必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Beijing

省份(region): Beijing

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       47.92.0.0 - 47.97.255.255
CIDR:           47.92.0.0/14, 47.96.0.0/15
NetName:        APNIC
NetHandle:      NET-47-92-0-0-1
Parent:         NET47 (NET-47-0-0-0-0)
NetType:        Early Registrations, Transferred to APNIC
OriginAS:       
Organization:   Asia Pacific Network Information Centre (APNIC)
RegDate:        2015-03-02
Updated:        2015-03-02
Ref:            https://rdap.arin.net/registry/ip/47.92.0.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois.apnic.net


OrgName:        Asia Pacific Network Information Centre
OrgId:          APNIC
Address:        PO Box 3646
City:           South Brisbane
StateProv:      QLD
PostalCode:     4101
Country:        AU
RegDate:        
Updated:        2012-01-24
Ref:            https://rdap.arin.net/registry/entity/APNIC

ReferralServer:  whois://whois.apnic.net
ResourceLink:  http://wq.apnic.net/whois-search/static/search.html

OrgTechHandle: AWC12-ARIN
OrgTechName:   APNIC Whois Contact
OrgTechPhone:  +61 7 3858 3188 
OrgTechEmail:  search-apnic-not-arin@apnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN

OrgAbuseHandle: AWC12-ARIN
OrgAbuseName:   APNIC Whois Contact
OrgAbusePhone:  +61 7 3858 3188 
OrgAbuseEmail:  search-apnic-not-arin@apnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.apnic.net.

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '47.92.0.0 - 47.95.255.255'

% Abuse contact for '47.92.0.0 - 47.95.255.255' is 'didong.jc@alibaba-inc.com'

inetnum:        47.92.0.0 - 47.95.255.255
netname:        ALISOFT
descr:          Aliyun Computing Co., LTD
descr:          5F, Builing D, the West Lake International Plaza of S&T
descr:          No.391 Wen'er Road, Hangzhou, Zhejiang, China, 310099
country:        CN
admin-c:        ZM1015-AP
tech-c:         ZM877-AP
tech-c:         ZM876-AP
tech-c:         ZM875-AP
abuse-c:        AC1601-AP
status:         ALLOCATED PORTABLE
mnt-by:         MAINT-CNNIC-AP
mnt-irt:        IRT-ALISOFT-CN
last-modified:  2023-11-28T00:58:17Z
source:         APNIC

irt:            IRT-ALISOFT-CN
address:        No.391 Wen'er Road, Hangzhou, Zhejiang, China, 310099
e-mail:         didong.jc@alibaba-inc.com
abuse-mailbox:  didong.jc@alibaba-inc.com
admin-c:        ZM877-AP
tech-c:         ZM877-AP
auth:           # Filtered
mnt-by:         MAINT-CNNIC-AP
last-modified:  2025-11-18T00:35:07Z
source:         APNIC

role:           ABUSE CNNICCN
country:        ZZ
address:        Beijing, China
phone:          +000000000
e-mail:         ipas@cnnic.cn
admin-c:        IP50-AP
tech-c:         IP50-AP
nic-hdl:        AC1601-AP
remarks:        Generated from irt object IRT-CNNIC-CN
remarks:        ipas@cnnic.cn is invalid
abuse-mailbox:  ipas@cnnic.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-19T17:20:32Z
source:         APNIC

person:         Li Jia
address:        NO.969 West Wen Yi Road, Yu Hang District, Hangzhou
country:        CN
phone:          +86-0571-85022088
e-mail:         jiali.jl@alibaba-inc.com
nic-hdl:        ZM1015-AP
mnt-by:         MAINT-CNNIC-AP
last-modified:  2025-07-01T07:12:42Z
source:         APNIC

person:         Guoxin Gao
address:        5F, Builing D, the West Lake International Plaza of S&T
address:        No.391 Wen'er Road, Hangzhou City
address:        Zhejiang, China, 310099
country:        CN
phone:          +86-0571-85022600
fax-no:         +86-0571-85022600
e-mail:         anti-spam@list.alibaba-inc.com
nic-hdl:        ZM875-AP
mnt-by:         MAINT-CNNIC-AP
last-modified:  2014-07-30T01:56:01Z
source:         APNIC

person:         security trouble
e-mail:         abuse@alibaba-inc.com
address:        5th,floor,Building D,the West Lake International Plaza of S&T,391#Wen??r Road
address:        Hangzhou, Zhejiang, China
phone:          +86-0571-85022600
country:        CN
mnt-by:         MAINT-CNNIC-AP
nic-hdl:        ZM876-AP
last-modified:  2025-07-01T07:06:11Z
source:         APNIC

person:         Guowei Pan
address:        5F, Builing D, the West Lake International Plaza of S&T
address:        No.391 Wen'er Road, Hangzhou City
address:        Zhejiang, China, 310099
country:        CN
phone:          +86-0571-85022088-30763
fax-no:         +86-0571-85022600
e-mail:         abuse@alibaba-inc.com
nic-hdl:        ZM877-AP
mnt-by:         MAINT-CNNIC-AP
last-modified:  2025-07-01T07:05:46Z
source:         APNIC

