必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Malaysia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.101.48.0 - 103.101.51.255'

% Abuse contact for '103.101.48.0 - 103.101.51.255' is 'support@jnisystem.com'

inetnum:        103.101.48.0 - 103.101.51.255
netname:        JNI-MY
descr:          JNI SYSTEM SDN BHD
country:        MY
org:            ORG-JSSB1-AP
admin-c:        JSSB2-AP
tech-c:         JSSB2-AP
abuse-c:        AJ419-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-JNI-MY
mnt-routes:     MAINT-JNI-MY
mnt-irt:        IRT-JNI-MY
last-modified:  2020-07-01T01:24:45Z
source:         APNIC

irt:            IRT-JNI-MY
address:        1210, 12th Floor,, Plaza Taragon Kelana,, No 3. Jalan SS6/6,, Kelana Jaya, Petaling Jaya Selangor 47
e-mail:         support@jnisystem.com
abuse-mailbox:  support@jnisystem.com
admin-c:        JSSB2-AP
tech-c:         JSSB2-AP
auth:           # Filtered
remarks:        support@jnisystem.com was validated on 2025-09-19
mnt-by:         MAINT-JNI-MY
last-modified:  2025-11-18T00:31:51Z
source:         APNIC

organisation:   ORG-JSSB1-AP
org-name:       JNI SYSTEM SDN BHD
org-type:       LIR
country:        MY
address:        1210, 12th Floor,
address:        Plaza Taragon Kelana,
address:        No 3. Jalan SS6/6,, Kelana Jaya
phone:          +60378878180
fax-no:         +60378879212
e-mail:         abuse@jnisystem.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:17:16Z
source:         APNIC

role:           ABUSE JNIMY
country:        ZZ
address:        1210, 12th Floor,, Plaza Taragon Kelana,, No 3. Jalan SS6/6,, Kelana Jaya, Petaling Jaya Selangor 47
phone:          +000000000
e-mail:         support@jnisystem.com
admin-c:        JSSB2-AP
tech-c:         JSSB2-AP
nic-hdl:        AJ419-AP
remarks:        Generated from irt object IRT-JNI-MY
remarks:        support@jnisystem.com was validated on 2025-09-19
abuse-mailbox:  support@jnisystem.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-19T03:06:54Z
source:         APNIC

role:           JNI SYSTEM SDN BHD administrator
address:        1210, 12th Floor,, Plaza Taragon Kelana,, No 3. Jalan SS6/6,, Kelana Jaya, Petaling Jaya Selangor 47
country:        MY
phone:          +60378878180
fax-no:         +60378878180
e-mail:         abuse@jnisystem.com
admin-c:        JSSB2-AP
tech-c:         JSSB2-AP
nic-hdl:        JSSB2-AP
mnt-by:         MAINT-JNI-MY
last-modified:  2017-09-15T02:30:42Z
source:         APNIC

% Information related to '103.101.50.0/24AS202736'

