必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Moscow

省份(region): Moscow (City)

国家(country): Russia

运营商(isp): CSL Limited

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.103.244.0 - 103.103.244.255'

% Abuse contact for '103.103.244.0 - 103.103.244.255' is 'abuse@worldbackbone.com'

inetnum:        103.103.244.0 - 103.103.244.255
netname:        SHATIN-HK
descr:          RM 1607E 16/F HANG PONT COMM,BLDG 31 TONKIN STCHEUNG SHA
country:        HK
admin-c:        AA2388-AP
tech-c:         AA2388-AP
abuse-c:        AB1454-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-BACKBONE-HK
mnt-irt:        IRT-BACKBONE-HK
last-modified:  2023-02-04T03:49:18Z
source:         APNIC

irt:            IRT-BACKBONE-HK
address:        Hong Kong 6/F, 1 Wang Wo Tsai Street, Tseuen Wan, N.T.
e-mail:         abuse@worldbackbone.com
abuse-mailbox:  abuse@worldbackbone.com
admin-c:        AA2388-AP
tech-c:         AA2388-AP
auth:           # Filtered
remarks:        abuse@worldbackbone.com was validated on 2025-11-29
mnt-by:         MAINT-BACKBONE-HK
last-modified:  2025-11-29T03:57:46Z
source:         APNIC

role:           APNIC administrator
address:        Hong Kong 6/F, 1 Wang Wo Tsai Street, Tseuen Wan, N.T.
country:        HK
phone:          +852-52310655
e-mail:         abuse@worldbackbone.com
admin-c:        AA2388-AP
tech-c:         AA2388-AP
nic-hdl:        AA2388-AP
mnt-by:         MAINT-BACKBONE-HK
last-modified:  2024-08-08T09:38:49Z
source:         APNIC

role:           ABUSE BACKBONEHK
country:        ZZ
address:        Hong Kong 6/F, 1 Wang Wo Tsai Street, Tseuen Wan, N.T.
phone:          +000000000
e-mail:         abuse@worldbackbone.com
admin-c:        AA2388-AP
tech-c:         AA2388-AP
nic-hdl:        AB1454-AP
remarks:        Generated from irt object IRT-BACKBONE-HK
remarks:        abuse@worldbackbone.com was validated on 2025-11-29
abuse-mailbox:  abuse@worldbackbone.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-11-29T03:57:55Z
source:         APNIC

% Information related to '103.103.244.0/24AS151373'

route:          103.103.244.0/24
origin:         AS151373
descr:          41, Korovinskoye Shosse Region, 125412
mnt-by:         MAINT-PRINTER-RU
last-modified:  2025-05-09T09:10:58Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.103.244.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20240
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.103.244.5.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031100 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 11 17:41:16 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 5.244.103.103.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 5.244.103.103.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
14.165.194.20 attackspam
Unauthorized connection attempt from IP address 14.165.194.20 on Port 445(SMB)
2019-08-27 22:55:12
182.76.31.227 attack
Unauthorized connection attempt from IP address 182.76.31.227 on Port 445(SMB)
2019-08-27 23:05:01
139.180.225.207 attack
(From noreply@thewordpressclub7928.news) Hello,

Are you utilizing Wordpress/Woocommerce or perhaps do you actually project to use it at some point ? We provide over 2500 premium plugins and additionally themes free to download : http://spara.xyz/GmllZ

Cheers,

Matthew
2019-08-27 23:10:51
107.175.154.207 attackbots
(From noreply@thewordpressclub7928.news) Hello,

Are you utilizing Wordpress/Woocommerce or perhaps do you actually project to use it at some point ? We provide over 2500 premium plugins and additionally themes free to download : http://spara.xyz/GmllZ

