必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Tokyo

省份(region): Tokyo

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.127.240.0 - 103.127.243.255'

% Abuse contact for '103.127.240.0 - 103.127.243.255' is 'support@hncloud.com'

inetnum:        103.127.240.0 - 103.127.243.255
netname:        HKCICL-HK
descr:          Hong Kong Communications International Co., Limited
country:        HK
org:            ORG-HKCI2-AP
admin-c:        HKCI1-AP
tech-c:         HKCI1-AP
abuse-c:        AH1111-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-routes:     MAINT-HKCICL-HK
mnt-lower:      MAINT-HKCICL-HK
mnt-irt:        IRT-HKCICL-HK
last-modified:  2025-06-20T06:33:20Z
geofeed:        https://udc.hk/geofeed.csv
source:         APNIC

irt:            IRT-HKCICL-HK
address:        FLAT B, 23/F, TOWER 2, 873 LAI CHI KOK ROAD, ONE WEST KOWLOON, CHEUNG SHA WAN, KOWLOON, HONG KONG
e-mail:         support@hncloud.com
abuse-mailbox:  support@hncloud.com
admin-c:        HKCI1-AP
tech-c:         HKCI1-AP
auth:           # Filtered
remarks:        support@hncloud.com was validated on 2026-02-25
mnt-by:         MAINT-HKCICL-HK
last-modified:  2026-02-25T06:26:38Z
source:         APNIC

organisation:   ORG-HKCI2-AP
org-name:       Hong Kong Communications International Co., Limited
org-type:       LIR
country:        HK
address:        FLAT B, 23/F, TOWER 2
address:        873 LAI CHI KOK ROAD
address:        ONE WEST KOWLOON, CHEUNG SHA WAN, KOWLOON
phone:          +852-65092515
e-mail:         alan@udc.hk
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:18:06Z
source:         APNIC

role:           ABUSE HKCICLHK
country:        ZZ
address:        FLAT B, 23/F, TOWER 2, 873 LAI CHI KOK ROAD, ONE WEST KOWLOON, CHEUNG SHA WAN, KOWLOON, HONG KONG
phone:          +000000000
e-mail:         support@hncloud.com
admin-c:        HKCI1-AP
tech-c:         HKCI1-AP
nic-hdl:        AH1111-AP
remarks:        Generated from irt object IRT-HKCICL-HK
remarks:        support@hncloud.com was validated on 2026-02-25
abuse-mailbox:  support@hncloud.com
mnt-by:         APNIC-ABUSE
last-modified:  2026-02-25T06:27:01Z
source:         APNIC

role:           Hong Kong Communications International Co Limite
address:        FLAT B, 23/F, TOWER 2, 873 LAI CHI KOK ROAD, ONE WEST KOWLOON, CHEUNG SHA WAN, KOWLOON, HONG KONG
country:        HK
phone:          +852-65092515
e-mail:         alan@udc.hk
admin-c:        HKCI1-AP
tech-c:         HKCI1-AP
nic-hdl:        HKCI1-AP
mnt-by:         MAINT-HKCICL-HK
last-modified:  2024-01-25T12:46:44Z
source:         APNIC

% Information related to '103.127.243.0/24AS137535'

route:          103.127.243.0/24
origin:         AS137535
descr:          Hong Kong Communications International Co., Limited
                FLAT B, 23/F, TOWER 2
                873 LAI CHI KOK ROAD
                ONE WEST KOWLOON, CHEUNG SHA WAN, KOWLOON
mnt-by:         MAINT-HKCICL-HK
last-modified:  2025-05-06T09:05:25Z
source:         APNIC

% Information related to '103.127.243.0/24AS140227'

route:          103.127.243.0/24
origin:         AS140227
descr:          Hong Kong Communications International Co., Limited
                FLAT B, 23/F, TOWER 2
                873 LAI CHI KOK ROAD
                ONE WEST KOWLOON, CHEUNG SHA WAN, KOWLOON
mnt-by:         MAINT-HKCICL-HK
last-modified:  2025-11-17T09:09:23Z
source:         APNIC

% Information related to '103.127.243.0/24AS395886'

route:          103.127.243.0/24
origin:         AS395886
descr:          Hong Kong Communications International Co., Limited
                FLAT B, 23/F, TOWER 2
                873 LAI CHI KOK ROAD
                ONE WEST KOWLOON, CHEUNG SHA WAN, KOWLOON
mnt-by:         MAINT-HKCICL-HK
last-modified:  2025-06-23T09:31:13Z
source:         APNIC

