必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Beijing

省份(region): Beijing

国家(country): China

运营商(isp): China Unicom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '42.224.0.0 - 42.239.255.255'

% Abuse contact for '42.224.0.0 - 42.239.255.255' is 'zhaoyz3@chinaunicom.cn'

inetnum:        42.224.0.0 - 42.239.255.255
netname:        UNICOM-HA
descr:          China Unicom Henan province network
descr:          China Unicom
descr:          No.21,JiN-Rong Street,
descr:          Beijing 100033
country:        CN
admin-c:        CH1302-AP
tech-c:         WW444-AP
abuse-c:        AC1718-AP
status:         ALLOCATED PORTABLE
remarks:        service provider
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CNCGROUP-HA
mnt-routes:     MAINT-CNCGROUP-RR
mnt-irt:        IRT-CU-CN
last-modified:  2025-01-22T13:12:22Z
source:         APNIC

irt:            IRT-CU-CN
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
e-mail:         zhaoyz3@chinaunicom.cn
abuse-mailbox:  zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
auth:           # Filtered
remarks:        zhaoyz3@chinaunicom.cn is invalid
mnt-by:         MAINT-CNCGROUP
last-modified:  2025-10-03T06:12:01Z
source:         APNIC

role:           ABUSE CUCN
country:        ZZ
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
phone:          +000000000
e-mail:         zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
nic-hdl:        AC1718-AP
remarks:        Generated from irt object IRT-CU-CN
remarks:        zhaoyz3@chinaunicom.cn is invalid
abuse-mailbox:  zhaoyz3@chinaunicom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-10T13:08:11Z
source:         APNIC

person:         ChinaUnicom Hostmaster
nic-hdl:        CH1302-AP
e-mail:         hqs-ipabuse@chinaunicom.cn
address:        No.21,Jin-Rong Street
address:        Beijing,100033
address:        P.R.China
phone:          +86-10-66259764
fax-no:         +86-10-66259764
country:        CN
mnt-by:         MAINT-CNCGROUP
last-modified:  2017-08-17T06:13:16Z
source:         APNIC

person:         Wei Wang
nic-hdl:        WW444-AP
e-mail:         abuse@public.zz.ha.cn
address:        #55 San Quan Road, Zhengzhou, Henan Provice
phone:          +86-371-65952358
fax-no:         +86-371-65968952
country:        CN
mnt-by:         MAINT-CNCGROUP-HA
last-modified:  2010-03-05T08:20:01Z
source:         APNIC

% Information related to '42.224.0.0/12AS4837'