Cheers,

Matthew
2019-08-27 23:01:24
137.74.43.205 attackbotsspam
Aug 27 04:10:03 eddieflores sshd\[22808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.ip-137-74-43.eu  user=root
Aug 27 04:10:05 eddieflores sshd\[22808\]: Failed password for root from 137.74.43.205 port 59578 ssh2
Aug 27 04:14:19 eddieflores sshd\[23176\]: Invalid user nagios from 137.74.43.205
Aug 27 04:14:19 eddieflores sshd\[23176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.ip-137-74-43.eu
Aug 27 04:14:21 eddieflores sshd\[23176\]: Failed password for invalid user nagios from 137.74.43.205 port 47712 ssh2
2019-08-27 23:35:34
27.156.41.228 attackspam
Aug 27 07:07:01 toyboy sshd[21051]: reveeclipse mapping checking getaddrinfo for 228.41.156.27.broad.fz.fj.dynamic.163data.com.cn [27.156.41.228] failed - POSSIBLE BREAK-IN ATTEMPT!
Aug 27 07:07:01 toyboy sshd[21051]: Invalid user webadmin from 27.156.41.228
Aug 27 07:07:01 toyboy sshd[21051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.156.41.228
Aug 27 07:07:02 toyboy sshd[21051]: Failed password for invalid user webadmin from 27.156.41.228 port 1182 ssh2
Aug 27 07:07:03 toyboy sshd[21051]: Received disconnect from 27.156.41.228: 11: Bye Bye [preauth]
Aug 27 07:49:01 toyboy sshd[23110]: reveeclipse mapping checking getaddrinfo for 228.41.156.27.broad.fz.fj.dynamic.163data.com.cn [27.156.41.228] failed - POSSIBLE BREAK-IN ATTEMPT!
Aug 27 07:49:01 toyboy sshd[23110]: Invalid user carrerasoft from 27.156.41.228
Aug 27 07:49:01 toyboy sshd[23110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruse........
-------------------------------
2019-08-27 23:29:12
24.4.128.213 attackspam
Invalid user mailman from 24.4.128.213 port 54248
2019-08-27 23:32:19
218.92.0.188 attack
Aug 27 13:35:18 *** sshd[24990]: User root from 218.92.0.188 not allowed because not listed in AllowUsers
2019-08-27 23:23:19
62.210.136.228 attackspambots
"valentime.com" <3ncWQz4zG@mf5bkh7b.botruck.com> 
LD306D9Y50W5URR@aapmn.uk 
hot-girls Ready to chat 
IP 62.210.136.228
2019-08-27 23:21:59
132.232.181.252 attackbots
Aug 27 15:24:55 microserver sshd[28758]: Invalid user fanadmin from 132.232.181.252 port 40972
Aug 27 15:24:55 microserver sshd[28758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.181.252
Aug 27 15:24:58 microserver sshd[28758]: Failed password for invalid user fanadmin from 132.232.181.252 port 40972 ssh2
Aug 27 15:31:18 microserver sshd[29911]: Invalid user ser from 132.232.181.252 port 57810
Aug 27 15:31:18 microserver sshd[29911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.181.252
Aug 27 15:43:24 microserver sshd[31344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.181.252  user=root
Aug 27 15:43:26 microserver sshd[31344]: Failed password for root from 132.232.181.252 port 34950 ssh2
Aug 27 15:49:10 microserver sshd[31994]: Invalid user sofia from 132.232.181.252 port 51746
Aug 27 15:49:10 microserver sshd[31994]: pam_unix(sshd:auth): authentication f
2019-08-27 23:52:30
98.13.12.86 attack
naichi ping
2019-08-27 23:24:12
116.118.104.57 attackspam
Unauthorized connection attempt from IP address 116.118.104.57 on Port 445(SMB)
2019-08-27 23:46:13
84.113.99.164 attackbotsspam
$f2bV_matches
2019-08-27 23:03:11
114.35.131.187 attackspam
Unauthorized connection attempt from IP address 114.35.131.187 on Port 445(SMB)
2019-08-27 23:59:40
36.22.182.26 attackbotsspam
Unauthorized connection attempt from IP address 36.22.182.26 on Port 445(SMB)
2019-08-27 23:13:59

最近上报的IP列表

183.36.34.69 121.231.113.168 203.25.78.220 43.230.8.77
45.88.91.106 155.102.247.63 155.212.209.222 64.81.158.110
47.87.140.88 110.87.72.99 10.192.41.193 51.159.87.17
34.53.162.177 156.174.65.72 117.161.15.80 111.62.187.84
198.235.24.39 121.41.166.225 178.128.30.185 185.182.185.16