必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): India

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
103.111.20.87 attackspambots
Unauthorized connection attempt detected from IP address 103.111.20.87 to port 80
2020-03-21 17:37:40
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.111.20.0 - 103.111.23.255'

% Abuse contact for '103.111.20.0 - 103.111.23.255' is 'ajay@kwikzo.co.in'

inetnum:        103.111.20.0 - 103.111.23.255
netname:        KWIKZOT
descr:          Kwikzo Telecomm Pvt Ltd
admin-c:        AW790-AP
tech-c:         MN770-AP
country:        IN
mnt-by:         MAINT-IN-IRINN
mnt-lower:      MAINT-IN-KWIKZO
mnt-lower:      MAINT-IN-IRINN
mnt-routes:     MAINT-IN-KWIKZO
mnt-routes:     MAINT-IN-IRINN
mnt-irt:        IRT-KWIKZO-IN
status:         ALLOCATED PORTABLE
last-modified:  2025-08-11T22:50:01Z
source:         APNIC

irt:            IRT-KWIKZO-IN
address:        402,2nd Floor,MUGHAL CANAL,Delhi
e-mail:         ajay@kwikzo.co.in
abuse-mailbox:  ajay@kwikzo.co.in
admin-c:        MA735-AP
tech-c:         MA735-AP
auth:           # Filtered
mnt-by:         MAINT-IN-KWIKZO
mnt-by:         MAINT-IN-IRINN
last-modified:  2026-02-10T04:57:11Z
source:         APNIC

role:           Manager Noc
address:        SCO 402, 2nd floor, Mugal Canal,Karnal,Haryana-132001
country:        IN
phone:          +91 01844022402
e-mail:         prateekwadhwa@kwikzo.co.in
admin-c:        AW790-AP
tech-c:         AW790-AP
nic-hdl:        MN770-AP
mnt-by:         MAINT-IN-KWIKZO
mnt-by:         MAINT-IN-IRINN
last-modified:  2025-09-27T10:01:30Z
source:         APNIC

person:         AJAY WADHWA
address:        SCO 402, 2nd floor, Mugal Canal,Karnal,Haryana-132001
country:        IN
phone:          +91 01844022402
e-mail:         ajaywadhwa214@gmail.com
nic-hdl:        AW790-AP
mnt-by:         MAINT-IN-KWIKZO
mnt-by:         MAINT-IN-IRINN
last-modified:  2025-09-27T10:01:30Z
source:         APNIC

% Information related to '103.111.20.0/24AS137114'

