 180.126.218.70 port 23912
2019-09-21 18:58:43
104.248.187.179 attackspam
ssh failed login
2019-09-21 19:20:59
192.158.15.146 attack
10 attempts against mh-misc-ban on heat.magehost.pro
2019-09-21 19:35:56
49.204.83.2 attackbots
Sep 21 05:48:22 MK-Soft-VM6 sshd[1977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.204.83.2 
Sep 21 05:48:24 MK-Soft-VM6 sshd[1977]: Failed password for invalid user fu from 49.204.83.2 port 48736 ssh2
...
2019-09-21 19:23:00
92.118.37.74 attack
Sep 21 12:39:01 mc1 kernel: \[348797.561626\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.74 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=9705 PROTO=TCP SPT=46525 DPT=59761 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 21 12:44:02 mc1 kernel: \[349098.656987\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.74 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=29343 PROTO=TCP SPT=46525 DPT=15684 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 21 12:45:49 mc1 kernel: \[349205.886589\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.74 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=51419 PROTO=TCP SPT=46525 DPT=10225 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-09-21 18:59:25
142.93.215.102 attack
$f2bV_matches
2019-09-21 19:46:39
188.166.159.148 attackbotsspam
2019-09-21T08:32:30.658533abusebot-5.cloudsearch.cf sshd\[20275\]: Invalid user topography from 188.166.159.148 port 57486
2019-09-21 19:32:26
187.32.120.215 attack
Sep 21 07:01:46 site3 sshd\[198480\]: Invalid user gregg from 187.32.120.215
Sep 21 07:01:46 site3 sshd\[198480\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.32.120.215
Sep 21 07:01:48 site3 sshd\[198480\]: Failed password for invalid user gregg from 187.32.120.215 port 32864 ssh2
Sep 21 07:06:29 site3 sshd\[198617\]: Invalid user hsqldbb from 187.32.120.215
Sep 21 07:06:29 site3 sshd\[198617\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.32.120.215
...
2019-09-21 19:33:23
117.219.253.130 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-21 02:37:29,481 INFO [amun_request_handler] PortScan Detected on Port: 445 (117.219.253.130)
2019-09-21 18:46:40
142.93.248.5 attackspambots
Sep 21 08:19:47 *** sshd[1959]: Invalid user temp from 142.93.248.5
2019-09-21 19:13:19
95.154.102.164 attackbots
Sep 20 19:01:14 web1 sshd\[11732\]: Invalid user admin from 95.154.102.164
Sep 20 19:01:14 web1 sshd\[11732\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.154.102.164
Sep 20 19:01:16 web1 sshd\[11732\]: Failed password for invalid user admin from 95.154.102.164 port 49190 ssh2
Sep 20 19:06:11 web1 sshd\[12238\]: Invalid user nginx from 95.154.102.164
Sep 20 19:06:11 web1 sshd\[12238\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.154.102.164
2019-09-21 19:32:47
178.128.125.61 attack
Sep 21 01:09:09 lcdev sshd\[28903\]: Invalid user marie from 178.128.125.61
Sep 21 01:09:09 lcdev sshd\[28903\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.125.61
Sep 21 01:09:11 lcdev sshd\[28903\]: Failed password for invalid user marie from 178.128.125.61 port 34330 ssh2
Sep 21 01:14:05 lcdev sshd\[29347\]: Invalid user jie from 178.128.125.61
Sep 21 01:14:05 lcdev sshd\[29347\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.125.61
2019-09-21 19:25:07

最近上报的IP列表

35.203.210.70 5.253.86.21 176.34.173.141 49.232.191.253
156.238.252.198 104.168.132.143 47.97.113.83 113.121.47.212
47.121.113.148 121.43.117.42 121.40.47.87 112.124.56.200
47.99.109.105 207.154.234.231 121.43.116.22 121.41.169.100
144.172.115.86 20.64.106.71 36.68.53.95 162.216.149.7