% Information related to '103.127.243.0/24AS8796'

route:          103.127.243.0/24
origin:         AS8796
descr:          Hong Kong Communications International Co., Limited
                FLAT B, 23/F, TOWER 2
                873 LAI CHI KOK ROAD
                ONE WEST KOWLOON, CHEUNG SHA WAN, KOWLOON
mnt-by:         MAINT-HKCICL-HK
last-modified:  2025-06-23T08:34:39Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.127.243.231
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13169
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.127.243.231.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026030503 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 06 09:58:18 CST 2026
;; MSG SIZE  rcvd: 108
HOST信息:
Host 231.243.127.103.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 231.243.127.103.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
82.221.146.3 attack
" "
2020-09-15 01:26:51
51.75.86.211 attackspam
2020-09-13 10:20:24,864 fail2ban.actions        [13109]: NOTICE  [phone] Unban 51.75.86.211
2020-09-14 16:19:20,335 fail2ban.actions        [25284]: NOTICE  [phone] Unban 51.75.86.211
...
2020-09-15 01:29:37
161.35.69.251 attackbots
2020-09-10T04:37:38.507347thermi.consulting sshd[3953176]: Invalid user test from 161.35.69.251 port 51268
2020-09-10T04:37:39.373110thermi.consulting sshd[3953180]: Invalid user pi from 161.35.69.251 port 51336
2020-09-10T04:37:41.446007thermi.consulting sshd[3953184]: Invalid user postgres from 161.35.69.251 port 51516


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=161.35.69.251
2020-09-15 01:07:14
140.143.134.171 attackspam
Sep 14 18:58:02 santamaria sshd\[23037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.134.171  user=root
Sep 14 18:58:04 santamaria sshd\[23037\]: Failed password for root from 140.143.134.171 port 34152 ssh2
Sep 14 19:04:48 santamaria sshd\[23096\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.134.171  user=root
...
2020-09-15 01:12:54
103.56.197.178 attackbotsspam
$f2bV_matches
2020-09-15 01:09:29
72.186.160.136 attackspam
20/9/13@12:53:48: FAIL: Alarm-Intrusion address from=72.186.160.136
...
2020-09-15 01:13:46
103.219.112.48 attackspambots
Sep 14 13:42:00 scw-6657dc sshd[12747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.219.112.48
Sep 14 13:42:00 scw-6657dc sshd[12747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.219.112.48
Sep 14 13:42:02 scw-6657dc sshd[12747]: Failed password for invalid user admin from 103.219.112.48 port 46800 ssh2
...
2020-09-15 01:08:08
109.252.138.201 attackspam
IP 109.252.138.201 attacked honeypot on port: 80 at 9/14/2020 6:36:40 AM
2020-09-15 01:27:15
106.75.8.144 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-09-14T00:56:26Z and 2020-09-14T01:20:19Z
2020-09-15 01:26:00
174.217.29.109 attackbotsspam
Brute forcing email accounts
2020-09-15 01:35:29
171.25.209.203 attack
(sshd) Failed SSH login from 171.25.209.203 (FR/France/2madvisory-preprodweb-01.boost-asp.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 14 18:45:51 amsweb01 sshd[12220]: Invalid user brigitte from 171.25.209.203 port 44050
Sep 14 18:45:53 amsweb01 sshd[12220]: Failed password for invalid user brigitte from 171.25.209.203 port 44050 ssh2
Sep 14 18:56:15 amsweb01 sshd[13867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.25.209.203  user=root
Sep 14 18:56:17 amsweb01 sshd[13867]: Failed password for root from 171.25.209.203 port 44816 ssh2
Sep 14 19:00:28 amsweb01 sshd[14675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.25.209.203  user=root
2020-09-15 01:38:12
103.237.58.45 attack
Brute force attempt
2020-09-15 01:17:58
116.75.213.71 attackspambots
Honeypot hit.
2020-09-15 01:31:40
77.244.21.138 attack
Unauthorized connection attempt from IP address 77.244.21.138 on port 3389
2020-09-15 01:06:05
36.113.196.28 attack
[H1.VM2] Blocked by UFW
2020-09-15 01:16:29

最近上报的IP列表

204.0.63.172 38.181.47.5 121.230.89.190 121.230.89.54
2606:4700:10::6814:7231 110.77.248.81 2606:4700:10::6814:4607 2606:4700:10::6814:5450
2606:4700:10::6814:5636 2606:4700:10::6816:189 2606:4700:10::ac43:2424 3.219.164.141
50.16.164.120 122.193.247.98 122.192.203.127 2606:4700:10::6814:6394
121.8.28.57 121.230.89.106 2606:4700:10::6816:386d 121.234.219.187