% Information related to '47.92.0.0/14AS37963'

route:          47.92.0.0/14
descr:          Hangzhou Alibaba Advertising Co.,Ltd.
country:        CN
origin:         AS37963
mnt-by:         MAINT-CNNIC-AP
last-modified:  2019-08-07T23:28:06Z
source:         APNIC

% Information related to '47.92.0.0/14AS45102'

route:          47.92.0.0/14
descr:          Alibaba (US) Technology Co., Ltd.
country:        CN
origin:         AS45102
mnt-by:         MAINT-CNNIC-AP
last-modified:  2019-08-07T23:28:04Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 47.95.210.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32658
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;47.95.210.252.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026051701 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 18 11:00:42 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 252.210.95.47.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 252.210.95.47.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
89.151.178.48 attack
May 24 20:00:03 zulu412 sshd\[11766\]: Invalid user hadoop from 89.151.178.48 port 9527
May 24 20:00:03 zulu412 sshd\[11766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.151.178.48
May 24 20:00:05 zulu412 sshd\[11766\]: Failed password for invalid user hadoop from 89.151.178.48 port 9527 ssh2
...
2020-05-25 04:19:24
67.205.137.32 attackspambots
$f2bV_matches
2020-05-25 03:53:27
134.17.94.158 attack
$f2bV_matches
2020-05-25 04:08:29
102.157.89.83 attack
viw-Joomla User : try to access forms...
2020-05-25 04:05:15
177.184.75.130 attack
Invalid user sx from 177.184.75.130 port 44856
2020-05-25 04:20:14
66.131.216.79 attack
bruteforce detected
2020-05-25 04:23:02
113.89.71.153 attackbots
May 23 11:57:15 plesk sshd[6249]: Invalid user llin from 113.89.71.153
May 23 11:57:16 plesk sshd[6249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.89.71.153 
May 23 11:57:18 plesk sshd[6249]: Failed password for invalid user llin from 113.89.71.153 port 17384 ssh2
May 23 11:57:18 plesk sshd[6249]: Received disconnect from 113.89.71.153: 11: Bye Bye [preauth]
May 23 12:02:04 plesk sshd[6356]: Invalid user qwb from 113.89.71.153
May 23 12:02:04 plesk sshd[6356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.89.71.153 
May 23 12:02:06 plesk sshd[6356]: Failed password for invalid user qwb from 113.89.71.153 port 16364 ssh2
May 23 12:02:06 plesk sshd[6356]: Received disconnect from 113.89.71.153: 11: Bye Bye [preauth]
May 23 12:06:37 plesk sshd[6518]: Invalid user ukv from 113.89.71.153
May 23 12:06:37 plesk sshd[6518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ........
-------------------------------
2020-05-25 04:12:57
103.7.37.147 attack
Honeypot hit.
2020-05-25 04:01:59
80.82.77.86 attackbotsspam
80.82.77.86 was recorded 8 times by 4 hosts attempting to connect to the following ports: 10000,2362,5632. Incident counter (4h, 24h, all-time): 8, 15, 11988
2020-05-25 04:30:45
23.129.64.205 attackspambots
(smtpauth) Failed SMTP AUTH login from 23.129.64.205 (US/United States/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-05-24 22:11:16 plain authenticator failed for (laba1z54pflz50qybaxl30z8weu3) [23.129.64.205]: 535 Incorrect authentication data (set_id=info@samerco.com)
2020-05-25 04:12:00
51.15.118.114 attack
bruteforce detected
2020-05-25 04:17:27
103.7.37.145 attackbots
Honeypot hit.
2020-05-25 03:55:54
117.48.212.113 attackspambots
May 24 12:22:10 mail sshd\[58509\]: Invalid user git from 117.48.212.113
May 24 12:22:10 mail sshd\[58509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.48.212.113
...
2020-05-25 04:22:11
206.189.145.233 attackspam
May 24 15:54:02 XXXXXX sshd[57965]: Invalid user a from 206.189.145.233 port 38994
2020-05-25 04:26:53
103.7.37.144 attackspam
Honeypot hit.
2020-05-25 04:25:20

最近上报的IP列表

2606:4700:10::ac43:2049 210.16.166.72 192.71.142.40 2606:4700:10::6816:4096
2606:4700:10::6816:1721 121.237.149.154 2606:4700:10::6814:4677 69.5.169.248
69.5.169.137 69.5.169.131 185.223.235.8 47.95.211.161
2606:4700:10::ac43:2043 2606:4700:10::6816:1336 131.143.143.80 54.162.175.158
184.73.106.162 211.101.234.227 47.94.131.134 43.134.92.251