必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Kuala Lumpur

省份(region): Kuala Lumpur

国家(country): Malaysia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.116.46.0 - 103.116.46.255'

% Abuse contact for '103.116.46.0 - 103.116.46.255' is 'abuse@wawahost.com.my'

inetnum:        103.116.46.0 - 103.116.46.255
netname:        WAWAHOST-MY
descr:          World First Communication LTD
descr:          https://zerodesk.net/geofeed.csv
country:        MY
geoloc:         3.1495654 101.7062673
admin-c:        WTA1-AP
tech-c:         WTA1-AP
abuse-c:        AW1040-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-WAWAHOST-MY
mnt-irt:        IRT-WAWAHOST-MY
last-modified:  2025-08-12T11:05:02Z
source:         APNIC

irt:            IRT-WAWAHOST-MY
address:        NO 60, JALAN KRUBONG HEIGHT 11,
address:        TAMAN KRUBONG HEIGHT, 75250,
address:        MELAKA, MALAYSIA.
e-mail:         admin@wawahost.com.my
abuse-mailbox:  abuse@wawahost.com.my
admin-c:        WTA1-AP
tech-c:         WTA1-AP
auth:           # Filtered
remarks:        admin@wawahost.com.my was validated on 2025-12-30
remarks:        abuse@wawahost.com.my was validated on 2025-12-30
mnt-by:         MAINT-WAWAHOST-MY
last-modified:  2025-12-30T13:11:54Z
source:         APNIC

role:           ABUSE WAWAHOSTMY
country:        ZZ
address:        NO 60, JALAN KRUBONG HEIGHT 11,
address:        TAMAN KRUBONG HEIGHT, 75250,
address:        MELAKA, MALAYSIA.
phone:          +000000000
e-mail:         admin@wawahost.com.my
admin-c:        WTA1-AP
tech-c:         WTA1-AP
nic-hdl:        AW1040-AP
remarks:        Generated from irt object IRT-WAWAHOST-MY
remarks:        admin@wawahost.com.my was validated on 2025-12-30
remarks:        abuse@wawahost.com.my was validated on 2025-12-30
abuse-mailbox:  abuse@wawahost.com.my
mnt-by:         APNIC-ABUSE
last-modified:  2025-12-30T13:12:23Z
source:         APNIC

role:           WAWAHOST TECHNOLOGY Administrator
address:        NO 60, JALAN KRUBONG HEIGHT 11,
address:        TAMAN KRUBONG HEIGHT, 75250,
address:        MELAKA, MALAYSIA.
country:        MY
phone:          +60-105101111
e-mail:         abuse@wawahost.com.my
admin-c:        WTA1-AP
tech-c:         WTA1-AP
nic-hdl:        WTA1-AP
mnt-by:         MAINT-WAWAHOST-MY
last-modified:  2024-10-03T16:20:04Z
remarks:        -+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+
remarks:        This IP address is being used by WAWAHOST's Customer
remarks:        Please contact abuse@wawahost.com.my
remarks:        For any abuse activity originated from this IP address
remarks:        -+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+
source:         APNIC

% Information related to '103.116.46.0/24AS213607'

