必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Hong Kong

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.121.92.0 - 103.121.95.255'

% Abuse contact for '103.121.92.0 - 103.121.95.255' is 'abuse@255.hk'

inetnum:        103.121.92.0 - 103.121.95.255
netname:        FTL-HK
descr:          FOJIP TECHNOLOGY LIMITED
country:        HK
org:            ORG-FTL5-AP
admin-c:        FTLA2-AP
tech-c:         FTLA2-AP
status:         ASSIGNED PORTABLE
abuse-c:        AF752-AP
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-routes:     MAINT-FTL-HK
mnt-irt:        IRT-FTL-HK
last-modified:  2025-05-01T02:45:09Z
source:         APNIC

irt:            IRT-FTL-HK
address:        RM4,16/F,HO KING COMM CTR,2-16 FAYUEN ST, MONGKOK,KOWLOON HONG KONG 999077
e-mail:         abuse@255.hk
abuse-mailbox:  abuse@255.hk
admin-c:        FTLA2-AP
tech-c:         FTLA2-AP
auth:           # Filtered
remarks:        abuse@255.hk was validated on 2025-10-15
mnt-by:         MAINT-FTL-HK
last-modified:  2025-11-18T00:36:00Z
source:         APNIC

organisation:   ORG-FTL5-AP
org-name:       FOJIP TECHNOLOGY LIMITED
org-type:       LIR
country:        HK
address:        RM4,16/F,HO KING COMM CTR,2-16 FAYUEN ST
phone:          +852-9649-4010
e-mail:         fojip@fojip.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:18:50Z
source:         APNIC

role:           ABUSE FTLHK
country:        ZZ
address:        RM4,16/F,HO KING COMM CTR,2-16 FAYUEN ST, MONGKOK,KOWLOON HONG KONG 999077
phone:          +000000000
e-mail:         abuse@255.hk
admin-c:        FTLA2-AP
tech-c:         FTLA2-AP
nic-hdl:        AF752-AP
remarks:        Generated from irt object IRT-FTL-HK
remarks:        abuse@255.hk was validated on 2025-10-15
abuse-mailbox:  abuse@255.hk
mnt-by:         APNIC-ABUSE
last-modified:  2025-10-15T01:20:32Z
source:         APNIC

role:           FOJIP TECHNOLOGY LIMITED administrator
address:        RM4,16/F,HO KING COMM CTR,2-16 FAYUEN ST, MONGKOK,KOWLOON HONG KONG 999077
country:        HK
phone:          +852-9649-4010
e-mail:         support@fojip.com
admin-c:        FTLA2-AP
tech-c:         FTLA2-AP
nic-hdl:        FTLA2-AP
mnt-by:         MAINT-FTL-HK
last-modified:  2022-04-27T06:31:08Z
source:         APNIC

% Information related to '103.121.95.0/24AS137899'

route:          103.121.95.0/24
origin:         AS137899
descr:          FOJIP TECHNOLOGY LIMITED
                RM4,16/F,HO KING COMM CTR,2-16 FAYUEN ST
mnt-by:         MAINT-FTL-HK
last-modified:  2025-05-15T11:59:19Z
source:         APNIC

% Information related to '103.121.95.0/24AS142032'

route:          103.121.95.0/24
origin:         AS142032
descr:          FOJIP TECHNOLOGY LIMITED
                RM4,16/F,HO KING COMM CTR,2-16 FAYUEN ST
mnt-by:         MAINT-FTL-HK
last-modified:  2025-05-15T11:59:26Z
source:         APNIC

% Information related to '103.121.95.0/24AS35876'

route:          103.121.95.0/24
origin:         AS35876
descr:          FOJIP TECHNOLOGY LIMITED
                RM4,16/F,HO KING COMM CTR,2-16 FAYUEN ST
mnt-by:         MAINT-FTL-HK
last-modified:  2025-05-15T11:59:36Z
source:         APNIC