route:          42.224.0.0/12
descr:          China Unicom Henan Province Network
country:        CN
origin:         AS4837
mnt-by:         MAINT-CNCGROUP-RR
last-modified:  2011-03-02T05:24:03Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.236.17.28
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9305
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.236.17.28.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025100800 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 09 01:00:09 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
28.17.236.42.in-addr.arpa domain name pointer hn.kd.ny.adsl.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
28.17.236.42.in-addr.arpa	name = hn.kd.ny.adsl.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
112.85.42.173 attack
Sep 20 17:16:31 vps647732 sshd[21727]: Failed password for root from 112.85.42.173 port 36844 ssh2
Sep 20 17:16:42 vps647732 sshd[21727]: Failed password for root from 112.85.42.173 port 36844 ssh2
...
2020-09-20 23:21:04
153.19.218.233 attackbotsspam
Unauthorized connection attempt from IP address 153.19.218.233 on Port 445(SMB)
2020-09-20 23:47:40
129.211.10.111 attack
Failed password for invalid user ftpadmin from 129.211.10.111 port 60410 ssh2
2020-09-20 23:39:05
177.155.252.172 attack
Listed on    zen-spamhaus also abuseat.org   / proto=6  .  srcport=5383  .  dstport=23  .     (2298)
2020-09-20 23:42:01
89.163.164.183 attack
Brute forcing email accounts
2020-09-20 23:48:36
171.25.193.20 attack
Sep 20 12:13:58 ws26vmsma01 sshd[215128]: Failed password for root from 171.25.193.20 port 18259 ssh2
Sep 20 12:14:01 ws26vmsma01 sshd[215128]: Failed password for root from 171.25.193.20 port 18259 ssh2
...
2020-09-20 23:56:55
222.186.30.76 attackbots
2020-09-20T15:22:27.211479vps773228.ovh.net sshd[11162]: Failed password for root from 222.186.30.76 port 13304 ssh2
2020-09-20T15:22:29.446194vps773228.ovh.net sshd[11162]: Failed password for root from 222.186.30.76 port 13304 ssh2
2020-09-20T15:22:31.289368vps773228.ovh.net sshd[11162]: Failed password for root from 222.186.30.76 port 13304 ssh2
2020-09-20T17:01:52.857986vps773228.ovh.net sshd[12349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.76  user=root
2020-09-20T17:01:54.734449vps773228.ovh.net sshd[12349]: Failed password for root from 222.186.30.76 port 33456 ssh2
...
2020-09-20 23:26:50
211.195.79.149 attack
Sep 19 17:00:43 scw-focused-cartwright sshd[26499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.195.79.149
Sep 19 17:00:45 scw-focused-cartwright sshd[26499]: Failed password for invalid user cablecom from 211.195.79.149 port 49368 ssh2
2020-09-21 00:03:21
222.117.154.77 attack
Sep 19 06:00:41 scw-focused-cartwright sshd[12226]: Failed password for root from 222.117.154.77 port 47926 ssh2
2020-09-20 23:45:50
103.147.10.222 attackspambots
103.147.10.222 - - [20/Sep/2020:17:13:32 +0200] "GET /wp-login.php HTTP/1.1" 200 9061 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
103.147.10.222 - - [20/Sep/2020:17:13:35 +0200] "POST /wp-login.php HTTP/1.1" 200 9312 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
103.147.10.222 - - [20/Sep/2020:17:13:37 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-20 23:34:39
51.77.215.227 attackspam
Invalid user system from 51.77.215.227 port 43036
2020-09-20 23:34:58
171.15.16.9 attackspam
Unauthorized connection attempt from IP address 171.15.16.9 on Port 445(SMB)
2020-09-20 23:20:15
159.192.235.130 attackbots
Sep 19 19:49:30 cumulus sshd[12366]: Did not receive identification string from 159.192.235.130 port 60215
Sep 19 19:49:30 cumulus sshd[12367]: Did not receive identification string from 159.192.235.130 port 60217
Sep 19 19:49:30 cumulus sshd[12368]: Did not receive identification string from 159.192.235.130 port 60220
Sep 19 19:49:30 cumulus sshd[12369]: Did not receive identification string from 159.192.235.130 port 60222
Sep 19 19:49:30 cumulus sshd[12370]: Did not receive identification string from 159.192.235.130 port 60219
Sep 19 19:49:30 cumulus sshd[12371]: Did not receive identification string from 159.192.235.130 port 60225
Sep 19 19:49:30 cumulus sshd[12372]: Did not receive identification string from 159.192.235.130 port 60228
Sep 19 19:49:34 cumulus sshd[12380]: Invalid user support from 159.192.235.130 port 60564
Sep 19 19:49:34 cumulus sshd[12378]: Invalid user support from 159.192.235.130 port 60560
Sep 19 19:49:34 cumulus sshd[12383]: Invalid user suppo........
-------------------------------
2020-09-20 23:24:16
218.152.207.173 attack
(sshd) Failed SSH login from 218.152.207.173 (KR/South Korea/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 20 09:05:10 rainbow sshd[3468070]: Invalid user admin from 218.152.207.173 port 36655
Sep 20 09:05:11 rainbow sshd[3468070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.152.207.173 
Sep 20 09:05:11 rainbow sshd[3468092]: Invalid user admin from 218.152.207.173 port 36658
Sep 20 09:05:11 rainbow sshd[3468092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.152.207.173 
Sep 20 09:05:12 rainbow sshd[3468070]: Failed password for invalid user admin from 218.152.207.173 port 36655 ssh2
2020-09-20 23:41:07
51.83.57.157 attackspambots
Sep 20 13:22:38 h2646465 sshd[27694]: Invalid user service from 51.83.57.157
Sep 20 13:22:38 h2646465 sshd[27694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.57.157
Sep 20 13:22:38 h2646465 sshd[27694]: Invalid user service from 51.83.57.157
Sep 20 13:22:41 h2646465 sshd[27694]: Failed password for invalid user service from 51.83.57.157 port 57276 ssh2
Sep 20 13:26:20 h2646465 sshd[28324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.57.157  user=root
Sep 20 13:26:22 h2646465 sshd[28324]: Failed password for root from 51.83.57.157 port 40520 ssh2
Sep 20 13:30:20 h2646465 sshd[28992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.57.157  user=root
Sep 20 13:30:22 h2646465 sshd[28992]: Failed password for root from 51.83.57.157 port 50936 ssh2
Sep 20 13:34:19 h2646465 sshd[29241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhos
2020-09-20 23:57:56

最近上报的IP列表

199.45.154.134 124.132.21.237 100.42.228.102 182.119.0.227
3.252.213.65 185.180.141.17 185.132.53.243 167.99.189.38
2a10:50c0:c001::296d:7602 192.168.0.192 163.172.76.52 54.243.7.123
13.219.78.203 42.236.17.54 4.227.36.82 20.171.207.134
34.223.90.92 122.231.174.69 10.10.24.41 52.166.181.208