route:          103.116.46.0/24
origin:         AS213607
descr:          LIGHT CLOUD - ROUTE OBJECT
mnt-by:         MAINT-WAWAHOST-MY
last-modified:  2025-08-13T09:38:20Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.116.46.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40677
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.116.46.4.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040300 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 03 18:47:38 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
Host 4.46.116.103.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 4.46.116.103.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
113.6.251.197 attackspambots
Jun 30 14:17:14 ns381471 sshd[12531]: Failed password for root from 113.6.251.197 port 40131 ssh2
Jun 30 14:25:05 ns381471 sshd[12927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.6.251.197
2020-06-30 20:48:06
117.31.109.144 attackbotsspam
Icarus honeypot on github
2020-06-30 20:10:00
14.29.56.246 attackspam
Jun 30 14:25:07 santamaria sshd\[12077\]: Invalid user lky from 14.29.56.246
Jun 30 14:25:07 santamaria sshd\[12077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.56.246
Jun 30 14:25:09 santamaria sshd\[12077\]: Failed password for invalid user lky from 14.29.56.246 port 42784 ssh2
...
2020-06-30 20:42:05
191.8.164.172 attack
Jun 30 11:20:00 localhost sshd\[29809\]: Invalid user rcg from 191.8.164.172 port 48298
Jun 30 11:20:00 localhost sshd\[29809\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.8.164.172
Jun 30 11:20:02 localhost sshd\[29809\]: Failed password for invalid user rcg from 191.8.164.172 port 48298 ssh2
...
2020-06-30 20:15:22
31.206.69.66 attackbotsspam
$f2bV_matches
2020-06-30 20:32:01
51.75.250.45 attackbots
Jun 30 14:25:05 pve1 sshd[24134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.250.45 
Jun 30 14:25:06 pve1 sshd[24134]: Failed password for invalid user sw from 51.75.250.45 port 46286 ssh2
...
2020-06-30 20:44:42
103.105.27.141 attackbots
Icarus honeypot on github
2020-06-30 20:38:22
145.255.31.188 attackspambots
$f2bV_matches
2020-06-30 20:50:23
222.186.190.14 attack
Jun 30 14:37:36 piServer sshd[11362]: Failed password for root from 222.186.190.14 port 35369 ssh2
Jun 30 14:37:40 piServer sshd[11362]: Failed password for root from 222.186.190.14 port 35369 ssh2
Jun 30 14:37:43 piServer sshd[11362]: Failed password for root from 222.186.190.14 port 35369 ssh2
...
2020-06-30 20:38:58
51.137.79.150 attackbots
2020-06-30T09:04:44.121326snf-827550 sshd[15358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.137.79.150
2020-06-30T09:04:44.107130snf-827550 sshd[15358]: Invalid user j from 51.137.79.150 port 48382
2020-06-30T09:04:46.674920snf-827550 sshd[15358]: Failed password for invalid user j from 51.137.79.150 port 48382 ssh2
...
2020-06-30 20:09:12
120.138.126.189 attackspambots
Brute forcing RDP port 3389
2020-06-30 20:46:40
120.132.14.42 attackbotsspam
Jun 30 14:25:14 raspberrypi sshd[10883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.14.42 
Jun 30 14:25:16 raspberrypi sshd[10883]: Failed password for invalid user ftpsecure from 120.132.14.42 port 33694 ssh2
...
2020-06-30 20:31:05
24.225.21.210 attack
Jun 30 12:25:00 ip-172-31-62-245 sshd\[8878\]: Invalid user admin from 24.225.21.210\
Jun 30 12:25:02 ip-172-31-62-245 sshd\[8878\]: Failed password for invalid user admin from 24.225.21.210 port 54200 ssh2\
Jun 30 12:25:04 ip-172-31-62-245 sshd\[8885\]: Failed password for root from 24.225.21.210 port 54289 ssh2\
Jun 30 12:25:05 ip-172-31-62-245 sshd\[8887\]: Invalid user admin from 24.225.21.210\
Jun 30 12:25:06 ip-172-31-62-245 sshd\[8887\]: Failed password for invalid user admin from 24.225.21.210 port 54371 ssh2\
2020-06-30 20:47:17
190.0.40.70 attackspam
Lines containing failures of 190.0.40.70
Jun 29 22:47:56 nxxxxxxx sshd[14525]: Invalid user riccardo from 190.0.40.70 port 59590
Jun 29 22:47:56 nxxxxxxx sshd[14525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.0.40.70
Jun 29 22:47:58 nxxxxxxx sshd[14525]: Failed password for invalid user riccardo from 190.0.40.70 port 59590 ssh2
Jun 29 22:47:58 nxxxxxxx sshd[14525]: Received disconnect from 190.0.40.70 port 59590:11: Bye Bye [preauth]
Jun 29 22:47:58 nxxxxxxx sshd[14525]: Disconnected from invalid user riccardo 190.0.40.70 port 59590 [preauth]
Jun 29 22:55:30 nxxxxxxx sshd[15537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.0.40.70  user=r.r
Jun 29 22:55:33 nxxxxxxx sshd[15537]: Failed password for r.r from 190.0.40.70 port 47288 ssh2
Jun 29 22:55:33 nxxxxxxx sshd[15537]: Received disconnect from 190.0.40.70 port 47288:11: Bye Bye [preauth]
Jun 29 22:55:33 nxxxxxxx sshd[15537........
------------------------------
2020-06-30 20:32:26
150.158.178.137 attackbots
Invalid user love from 150.158.178.137 port 40818
2020-06-30 20:23:48

最近上报的IP列表

8.163.63.8 66.132.172.213 180.153.236.60 180.153.236.212
180.153.236.201 2606:4700:10::6816:2300 134.35.157.130 2606:4700:10::6814:6009
178.200.217.26 209.38.101.158 255.96.99.39 2606:4700:10::6816:3929
2606:4700:10::6814:7821 2606:4700:10::6816:1312 2606:4700:10::ac43:2087 2606:4700:10::6816:1355
134.35.157.157 2606:4700:10::6814:9311 2606:4700:10::6814:4811 2606:4700:10::6814:9804