必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): China Unicom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '58.243.32.0 - 58.243.47.255'

% Abuse contact for '58.243.32.0 - 58.243.47.255' is 'zhaoyz3@chinaunicom.cn'

inetnum:        58.243.32.0 - 58.243.47.255
netname:        IPPOOL
descr:          Anhui HeFei ADSL IPPOOL
country:        CN
admin-c:        CH455-AP
tech-c:         ZZ1045-AP
abuse-c:        AC1718-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-CNCGROUP-AH
mnt-irt:        IRT-CU-CN
last-modified:  2025-01-22T13:09:06Z
source:         APNIC

irt:            IRT-CU-CN
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
e-mail:         zhaoyz3@chinaunicom.cn
abuse-mailbox:  zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
auth:           # Filtered
remarks:        zhaoyz3@chinaunicom.cn was validated on 2025-10-17
mnt-by:         MAINT-CNCGROUP
last-modified:  2025-11-18T00:26:20Z
source:         APNIC

role:           ABUSE CUCN
country:        ZZ
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
phone:          +000000000
e-mail:         zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
nic-hdl:        AC1718-AP
remarks:        Generated from irt object IRT-CU-CN
remarks:        zhaoyz3@chinaunicom.cn was validated on 2025-10-17
abuse-mailbox:  zhaoyz3@chinaunicom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-10-17T02:26:56Z
source:         APNIC

role:           CNCGroup Hostmaster
e-mail:         hqs-ipabuse@chinaunicom.cn
address:        No.156,Fu-Xing-Men-Nei Street,
address:        Beijing,100031,P.R.China
nic-hdl:        CH455-AP
phone:          +86-10-82993155
fax-no:         +86-10-82993102
country:        CN
admin-c:        CH444-AP
tech-c:         CH444-AP
mnt-by:         MAINT-CNCGROUP
last-modified:  2017-08-17T06:13:15Z
source:         APNIC

person:         zhang jinhu
nic-hdl:        ZZ1045-AP
e-mail:         zhangyi1@china-netcom.com
address:        278,suixi Street,hefei,230041,China
phone:          +86-551-5228682
fax-no:         +86-551-5229999
country:        CN
mnt-by:         MAINT-NEW
last-modified:  2008-09-04T07:46:25Z
source:         APNIC

% Information related to '58.243.32.0/21AS140726'

route:          58.243.32.0/21
origin:         AS140726
descr:          China Unicom
                B811&A1218, China Unicom
                No.21, Jin-Rong Street
mnt-by:         MAINT-CNCGROUP-RR
last-modified:  2023-06-08T04:07:56Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 58.243.36.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43601
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;58.243.36.252.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031802 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 19 07:00:19 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 252.36.243.58.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 252.36.243.58.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
179.83.41.3 attack
179.83.41.3 - - \[16/Mar/2020:07:43:45 -0700\] "POST /index.php/admin/ HTTP/1.1" 404 20411179.83.41.3 - - \[16/Mar/2020:07:43:45 -0700\] "POST /index.php/admin/index/ HTTP/1.1" 404 20435179.83.41.3 - - \[16/Mar/2020:07:43:47 -0700\] "POST /index.php/admin/sales_order/ HTTP/1.1" 404 20459
...
2020-03-17 01:10:28
123.21.210.36 attackbotsspam
Mar 16 16:29:09 server5 sshd[4157]: User admin from 123.21.210.36 not allowed because not listed in AllowUsers
Mar 16 16:29:09 server5 sshd[4157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.21.210.36  user=admin
Mar 16 16:29:11 server5 sshd[4157]: Failed password for invalid user admin from 123.21.210.36 port 57552 ssh2
Mar 16 16:29:12 server5 sshd[4157]: Connection closed by 123.21.210.36 port 57552 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=123.21.210.36
2020-03-17 01:45:03
106.13.82.49 attackspambots
Mar 16 16:49:24 vps647732 sshd[5956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.82.49
Mar 16 16:49:26 vps647732 sshd[5956]: Failed password for invalid user cpanelconnecttrack from 106.13.82.49 port 48122 ssh2
...
2020-03-17 01:31:22
162.243.128.141 attack
firewall-block, port(s): 465/tcp
2020-03-17 01:24:20
222.186.169.192 attack
Mar 16 18:37:42 srv206 sshd[12832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192  user=root
Mar 16 18:37:44 srv206 sshd[12832]: Failed password for root from 222.186.169.192 port 65034 ssh2
...
2020-03-17 01:39:43
14.161.45.187 attack
Mar 16 15:46:18 host sshd[20163]: Invalid user list from 14.161.45.187 port 58949
...
2020-03-17 00:55:52
185.36.81.42 attack
Unauthorized connection attempt detected from IP address 185.36.81.42 to port 23
2020-03-17 01:40:10
222.186.173.183 attackspambots
Mar 16 13:26:16 NPSTNNYC01T sshd[8427]: Failed password for root from 222.186.173.183 port 46294 ssh2
Mar 16 13:26:29 NPSTNNYC01T sshd[8427]: Failed password for root from 222.186.173.183 port 46294 ssh2
Mar 16 13:26:29 NPSTNNYC01T sshd[8427]: error: maximum authentication attempts exceeded for root from 222.186.173.183 port 46294 ssh2 [preauth]
...
2020-03-17 01:27:37
142.254.120.52 attackbots
Mar 16 11:38:32 ws19vmsma01 sshd[136027]: Failed password for root from 142.254.120.52 port 42149 ssh2
...
2020-03-17 00:55:34
190.161.3.85 attack
Mar 16 15:23:57 h2421860 postfix/postscreen[1276]: CONNECT from [190.161.3.85]:57017 to [85.214.119.52]:25
Mar 16 15:23:58 h2421860 postfix/postscreen[1276]: PREGREET 15 after 0.84 from [190.161.3.85]:57017: HELO 5500.com