% Information related to '103.121.95.0/24AS36642'

route:          103.121.95.0/24
origin:         AS36642
descr:          FOJIP TECHNOLOGY LIMITED
                RM4,16/F,HO KING COMM CTR,2-16 FAYUEN ST
mnt-by:         MAINT-FTL-HK
last-modified:  2025-05-15T11:59:42Z
source:         APNIC

% Information related to '103.121.95.0/24AS401696'

route:          103.121.95.0/24
origin:         AS401696
descr:          FOJIP TECHNOLOGY LIMITED
                RM4,16/F,HO KING COMM CTR,2-16 FAYUEN ST
mnt-by:         MAINT-FTL-HK
last-modified:  2025-06-09T08:03:05Z
source:         APNIC

% Information related to '103.121.95.0/24AS401701'

route:          103.121.95.0/24
origin:         AS401701
descr:          FOJIP TECHNOLOGY LIMITED
                RM4,16/F,HO KING COMM CTR,2-16 FAYUEN ST
mnt-by:         MAINT-FTL-HK
last-modified:  2025-06-09T08:03:10Z
source:         APNIC

% Information related to '103.121.95.0/24AS40779'

route:          103.121.95.0/24
origin:         AS40779
descr:          FOJIP TECHNOLOGY LIMITED
                RM4,16/F,HO KING COMM CTR,2-16 FAYUEN ST
mnt-by:         MAINT-FTL-HK
last-modified:  2025-05-15T11:59:31Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.121.95.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52322
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.121.95.193.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041701 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 17 17:16:07 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 193.95.121.103.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 193.95.121.103.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
54.37.157.88 attack
Feb 25 00:46:35 srv01 sshd[31287]: Invalid user www from 54.37.157.88 port 44819
Feb 25 00:46:35 srv01 sshd[31287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.157.88
Feb 25 00:46:35 srv01 sshd[31287]: Invalid user www from 54.37.157.88 port 44819
Feb 25 00:46:37 srv01 sshd[31287]: Failed password for invalid user www from 54.37.157.88 port 44819 ssh2
Feb 25 00:51:15 srv01 sshd[31614]: Invalid user magda from 54.37.157.88 port 55038
...
2020-02-25 10:55:23
113.110.54.226 attack
2020-02-25T00:22:50.099038 X postfix/smtpd[5329]: lost connection after AUTH from unknown[113.110.54.226]
2020-02-25T00:22:50.980665 X postfix/smtpd[5329]: lost connection after AUTH from unknown[113.110.54.226]
2020-02-25T00:22:51.868237 X postfix/smtpd[5329]: lost connection after AUTH from unknown[113.110.54.226]
2020-02-25 10:26:36
152.136.23.178 attackspambots
$f2bV_matches
2020-02-25 10:28:17
122.152.220.161 attackspambots
Feb 25 03:13:57 silence02 sshd[5634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.220.161
Feb 25 03:13:59 silence02 sshd[5634]: Failed password for invalid user sai from 122.152.220.161 port 36946 ssh2
Feb 25 03:18:34 silence02 sshd[6017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.220.161
2020-02-25 10:39:53
62.195.253.142 attack
Honeypot attack, port: 5555, PTR: i253142.upc-i.chello.nl.
2020-02-25 10:28:48
54.36.106.204 attack
[2020-02-24 20:33:05] NOTICE[1148] chan_sip.c: Registration from '' failed for '54.36.106.204:53024' - Wrong password
[2020-02-24 20:33:05] SECURITY[1163] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-02-24T20:33:05.676-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="900",SessionID="0x7fd82c6cd778",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/54.36.106.204/53024",Challenge="399d833e",ReceivedChallenge="399d833e",ReceivedHash="d8f9717d6d48490c0c83b2d81070682a"
[2020-02-24 20:33:34] NOTICE[1148] chan_sip.c: Registration from '' failed for '54.36.106.204:60086' - Wrong password