route:          103.101.50.0/24
origin:         AS202736
descr:          JNI SYSTEM SDN BHD
                1210, 12th Floor,
                Plaza Taragon Kelana,
                No 3. Jalan SS6/6,, Kelana Jaya
mnt-by:         MAINT-JNI-MY
last-modified:  2025-11-26T12:20:46Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.101.50.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15986
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.101.50.70.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025112901 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 29 15:45:41 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
70.50.101.103.in-addr.arpa domain name pointer 103-101-50-70.kroservices.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
70.50.101.103.in-addr.arpa	name = 103-101-50-70.kroservices.com.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
149.129.51.103 attackbotsspam
12907/tcp 11847/tcp 28199/tcp...
[2020-04-13/05-11]22pkt,9pt.(tcp)
2020-05-11 12:56:17
222.186.30.59 attackspambots
May 11 00:36:18 ny01 sshd[16238]: Failed password for root from 222.186.30.59 port 37927 ssh2
May 11 00:39:04 ny01 sshd[16581]: Failed password for root from 222.186.30.59 port 31999 ssh2
2020-05-11 13:00:11
193.118.53.206 attack
2379/tcp 8181/tcp 8443/tcp...
[2020-04-26/05-11]5pkt,4pt.(tcp)
2020-05-11 13:11:46
176.119.28.244 attack
May 11 06:22:23 piServer sshd[1404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.119.28.244 
May 11 06:22:25 piServer sshd[1404]: Failed password for invalid user gtadmin from 176.119.28.244 port 36636 ssh2
May 11 06:26:22 piServer sshd[1972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.119.28.244 
...
2020-05-11 12:40:01
91.121.2.33 attack
ssh brute force
2020-05-11 12:57:00
218.90.102.184 attack
May 11 05:58:49 mail sshd\[30703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.90.102.184  user=root
May 11 05:58:51 mail sshd\[30703\]: Failed password for root from 218.90.102.184 port 30977 ssh2
May 11 06:03:14 mail sshd\[30918\]: Invalid user nexus from 218.90.102.184
May 11 06:03:14 mail sshd\[30918\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.90.102.184
...
2020-05-11 13:02:47
103.120.115.134 attackbotsspam
May 10 23:54:59 Tower sshd[26883]: Connection from 103.120.115.134 port 56124 on 192.168.10.220 port 22 rdomain ""
May 10 23:55:01 Tower sshd[26883]: Failed password for root from 103.120.115.134 port 56124 ssh2
May 10 23:55:01 Tower sshd[26883]: Connection closed by authenticating user root 103.120.115.134 port 56124 [preauth]
2020-05-11 13:22:53
157.245.221.244 attack
May 11 05:44:58 server sshd[28610]: Failed password for invalid user saman from 157.245.221.244 port 38306 ssh2
May 11 05:52:51 server sshd[34295]: Failed password for root from 157.245.221.244 port 33942 ssh2
May 11 05:55:45 server sshd[36815]: Failed password for invalid user lt from 157.245.221.244 port 60952 ssh2
2020-05-11 12:51:13
185.176.27.246 attackbotsspam
05/11/2020-07:16:16.487042 185.176.27.246 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-05-11 13:18:50
51.68.89.100 attackspambots
May 11 06:28:06 electroncash sshd[61927]: Invalid user guest from 51.68.89.100 port 52540
May 11 06:28:06 electroncash sshd[61927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.89.100 
May 11 06:28:06 electroncash sshd[61927]: Invalid user guest from 51.68.89.100 port 52540
May 11 06:28:08 electroncash sshd[61927]: Failed password for invalid user guest from 51.68.89.100 port 52540 ssh2
May 11 06:31:42 electroncash sshd[62921]: Invalid user click from 51.68.89.100 port 60780
...
2020-05-11 12:46:44
114.27.99.141 attack
Port probing on unauthorized port 23
2020-05-11 13:10:31
134.209.236.191 attackbots
May 11 06:05:15 prod4 sshd\[6299\]: Failed password for root from 134.209.236.191 port 37436 ssh2
May 11 06:10:35 prod4 sshd\[7530\]: Invalid user pastor from 134.209.236.191
May 11 06:10:37 prod4 sshd\[7530\]: Failed password for invalid user pastor from 134.209.236.191 port 52216 ssh2
...
2020-05-11 12:53:10
138.197.222.141 attackbotsspam
May 11 06:35:06 vps687878 sshd\[15748\]: Failed password for invalid user student from 138.197.222.141 port 49410 ssh2
May 11 06:38:37 vps687878 sshd\[16013\]: Invalid user postgres from 138.197.222.141 port 49186
May 11 06:38:37 vps687878 sshd\[16013\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.222.141
May 11 06:38:40 vps687878 sshd\[16013\]: Failed password for invalid user postgres from 138.197.222.141 port 49186 ssh2
May 11 06:42:17 vps687878 sshd\[16496\]: Invalid user mailtest1 from 138.197.222.141 port 48960
May 11 06:42:17 vps687878 sshd\[16496\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.222.141
...
2020-05-11 12:45:12
218.92.0.192 attack
05/11/2020-00:51:48.817292 218.92.0.192 Protocol: 6 ET SCAN Potential SSH Scan
2020-05-11 12:54:16
112.85.42.174 attackbotsspam
2020-05-11T07:10:18.556384centos sshd[21802]: Failed password for root from 112.85.42.174 port 26642 ssh2
2020-05-11T07:10:22.535061centos sshd[21802]: Failed password for root from 112.85.42.174 port 26642 ssh2
2020-05-11T07:10:27.291420centos sshd[21802]: Failed password for root from 112.85.42.174 port 26642 ssh2
...
2020-05-11 13:14:30

最近上报的IP列表

156.214.245.235 22.225.54.38 122.225.54.38 196.251.100.27
45.192.113.57 14.213.27.192 8.212.115.61 10.115.158.151
54.251.192.137 47.237.64.203 47.237.26.31 92.255.207.132
92.255.207.130 211.101.247.47 54.174.255.31 115.198.21.102
182.61.55.53 47.57.190.228 103.196.9.32 34.38.242.32