必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.133.223.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48772
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.133.223.122.		IN	A

;; AUTHORITY SECTION:
.			588	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 23:02:56 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
122.223.133.103.in-addr.arpa domain name pointer ip-103-133.223-122.cloudteknologinusantara.co.id.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
122.223.133.103.in-addr.arpa	name = ip-103-133.223-122.cloudteknologinusantara.co.id.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
188.138.102.91 bots
看样子是广告相关爬虫
188.138.102.91 - - [30/Apr/2019:16:49:06 +0800] "GET / HTTP/1.1" 200 3312 "-" "admantx-adform/3.1 (+http://www.admantx.com/service-fetcher.html)"
2019-04-30 17:00:39
178.62.237.197 spambotsattack
UDP port:51331 ddos attack
2019-05-05 21:59:12
171.221.170.111 attack
171.221.170.111 - - [25/Apr/2019:00:03:47 +0800] "GET /_async/AsyncResponseService HTTP/1.1" 404 521 "-" "Mozilla/5.0 (Windows NT 5.1; rv:5.0) Gecko/20100101 Firefox/5.0"
2019-04-25 05:29:43
124.89.119.11 bots
124.89.119.11 - - [23/Apr/2019:13:55:45 +0800] "GET /view/img/favicon.ico HTTP/1.1" 404 209 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.102 Safari/537.36"
112.80.137.106 - - [23/Apr/2019:13:55:45 +0800] "GET /home/favicon.ico HTTP/1.1" 404 209 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Firefox/45.0"
121.57.228.33 - - [23/Apr/2019:13:55:46 +0800] "GET /view/img/favicon.ico HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Firefox/45.0"
121.57.228.33 - - [23/Apr/2019:13:55:46 +0800] "GET /view/img/favicon.ico HTTP/1.1" 404 209 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Firefox/45.0"
2019-04-23 13:58:05
176.9.41.28 bots
seo相关爬虫,禁之
176.9.41.28 - - [24/Apr/2019:08:04:30 +0800] "GET /index.php/category/big-shots/duterte/page/4/ HTTP/1.1" 200 14012 "-" "Mozilla/5.0 (compatible; MegaIndex.ru/2.0; +http://megaindex.com/crawler)"
176.9.41.28 - - [24/Apr/2019:08:04:31 +0800] "GET /index.php/category/root/block-chain/page/7/ HTTP/1.1" 200 17919 "-" "Mozilla/5.0 (compatible; MegaIndex.ru/2.0; +http://megaindex.com/crawler)"
176.9.41.28 - - [24/Apr/2019:08:04:32 +0800] "GET /index.php/category/big-shots/duterte/page/32/ HTTP/1.1" 200 13589 "-" "Mozilla/5.0 (compatible; MegaIndex.ru/2.0; +http://megaindex.com/crawler)"
176.9.41.28 - - [24/Apr/2019:08:04:34 +0800] "GET /index.php/2018/07/25/google_2018_07_25_en/ HTTP/1.1" 200 12535 "-" "Mozilla/5.0 (compatible; MegaIndex.ru/2.0; +http://megaindex.com/crawler)"
2019-04-24 08:05:14
35.222.72.113 bots
35.222.72.113 - - [28/Apr/2019:08:07:30 +0800] "GET /robots.txt HTTP/1.1" 200 472 "-" "ltx71 - (http://ltx71.com/)"
2019-04-28 08:08:27
35.202.223.242 bots
ltx71爬虫,可以禁掉
35.202.223.242 - - [27/Apr/2019:06:45:25 +0800] "GET /robots.txt HTTP/1.1" 200 472 "-" "ltx71 - (http://ltx71.com/)"
2019-04-27 06:47:27
58.38.194.30 bots
isSource urlParam不知道从哪来的疑似爬虫
58.38.194.30 - - [25/Apr/2019:15:22:16 +0800] "GET /index.php/category/root/deep-learning/?isSource=true&category=%E5%85%A8%E9%83%A8&urlParam=%7B%7D HTTP/1.1" 200 19658 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.26 Safari/537.36 Core/1.63.6823.400 QQBrowser/10.3.3117.400"
2019-04-25 15:24:12
128.199.59.39 botsattack
UDP flood attack port:0 port:51331
2019-05-06 10:22:08
66.206.0.172 bots
66.206.0.172 - - [27/Apr/2019:04:42:55 +0800] "GET /check-ip/33.117.246.3 HTTP/1.1" 200 90035 "-" "Mozilla/5.0 (Windows; U; Windows NT 5.1; ru-RU; rv:1.8.0.1) Gecko/20060130 SeaMonkey/1.0"
66.206.0.172 - - [27/Apr/2019:04:42:55 +0800] "GET /check-ip/100.35.13.79 HTTP/1.1" 200 92159 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2a1pre) Gecko/20090316 Minefield/3.2a1pre"
66.206.0.172 - - [27/Apr/2019:04:42:58 +0800] "GET /check-ip/90.143.27.14 HTTP/1.1" 200 90613 "-" "Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.8.1.9) Gecko/20071030 SeaMonkey/1.1.6"
