必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '59.82.0.0 - 59.82.255.255'

% Abuse contact for '59.82.0.0 - 59.82.255.255' is 'didong.jc@alibaba-inc.com'

inetnum:        59.82.0.0 - 59.82.255.255
netname:        ALIBABA-CN-NET
descr:          Hangzhou Alibaba Advertising Co.,Ltd.
descr:          No.699, Wangshang RD., Hangzhou, China
country:        CN
admin-c:        ZM678-AP
tech-c:         ZM877-AP
tech-c:         ZM876-AP
abuse-c:        AC1601-AP
status:         ALLOCATED PORTABLE
mnt-by:         MAINT-CNNIC-AP
mnt-irt:        IRT-ALIBABA-CN-NET-CN
mnt-lower:      MAINT-CNNIC-AP
mnt-routes:     MAINT-CNNIC-AP
last-modified:  2023-11-28T00:58:21Z
source:         APNIC

irt:            IRT-ALIBABA-CN-NET-CN
address:        No.699, Wangshang RD., Hangzhou, China
e-mail:         didong.jc@alibaba-inc.com
abuse-mailbox:  didong.jc@alibaba-inc.com
auth:           # Filtered
admin-c:        ZM678-AP
tech-c:         ZM678-AP
mnt-by:         MAINT-CNNIC-AP
last-modified:  2021-09-05T23:38:38Z
source:         APNIC

role:           ABUSE CNNICCN
country:        ZZ
address:        Beijing, China
phone:          +000000000
e-mail:         ipas@cnnic.cn
admin-c:        IP50-AP
tech-c:         IP50-AP
nic-hdl:        AC1601-AP
remarks:        Generated from irt object IRT-CNNIC-CN
remarks:        ipas@cnnic.cn is invalid
abuse-mailbox:  ipas@cnnic.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-19T17:20:32Z
source:         APNIC

person:         Shuo Yu
address:        5F, Builing D, the West Lake International Plaza of S&T
address:        No.391 Wen'er Road, Hangzhou City
address:        Zhejiang, China, 310099
country:        CN
phone:          +86-0571-85022600
e-mail:         anti-spam@list.alibaba-inc.com
nic-hdl:        ZM678-AP
mnt-by:         MAINT-CNNIC-AP
last-modified:  2021-04-13T23:21:57Z
source:         APNIC

person:         security trouble
e-mail:         abuse@alibaba-inc.com
address:        5th,floor,Building D,the West Lake International Plaza of S&T,391#Wen??r Road
address:        Hangzhou, Zhejiang, China
phone:          +86-0571-85022600
country:        CN
mnt-by:         MAINT-CNNIC-AP
nic-hdl:        ZM876-AP
last-modified:  2025-07-01T07:06:11Z
source:         APNIC

person:         Guowei Pan
address:        5F, Builing D, the West Lake International Plaza of S&T
address:        No.391 Wen'er Road, Hangzhou City
address:        Zhejiang, China, 310099
country:        CN
phone:          +86-0571-85022088-30763
fax-no:         +86-0571-85022600
e-mail:         abuse@alibaba-inc.com
nic-hdl:        ZM877-AP
mnt-by:         MAINT-CNNIC-AP
last-modified:  2025-07-01T07:05:46Z
source:         APNIC

% Information related to '59.82.135.0/24AS37963'

route:          59.82.135.0/24
origin:         AS37963
descr:          China Internet Network Information Center
                Floor1, Building No.1 C/-Chinese Academy of Sciences
                4, South 4th Street
                Haidian District,
mnt-by:         MAINT-CNNIC-AP
last-modified:  2020-02-18T01:18:02Z
source:         APNIC

% Information related to '59.82.135.0/24AS45102'

route:          59.82.135.0/24
origin:         AS45102
descr:          China Internet Network Information Center
                Floor1, Building No.1 C/-Chinese Academy of Sciences
                4, South 4th Street
                Haidian District,
mnt-by:         MAINT-CNNIC-AP
last-modified:  2020-02-18T01:19:53Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 59.82.135.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52897
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;59.82.135.21.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025102401 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 25 02:00:09 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 21.135.82.59.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.135.82.59.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
175.192.191.226 attackbotsspam
Jul 20 16:57:10 NPSTNNYC01T sshd[18231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.192.191.226
Jul 20 16:57:12 NPSTNNYC01T sshd[18231]: Failed password for invalid user ftp from 175.192.191.226 port 44210 ssh2
Jul 20 17:01:40 NPSTNNYC01T sshd[18581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.192.191.226
...
2020-07-21 05:02:40
122.225.230.10 attackspambots
Jul 20 20:41:26 jumpserver sshd[160336]: Invalid user komiyama from 122.225.230.10 port 33928
Jul 20 20:41:28 jumpserver sshd[160336]: Failed password for invalid user komiyama from 122.225.230.10 port 33928 ssh2
Jul 20 20:45:53 jumpserver sshd[160383]: Invalid user hadoop from 122.225.230.10 port 37856
...
2020-07-21 04:47:16
79.135.73.141 attackbotsspam
Jul 20 14:25:07 rancher-0 sshd[477281]: Invalid user jesus from 79.135.73.141 port 38857
...
2020-07-21 04:42:08
113.10.194.254 attackspambots
Port Scan
...
2020-07-21 04:41:26
89.144.47.246 attack
Jul 20 20:04:26 debian-2gb-nbg1-2 kernel: \[17526804.780408\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=89.144.47.246 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=10532 PROTO=TCP SPT=49589 DPT=3389 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-21 04:41:39
128.14.133.50 attackspambots
Automatic report - Banned IP Access
2020-07-21 05:04:18
106.54.63.49 attackspam
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-07-21 04:55:50
222.186.180.6 attackspambots
[MK-VM5] SSH login failed
2020-07-21 04:49:55
59.124.6.166 attack
Invalid user usuario from 59.124.6.166 port 39039
2020-07-21 04:42:40
51.83.99.228 attackbots
malicious Brute-Force reported by https://www.patrick-binder.de
...
2020-07-21 04:37:23
162.243.128.183 attackspambots
" "
2020-07-21 04:34:32
123.208.100.245 attackspambots
C1,WP GET /wp-login.php
2020-07-21 04:41:07
103.143.208.122 attackspam
$f2bV_matches
2020-07-21 05:00:45
45.40.166.145 attack
C2,WP GET /wp2/wp-includes/wlwmanifest.xml
2020-07-21 04:58:29
121.7.127.92 attack
Jul 20 16:36:21 george sshd[11170]: Failed password for invalid user screeps from 121.7.127.92 port 55560 ssh2
Jul 20 16:40:20 george sshd[11352]: Invalid user ftpuser from 121.7.127.92 port 55490
Jul 20 16:40:20 george sshd[11352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.7.127.92 
Jul 20 16:40:22 george sshd[11352]: Failed password for invalid user ftpuser from 121.7.127.92 port 55490 ssh2
Jul 20 16:44:20 george sshd[11373]: Invalid user raj from 121.7.127.92 port 55420
...
2020-07-21 04:48:36

最近上报的IP列表

59.82.83.156 172.178.115.83 78.198.88.142 59.82.135.179
59.82.135.91 51.158.61.186 154.12.94.119 91.92.243.11
158.44.128.120 32.36.244.67 5.127.198.137 203.91.72.3
5.188.9.122 92.84.40.215 9.155.10.205 98.93.164.96
59.82.83.175 59.82.83.115 3.89.107.76 3.86.147.57