[2020-02-24 20:33:34] SECURITY[1163] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-02-24T20:33:34.160-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="1000",SessionID="0x7fd82c7af4d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/54.36.106.204/6
...
2020-02-25 10:57:08
125.161.106.216 attack
Lines containing failures of 125.161.106.216
Feb 25 00:20:03 shared11 sshd[17061]: Invalid user admin from 125.161.106.216 port 25502
Feb 25 00:20:03 shared11 sshd[17061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.161.106.216
Feb 25 00:20:05 shared11 sshd[17061]: Failed password for invalid user admin from 125.161.106.216 port 25502 ssh2
Feb 25 00:20:06 shared11 sshd[17061]: Connection closed by invalid user admin 125.161.106.216 port 25502 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=125.161.106.216
2020-02-25 10:35:14
92.118.38.58 attackspam
2020-02-25 03:23:27 dovecot_login authenticator failed for \(User\) \[92.118.38.58\]: 535 Incorrect authentication data \(set_id=bactrian@no-server.de\)
2020-02-25 03:23:28 dovecot_login authenticator failed for \(User\) \[92.118.38.58\]: 535 Incorrect authentication data \(set_id=bactrian@no-server.de\)
2020-02-25 03:23:33 dovecot_login authenticator failed for \(User\) \[92.118.38.58\]: 535 Incorrect authentication data \(set_id=bactrian@no-server.de\)
2020-02-25 03:23:36 dovecot_login authenticator failed for \(User\) \[92.118.38.58\]: 535 Incorrect authentication data \(set_id=bactrian@no-server.de\)
2020-02-25 03:23:58 dovecot_login authenticator failed for \(User\) \[92.118.38.58\]: 535 Incorrect authentication data \(set_id=bacula@no-server.de\)
...
2020-02-25 10:24:59
119.40.33.22 attack
Feb 25 02:48:49 server sshd[1310902]: Failed password for invalid user administrator from 119.40.33.22 port 34760 ssh2
Feb 25 02:56:12 server sshd[1312539]: Failed password for invalid user angel from 119.40.33.22 port 53589 ssh2
Feb 25 03:03:31 server sshd[1314088]: Failed password for invalid user admin from 119.40.33.22 port 44192 ssh2
2020-02-25 10:51:23
188.213.165.189 attack
SSH brute force
2020-02-25 10:19:20
222.186.30.57 attackbots
Feb 25 03:46:02 v22018076622670303 sshd\[20228\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.57  user=root
Feb 25 03:46:04 v22018076622670303 sshd\[20228\]: Failed password for root from 222.186.30.57 port 41053 ssh2
Feb 25 03:46:06 v22018076622670303 sshd\[20228\]: Failed password for root from 222.186.30.57 port 41053 ssh2
...
2020-02-25 10:46:55
77.79.132.44 attack
Honeypot attack, port: 81, PTR: 77.79.132.44.static.neft.ufanet.ru.
2020-02-25 10:17:57
150.223.13.40 attack
Feb 25 00:22:24 localhost sshd\[12143\]: Invalid user mother from 150.223.13.40 port 44811
Feb 25 00:22:24 localhost sshd\[12143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.223.13.40
Feb 25 00:22:27 localhost sshd\[12143\]: Failed password for invalid user mother from 150.223.13.40 port 44811 ssh2
2020-02-25 10:58:15
41.224.59.78 attackbots
Feb 25 00:25:55 *** sshd[28738]: Invalid user ubnt from 41.224.59.78
2020-02-25 10:48:52
188.166.53.237 attackspambots
Feb 25 02:13:50 zeus sshd[5829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.53.237 
Feb 25 02:13:52 zeus sshd[5829]: Failed password for invalid user dev from 188.166.53.237 port 40674 ssh2
Feb 25 02:16:33 zeus sshd[5885]: Failed password for root from 188.166.53.237 port 51710 ssh2
2020-02-25 10:38:25

最近上报的IP列表

88.101.166.185 125.78.75.248 35.209.185.59 162.216.150.206
191.79.218.214 2606:4700:10::ac43:1445 2606:4700:10::6816:4031 2606:4700:10::ac43:1249
2606:4700:10::6814:5276 2606:4700:10::ac43:856 2606:4700:10::6814:8088 164.155.74.84
139.177.194.152 108.157.0.0 34.78.67.0 103.153.183.126
94.231.206.105 100.115.230.38 213.222.235.132 2606:4700:10::ac43:2340