Mar 16 15:24:02 h2421860 postfix/dnsblog[1277]: addr 190.161.3.85 listed by domain zen.spamhaus.org as 127.0.0.11
Mar 16 15:24:02 h2421860 postfix/dnsblog[1277]: addr 190.161.3.85 listed by domain zen.spamhaus.org as 127.0.0.4
Mar 16 15:24:02 h2421860 postfix/dnsblog[1316]: addr 190.161.3.85 listed by domain Unknown.trblspam.com as 185.53.179.7
Mar 16 15:24:02 h2421860 postfix/dnsblog[1285]: addr 190.161.3.85 listed by domain b.barracudacentral.org as 127.0.0.2
Mar 16 15:24:04 h2421860 postfix/postscreen[1276]: DNSBL rank 6 for [190.161.3.85]:57017
Mar 16 15:24:05 h2421860 postfix/dnsblog[1279]: addr 190.161.3.85 listed by domain dnsbl.sorbs.net as 127.0.0.10
Mar x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=190.161.3.85
2020-03-17 01:29:09
121.200.55.37 attackspam
Mar 16 20:52:07 gw1 sshd[12454]: Failed password for root from 121.200.55.37 port 40398 ssh2
Mar 16 21:00:49 gw1 sshd[12735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.200.55.37
...
2020-03-17 00:57:25
175.24.41.131 attackspambots
Lines containing failures of 175.24.41.131
Mar 16 14:50:34 f sshd[17848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.41.131  user=r.r
Mar 16 14:50:36 f sshd[17848]: Failed password for r.r from 175.24.41.131 port 60510 ssh2
Mar 16 14:50:36 f sshd[17848]: Received disconnect from 175.24.41.131 port 60510:11: Bye Bye [preauth]
Mar 16 14:50:36 f sshd[17848]: Disconnected from 175.24.41.131 port 60510 [preauth]
Mar 16 15:07:15 f sshd[18041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.41.131  user=r.r
Mar 16 15:07:17 f sshd[18041]: Failed password for r.r from 175.24.41.131 port 48896 ssh2
Mar 16 15:07:17 f sshd[18041]: Received disconnect from 175.24.41.131 port 48896:11: Bye Bye [preauth]
Mar 16 15:07:17 f sshd[18041]: Disconnected from 175.24.41.131 port 48896 [preauth]
Mar 16 15:30:35 f sshd[18427]: Invalid user www from 175.24.41.131 port 50442
Mar 16 15:30:35 f sshd[1........
------------------------------
2020-03-17 01:03:38
14.225.7.45 attackbotsspam
Mar 16 11:39:32 vps46666688 sshd[15659]: Failed password for root from 14.225.7.45 port 32340 ssh2
...
2020-03-17 00:53:10
82.196.4.66 attack
$f2bV_matches
2020-03-17 01:29:51
45.40.207.143 attack
Lines containing failures of 45.40.207.143
Mar 16 07:32:57 kmh-vmh-003-fsn07 sshd[31350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.207.143  user=r.r
Mar 16 07:32:59 kmh-vmh-003-fsn07 sshd[31350]: Failed password for r.r from 45.40.207.143 port 43886 ssh2
Mar 16 07:33:00 kmh-vmh-003-fsn07 sshd[31350]: Received disconnect from 45.40.207.143 port 43886:11: Bye Bye [preauth]
Mar 16 07:33:00 kmh-vmh-003-fsn07 sshd[31350]: Disconnected from authenticating user r.r 45.40.207.143 port 43886 [preauth]
Mar 16 07:49:28 kmh-vmh-003-fsn07 sshd[1685]: Invalid user postgres from 45.40.207.143 port 48908
Mar 16 07:49:28 kmh-vmh-003-fsn07 sshd[1685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.207.143 
Mar 16 07:49:30 kmh-vmh-003-fsn07 sshd[1685]: Failed password for invalid user postgres from 45.40.207.143 port 48908 ssh2
Mar 16 07:49:31 kmh-vmh-003-fsn07 sshd[1685]: Received disconnec........
------------------------------
2020-03-17 00:54:18

最近上报的IP列表

202.229.1.211 39.162.152.52 39.154.172.88 223.91.114.82
223.88.95.63 222.137.151.44 183.212.131.176 167.172.48.150
139.213.178.20 120.229.220.182 120.229.152.24 115.56.203.63
112.3.212.122 111.18.74.64 20.72.234.123 2606:4700:10::6816:1345
2606:4700:10::6816:2999 2606:4700:10::6814:6530 2606:4700:10::6814:4688 2606:4700:10::6814:6356