必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.107.4.0 - 103.107.7.255'

% Abuse contact for '103.107.4.0 - 103.107.7.255' is 'noc@itb.ac.id'

inetnum:        103.107.4.0 - 103.107.7.255
netname:        BANDUNG-ID
descr:          Institute of Technology Bandung
country:        ID
org:            ORG-IOTB1-AP
admin-c:        BS1407-AP
tech-c:         BS1407-AP
abuse-c:        AB1357-AP
status:         ASSIGNED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-routes:     MAINT-BANDUNG-AP
mnt-irt:        IRT-BANDUNG-ID
last-modified:  2025-10-09T08:06:33Z
source:         APNIC

irt:            IRT-BANDUNG-ID
address:        Computer Network Research Group
address:        Institute of Technology Bandung
address:        Bandung
e-mail:         noc@itb.ac.id
abuse-mailbox:  noc@itb.ac.id
admin-c:        BS1407-AP
tech-c:         BS1407-AP
auth:           # Filtered
remarks:        noc@itb.ac.id was validated on 2025-10-16
mnt-by:         MAINT-BANDUNG-AP
last-modified:  2025-11-18T00:26:32Z
source:         APNIC

organisation:   ORG-IOTB1-AP
org-name:       Institute of Technology Bandung
org-type:       LIR
country:        ID
address:        JL Ganesha 10
phone:          +62-22-86010037
fax-no:         +62-22-250-0935
e-mail:         noc@itb.ac.id
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:14:43Z
source:         APNIC

role:           ABUSE BANDUNGID
country:        ZZ
address:        Computer Network Research Group
address:        Institute of Technology Bandung
address:        Bandung
phone:          +000000000
e-mail:         noc@itb.ac.id
admin-c:        BS1407-AP
tech-c:         BS1407-AP
nic-hdl:        AB1357-AP
remarks:        Generated from irt object IRT-BANDUNG-ID
remarks:        noc@itb.ac.id was validated on 2025-10-16
abuse-mailbox:  noc@itb.ac.id
mnt-by:         APNIC-ABUSE
last-modified:  2025-10-16T04:19:57Z
source:         APNIC

person:         Basuki Suhardiman
address:        jl ganesha 10 bandung
country:        ID
phone:          +62-22-86010037
e-mail:         basuki@itb.ac.id
nic-hdl:        BS1407-AP
mnt-by:         MAINT-BANDUNG-AP
last-modified:  2025-10-09T07:53:36Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.107.4.60
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38187
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.107.4.60.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040901 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 10 04:30:45 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
60.4.107.103.in-addr.arpa domain name pointer new103-60.itb.ac.id.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
60.4.107.103.in-addr.arpa	name = new103-60.itb.ac.id.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
190.64.213.155 attackbots
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-03-31 18:44:27
185.234.219.23 attackbotsspam
2020-03-31T05:19:19.244155MailD postfix/smtpd[24262]: warning: unknown[185.234.219.23]: SASL LOGIN authentication failed: authentication failure
2020-03-31T06:09:28.920074MailD postfix/smtpd[27551]: warning: unknown[185.234.219.23]: SASL LOGIN authentication failed: authentication failure
2020-03-31T06:59:41.344919MailD postfix/smtpd[30624]: warning: unknown[185.234.219.23]: SASL LOGIN authentication failed: authentication failure
2020-03-31 18:40:10
82.240.54.37 attackbots
Mar 31 12:52:13 ns382633 sshd\[5723\]: Invalid user emalls1 from 82.240.54.37 port 54705
Mar 31 12:52:13 ns382633 sshd\[5723\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.240.54.37
Mar 31 12:52:15 ns382633 sshd\[5723\]: Failed password for invalid user emalls1 from 82.240.54.37 port 54705 ssh2
Mar 31 13:02:49 ns382633 sshd\[7795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.240.54.37  user=root
Mar 31 13:02:51 ns382633 sshd\[7795\]: Failed password for root from 82.240.54.37 port 23833 ssh2
2020-03-31 19:03:06
116.98.120.15 attackspambots
1585626601 - 03/31/2020 05:50:01 Host: 116.98.120.15/116.98.120.15 Port: 445 TCP Blocked
2020-03-31 19:02:09
61.52.96.201 attackbots
Scanning
2020-03-31 19:08:37
46.38.145.4 attack
Mail Bruteforce
2020-03-31 19:12:13
185.36.81.57 attackbots
Mar 31 10:32:08 mail postfix/smtpd\[22742\]: warning: unknown\[185.36.81.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Mar 31 10:55:45 mail postfix/smtpd\[23287\]: warning: unknown\[185.36.81.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Mar 31 11:43:02 mail postfix/smtpd\[24558\]: warning: unknown\[185.36.81.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Mar 31 12:06:39 mail postfix/smtpd\[25158\]: warning: unknown\[185.36.81.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-03-31 18:39:28
45.190.220.6 attack
Mar 30 22:50:35 mailman postfix/smtpd[31610]: NOQUEUE: reject: RCPT from unknown[45.190.220.6]: 554 5.7.1 Service unavailable; Client host [45.190.220.6] blocked using sbl-xbl.spamhaus.org; https://www.spamhaus.org/query/ip/45.190.220.6 / https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=
Mar 30 22:50:35 mailman postfix/smtpd[31610]: NOQUEUE: reject: RCPT from unknown[45.190.220.6]: 554 5.7.1 Service unavailable; Client host [45.190.220.6] blocked using sbl-xbl.spamhaus.org; https://www.spamhaus.org/query/ip/45.190.220.6 / https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=
2020-03-31 18:33:05
202.191.200.227 attack
2020-03-30 UTC: (30x) - ch,curt,dkp,edwin,fgh,gbj,geri,gv,it,jye,kacper,mzk,nginx,nproc,nvt,pramod,qah,qvf,rsl,rzk,tatjana,teamcity,uto,uuj,val,wk,wsk,xen,y,zhonghaoxi
2020-03-31 18:36:20
36.70.121.210 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 31-03-2020 04:50:16.
2020-03-31 18:49:41
203.147.76.146 attackspam
(imapd) Failed IMAP login from 203.147.76.146 (NC/New Caledonia/host-203-147-76-146.h29.canl.nc): 1 in the last 3600 secs
2020-03-31 18:47:21
206.189.193.135 attackbotsspam
SSH Brute-Force Attack
2020-03-31 18:53:43
223.71.167.164 attackbots
Unauthorized connection attempt detected from IP address 223.71.167.164 to port 2083
2020-03-31 18:26:46
180.242.223.243 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 31-03-2020 04:50:15.
2020-03-31 18:50:37
27.54.51.69 attackbots
firewall-block, port(s): 81/tcp
2020-03-31 19:01:04

最近上报的IP列表

2606:4700:10::ac43:1261 2606:4700:10::6814:6998 164.155.74.67 3.92.180.146
18.205.150.207 14.213.27.57 102.90.115.166 100.48.87.238
45.166.96.25 209.173.247.210 2606:4700:10::6814:7917 2606:4700:10::6814:8451
2606:4700:10::6816:707 2606:4700:10::6816:3003 2606:4700:10::6816:4424 2606:4700:10::6814:6687
2606:4700:10::6816:459 2606:4700:10::ac43:2438 2606:4700:10::6816:4949 2606:4700:10::6816:1828