必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Shanghai

省份(region): Shanghai

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '58.34.0.0 - 58.34.255.255'

% Abuse contact for '58.34.0.0 - 58.34.255.255' is 'anti-spam@chinatelecom.cn'

inetnum:        58.34.0.0 - 58.34.255.255
netname:        CHINANET-SH
descr:          CHINANET Shanghai province network
descr:          Shanghai Telecom
country:        CN
admin-c:        CH93-AP
tech-c:         XI5-AP
mnt-by:         MAINT-CHINANET-SH
status:         allocated non-portable
last-modified:  2008-09-04T07:03:54Z
source:         APNIC

person:         Chinanet Hostmaster
nic-hdl:        CH93-AP
e-mail:         anti-spam@chinatelecom.cn
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +86-10-58501724
fax-no:         +86-10-58501724
country:        CN
mnt-by:         MAINT-CHINANET
last-modified:  2022-02-28T06:53:44Z
source:         APNIC

person:         Wu Xiao Li
address:        Room 805,61 North Si Chuan Road,Shanghai,200085,PRC
country:        CN
phone:          +86-21-63630562
fax-no:         +86-21-63630566
e-mail:         ipms@shtel.com.cn
nic-hdl:        XI5-AP
mnt-by:         MAINT-CHINANET-SH
abuse-mailbox:  ip-admin@mail.online.sh.cn
last-modified:  2014-02-27T08:51:31Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 58.34.148.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51708
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;58.34.148.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032601 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 27 11:24:21 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
Host 42.148.34.58.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.148.34.58.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
119.193.78.15 attackspam
Caught in portsentry honeypot
2019-09-07 08:39:22
213.136.70.175 attackspambots
Fail2Ban - SSH Bruteforce Attempt
2019-09-07 08:06:28
139.59.155.91 attackspam
Chat Spam
2019-09-07 08:42:07
172.93.123.7 attackbotsspam
WordPress brute force
2019-09-07 08:39:41
148.72.40.185 attack
[06/Sep/2019:15:58:48 +0200] Web-Request: "GET /wp-login.php", User-Agent: "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-09-07 08:38:14
37.28.155.58 attackbots
Attack Wordpress login
2019-09-07 07:57:56
202.169.46.82 attackspambots
2019-09-06T23:44:06.379095abusebot-4.cloudsearch.cf sshd\[24944\]: Invalid user devops123 from 202.169.46.82 port 35413
2019-09-07 07:53:00
104.248.183.0 attackspambots
Sep  6 22:18:17 MK-Soft-VM6 sshd\[15206\]: Invalid user 1 from 104.248.183.0 port 35178
Sep  6 22:18:17 MK-Soft-VM6 sshd\[15206\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.183.0
Sep  6 22:18:19 MK-Soft-VM6 sshd\[15206\]: Failed password for invalid user 1 from 104.248.183.0 port 35178 ssh2
...
2019-09-07 08:37:32
121.142.111.226 attack
Sep  6 21:03:19 XXX sshd[39964]: Invalid user ofsaa from 121.142.111.226 port 56996
2019-09-07 07:54:49
88.214.26.171 attackspam
2019-09-07T04:32:15.149138enmeeting.mahidol.ac.th sshd\[14468\]: Invalid user admin from 88.214.26.171 port 33331
2019-09-07T04:32:15.163792enmeeting.mahidol.ac.th sshd\[14468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.214.26.171
2019-09-07T04:32:17.503220enmeeting.mahidol.ac.th sshd\[14468\]: Failed password for invalid user admin from 88.214.26.171 port 33331 ssh2
...
2019-09-07 08:17:11
106.12.59.2 attackbots
Sep  6 18:19:50 hcbbdb sshd\[16241\]: Invalid user nagios from 106.12.59.2
Sep  6 18:19:50 hcbbdb sshd\[16241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.59.2
Sep  6 18:19:53 hcbbdb sshd\[16241\]: Failed password for invalid user nagios from 106.12.59.2 port 42736 ssh2
Sep  6 18:24:35 hcbbdb sshd\[16760\]: Invalid user test1 from 106.12.59.2
Sep  6 18:24:35 hcbbdb sshd\[16760\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.59.2
2019-09-07 08:42:45
165.22.182.168 attackspam
Sep  6 16:07:48 ny01 sshd[30445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.182.168
Sep  6 16:07:50 ny01 sshd[30445]: Failed password for invalid user test from 165.22.182.168 port 39002 ssh2
Sep  6 16:11:43 ny01 sshd[31089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.182.168
2019-09-07 08:00:48
147.135.163.102 attack
Sep  6 05:18:54 sachi sshd\[28784\]: Invalid user teamspeak from 147.135.163.102
Sep  6 05:18:54 sachi sshd\[28784\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip102.ip-147-135-163.eu
Sep  6 05:18:56 sachi sshd\[28784\]: Failed password for invalid user teamspeak from 147.135.163.102 port 54668 ssh2
Sep  6 05:23:05 sachi sshd\[29133\]: Invalid user ts3srv from 147.135.163.102
Sep  6 05:23:05 sachi sshd\[29133\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip102.ip-147-135-163.eu
2019-09-07 08:26:15
94.134.94.129 attackspambots
Web App Attack
2019-09-07 07:58:55
37.187.172.191 attack
Chat Spam
2019-09-07 08:29:11

最近上报的IP列表

110.77.248.7 44.220.185.82 121.234.219.85 2606:4700:10::6814:6472
2606:4700:10::6814:7446 2606:4700:10::6814:6410 2606:4700:10::6816:4032 2606:4700:10::6814:8499
2606:4700:10::6814:9847 2606:4700:10::6816:1180 14.207.194.142 37.120.150.131
10.4.7.254 66.132.172.218 113.112.51.110 143.208.125.95
2606:4700:10::6814:6858 2606:4700:10::6814:9833 2606:4700:10::6816:1086 2606:4700:10::6816:1169