route:          103.111.20.0/24
descr:          Route Object
country:        IN
origin:         AS137114
mnt-by:         MAINT-IN-KWIKZO
mnt-by:         MAINT-IN-IRINN
mnt-routes:     MAINT-IN-IRINN
last-modified:  2025-12-14T22:21:24Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.111.20.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49226
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.111.20.2.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026030100 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 01 21:01:48 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
b'Host 2.20.111.103.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 103.111.20.2.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
2.203.126.8 attackspam
2019-06-22 02:59:52 1heUNg-0005r2-5M SMTP connection from dslb-002-203-126-008.002.203.pools.vodafone-ip.de \[2.203.126.8\]:44598 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-06-22 03:00:40 1heUOT-0005uG-Jo SMTP connection from dslb-002-203-126-008.002.203.pools.vodafone-ip.de \[2.203.126.8\]:44805 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-06-22 03:01:05 1heUOr-0005uk-C2 SMTP connection from dslb-002-203-126-008.002.203.pools.vodafone-ip.de \[2.203.126.8\]:44912 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-30 01:50:41
2.25.144.144 attackspam
2019-06-22 04:46:04 1heW2S-0008Md-Eh SMTP connection from \(\[2.25.144.144\]\) \[2.25.144.144\]:41235 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-06-22 04:46:25 1heW2m-0008Mx-C6 SMTP connection from \(\[2.25.144.144\]\) \[2.25.144.144\]:41314 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-06-22 04:46:41 1heW34-0008NC-3z SMTP connection from \(\[2.25.144.144\]\) \[2.25.144.144\]:41381 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-30 01:37:47
2.25.106.153 attackbots
2020-01-24 23:17:47 1iv7Gs-0005zl-4e SMTP connection from \(\[2.25.106.153\]\) \[2.25.106.153\]:14516 I=\[193.107.88.166\]:25 closed by DROP in ACL
2020-01-24 23:18:02 1iv7H6-000601-U7 SMTP connection from \(\[2.25.106.153\]\) \[2.25.106.153\]:14610 I=\[193.107.88.166\]:25 closed by DROP in ACL
2020-01-24 23:18:14 1iv7HI-00060l-2Q SMTP connection from \(\[2.25.106.153\]\) \[2.25.106.153\]:14689 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-30 01:40:41
18.185.179.225 attack
Trying to log into mailserver (postfix/smtp) using multiple names and passwords
2020-01-30 01:27:27
122.51.151.161 attackspambots
445/tcp
[2020-01-29]1pkt
2020-01-30 01:57:24
92.63.194.90 attack
Jan 29 18:14:02 localhost sshd\[328\]: Invalid user admin from 92.63.194.90 port 43646
Jan 29 18:14:02 localhost sshd\[328\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.90
Jan 29 18:14:04 localhost sshd\[328\]: Failed password for invalid user admin from 92.63.194.90 port 43646 ssh2
2020-01-30 01:27:02
216.10.242.28 attackspam
Unauthorized connection attempt detected from IP address 216.10.242.28 to port 2220 [J]
2020-01-30 01:22:42
75.16.168.140 attackbots
Unauthorized connection attempt detected from IP address 75.16.168.140 to port 23 [J]
2020-01-30 01:24:54
114.38.36.45 attack
23/tcp
[2020-01-29]1pkt
2020-01-30 01:56:26
121.233.166.145 attack
23/tcp
[2020-01-29]1pkt
2020-01-30 01:41:31
200.74.156.99 attackspam
Unauthorized connection attempt from IP address 200.74.156.99 on Port 445(SMB)
2020-01-30 01:54:35
177.38.97.26 attackspambots
Unauthorized connection attempt from IP address 177.38.97.26 on Port 445(SMB)
2020-01-30 01:56:55
2.88.180.194 attack
2019-07-07 09:06:19 1hk1Fa-0000wK-E6 SMTP connection from \(\[2.88.180.194\]\) \[2.88.180.194\]:9611 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-07 09:06:46 1hk1G0-0000wh-M3 SMTP connection from \(\[2.88.180.194\]\) \[2.88.180.194\]:36320 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-07 09:07:00 1hk1GF-0000wt-Gc SMTP connection from \(\[2.88.180.194\]\) \[2.88.180.194\]:9887 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-30 01:21:29
77.247.110.63 attackbots
[portscan] tcp/81 [alter-web/web-proxy]
*(RWIN=1024)(01291848)
2020-01-30 01:57:49
2.30.113.232 attackbotsspam
2019-03-11 17:19:35 H=\(\[2.30.113.232\]\) \[2.30.113.232\]:12383 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-11 17:19:46 H=\(\[2.30.113.232\]\) \[2.30.113.232\]:12442 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-11 17:19:58 H=\(\[2.30.113.232\]\) \[2.30.113.232\]:12513 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
...
2020-01-30 01:33:33

最近上报的IP列表

2606:4700:10::6814:6305 2606:4700:10::6814:7812 121.230.89.33 2606:4700:10::6816:3359
2606:4700:10::6816:2546 2606:4700:10::6814:6627 2606:4700:10::6816:1014 2606:4700:10::6816:3070
36.143.98.183 134.35.157.31 2606:4700:10::ac43:1135 110.78.138.84
2606:4700:10::6816:3315 2606:4700:10::ac43:2039 2606:4700:10::6814:4816 2606:4700:10::ac43:2327
2606:4700:10::6814:5245 2606:4700:10::ac43:1292 2606:4700:10::6814:7970 2606:4700:10::6814:8290