66.206.0.172 - - [27/Apr/2019:04:43:04 +0800] "GET /check-ip/139.199.6.107 HTTP/1.1" 200 92085 "-" "Mozilla/5.0 (Windows; U; Windows NT 5.1; de-DE; rv:1.8.1.21) Gecko/20090331 K-Meleon/1.5.3"
2019-04-27 06:51:42
54.71.187.124 bots
不像是真是流量
54.71.187.124 - - [25/Apr/2019:14:27:54 +0800] "GET /check-ip/205.253.71.49&ss=gp&rt=205.253.71.49+-+IPInfo&cd=KhQxMTkxODIwODQ2MjE3NzMxNDgzMTIcMTY5ODc4MjM1OGU5ZTBhYjpjby5pbjplbjpJTg&ssp=AMJHsmUXt_t7EHGEK42zuFRxvhRFDBsVyw HTTP/1.1" 200 2847 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36"
54.71.187.124 - - [25/Apr/2019:14:27:55 +0800] "GET /static/bootstrap/js/popper.min.js HTTP/1.1" 200 19188 "https://ipinfo.asytech.cn/check-ip/205.253.71.49&ss=fb&rt=205.253.71.49+-+IPInfo&cd=KhQxMTkxODIwODQ2MjE3NzMxNDgzMTIcMTY5ODc4MjM1OGU5ZTBhYjpjby5pbjplbjpJTg&ssp=AMJHsmUXt_t7EHGEK42zuFRxvhRFDBsVyw" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:63.0) Gecko/20100101 Firefox/63.0"
54.71.187.124 - - [25/Apr/2019:14:27:55 +0800] "GET /static/bootstrap/js/jquery-3.2.1.slim.min.js HTTP/1.1" 200 69597 "https://ipinfo.asytech.cn/check-ip/205.253.71.49&ss=fb&rt=205.253.71.49+-+IPInfo&cd=KhQxMTkxODIwODQ2MjE3NzMxNDgzMTIcMTY5ODc4MjM1OGU5ZTBhYjpjby5pbjplbjpJTg&ssp=AMJHsmUXt_t7EHGEK42zuFRxvhRFDBsVyw" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:63.0) Gecko/20100101 Firefox/63.0"
54.71.187.124 - - [25/Apr/2019:14:27:55 +0800] "GET /static/bootstrap/css/bootstrap.min.css HTTP/1.1" 200 144877 "https://ipinfo.asytech.cn/check-ip/205.253.71.49&ss=gp&rt=205.253.71.49+-+IPInfo&cd=KhQxMTkxODIwODQ2MjE3NzMxNDgzMTIcMTY5ODc4MjM1OGU5ZTBhYjpjby5pbjplbjpJTg&ssp=AMJHsmUXt_t7EHGEK42zuFRxvhRFDBsVyw" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36"
2019-04-25 14:29:46
43.241.215.172 botsattack
43.241.215.172 - - [05/May/2019:16:49:00 +0800] "GET /otsmobile/app/mgs/mgw.htm?operationType=com.cars.otsmobile.queryLeftTicket&requestData=%5B%7B%22train_date%22%3A%2220190520%22%2C%22purpose_codes%22%3A%2200%22%2C%22from_station%22%3A%22BJP%22%2C%22to_station%22%3A%22WHN%22%2C%22station_train_code%22%3A%22Z35%22%2C%22start_time_begin%22%3A%220000%22%2C%22start_time_end%22%3A%222400%22%2C%22train_headers%22%3A%22QB%23%22%2C%22train_flag%22%3A%22%22%2C%22seat_type%22%3A%220%22%2C%22seatBack_Type%22%3A%22%22%2C%22ticket_num%22%3A%22%22%2C%22dfpStr%22%3A%22%22%2C%22secret_str%22%3A%22%E5%90%8E%E5%8F%B0%E5%BC%80%E5%85%B3%E8%8E%B7%E5%8F%96%E5%A4%B1%E8%B4%A5%EF%BC%8C%E6%88%96%E9%85%8D%E7%BD%AE%E5%BC%80%E5%85%B3%E4%B8%BAfalse.null%22%2C%22baseDTO%22%3A%7B%22check_code%22%3A%22597cd02b91ba2b4b481dfe54f24ae30d%22%2C%22device_no%22%3A%22XM6jfCnBCbQDAMXCxZeB4eo1%22%2C%22mobile_no%22%3A%22%22%2C%22os_type%22%3A%22a%22%2C%22time_str%22%3A%2220190505164900%22%2C%22user_name%22%3A%22%22%2C%22version_no%22%3A%223.0.0.12121430%22%7D%7D%5D&ts=1557046140303&sign= HTTP/1.1" 404 209 "-" "Apache-HttpClient/4.5.6 (Java/1.8.0_211)"
2019-05-05 16:50:15
37.59.1.165 bots
37.59.1.165 - - [24/Apr/2019:08:38:38 +0800] "GET //CHANGELOG.txt HTTP/1.1" 301 194 "-" "libwww-perl/6.04"
37.59.1.165 - - [24/Apr/2019:08:38:40 +0800] "GET //CHANGELOG.txt HTTP/1.1" 308 257 "-" "libwww-perl/6.04"
37.59.1.165 - - [24/Apr/2019:08:38:41 +0800] "GET /check-ip//CHANGELOG.txt HTTP/1.1" 301 194 "-" "libwww-perl/6.04"
37.59.1.165 - - [24/Apr/2019:08:38:42 +0800] "GET /check-ip//CHANGELOG.txt HTTP/1.1" 404 232 "-" "libwww-perl/6.04"
2019-04-24 08:57:21
133.175.83.191 bots
133.175.83.191 - - [24/Apr/2019:09:17:14 +0800] "GET / HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1"
133.175.83.191 - - [24/Apr/2019:09:17:15 +0800] "GET / HTTP/1.1" 200 10270 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1"
2019-04-24 09:17:45
38.143.68.212 attack
H
2019-05-04 08:45:16

最近上报的IP列表

103.133.223.21 103.133.223.119 103.133.223.230 103.133.223.226
103.133.222.84 215.251.205.241 103.133.223.116 103.133.223.51
103.133.223.58 103.133.25.165 103.133.25.2 103.133.26.1
103.133.24.94 103.133.229.250 103.133.26.38 103.133.229.42
103.133.26.100 103.133.25.160 103.133.27.22 103.119.154.164