必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
103.119.141.94 attack
20/9/1@08:26:01: FAIL: Alarm-Intrusion address from=103.119.141.94
...
2020-09-02 05:08:19
103.119.141.157 attack
Unauthorized connection attempt from IP address 103.119.141.157 on Port 445(SMB)
2020-04-07 03:57:15
103.119.141.203 attack
[Tue Jan 07 03:27:50.991155 2020] [access_compat:error] [pid 8242] [client 103.119.141.203:48952] AH01797: client denied by server configuration: /var/www/html/luke/wp-login.php, referer: https://lukegirvin.co.uk/wp-login.php
...
2020-03-04 03:10:20
103.119.141.147 attackbots
Unauthorized connection attempt from IP address 103.119.141.147 on Port 445(SMB)
2020-02-03 20:58:57
103.119.141.46 attackbotsspam
Unauthorized connection attempt from IP address 103.119.141.46 on Port 445(SMB)
2020-01-15 06:15:57
103.119.141.142 attack
Autoban   103.119.141.142 AUTH/CONNECT
2019-11-18 20:40:45
103.119.141.125 attack
SpamReport
2019-11-07 15:16:08
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.119.141.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27938
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.119.141.20.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 75 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 03:01:31 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
20.141.119.103.in-addr.arpa domain name pointer ip-141-20.balifiber.id.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
20.141.119.103.in-addr.arpa	name = ip-141-20.balifiber.id.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.243.182.57 attack
Port Scan: TCP/25
2019-09-25 08:36:59
196.52.43.55 attackspam
09/24/2019-19:14:27.207594 196.52.43.55 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-25 08:49:31
113.59.129.105 attackbots
Port Scan: TCP/84
2019-09-25 08:41:29
196.52.43.56 attackbots
Port Scan: TCP/5904
2019-09-25 08:09:02
12.40.199.250 attackspam
Port Scan: UDP/137
2019-09-25 08:47:35
75.140.9.37 attackbots
Port Scan: UDP/10554
2019-09-25 08:18:57
186.88.123.106 attack
Port Scan: TCP/445
2019-09-25 08:36:30
69.167.162.141 attackbotsspam
Port Scan: TCP/445
2019-09-25 08:43:53
117.37.144.197 attack
Port Scan: TCP/23
2019-09-25 08:14:41
80.147.78.168 attackbotsspam
Port Scan: TCP/82
2019-09-25 08:29:16
160.153.156.47 attackspambots
Port Scan: TCP/443
2019-09-25 08:12:19
93.179.69.53 attackspam
Attempts to deliver email spam by spoofing receiving hostname.
2019-09-25 08:28:28
209.64.1.130 attackspambots
Port Scan: UDP/137
2019-09-25 08:49:01
98.174.164.201 attackspambots
Port Scan: UDP/137
2019-09-25 08:16:25
187.113.240.220 attackspam
Port Scan: TCP/445
2019-09-25 08:25:21

最近上报的IP列表

103.117.220.20 103.119.167.227 103.119.165.206 103.119.254.170
103.120.130.9 103.120.126.175 103.120.169.177 103.120.173.239
103.120.19.124 103.120.223.157 103.120.210.191 103.12.68.92
103.134.79.126 103.134.26.147 103.135.39.44 103.134.27.88
103.135.32.156 103.135.132.110 103.134.255.95 103.135.199.69