必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Taipei

省份(region): Taipei City

国家(country): Taiwan, China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.148.73.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36904
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.148.73.55.			IN	A

;; AUTHORITY SECTION:
.			426	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040402 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 05 18:03:29 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
55.73.148.103.in-addr.arpa domain name pointer 103-148-73-55.static.pni.tw.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
55.73.148.103.in-addr.arpa	name = 103-148-73-55.static.pni.tw.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
216.244.66.201 attack
Automated report (2019-10-04T06:01:45+00:00). Misbehaving bot detected at this address.
2019-10-04 14:42:58
181.63.245.127 attackspambots
Oct  1 14:44:20 own sshd[26525]: Invalid user ftpuser from 181.63.245.127
Oct  1 14:44:20 own sshd[26525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.63.245.127
Oct  1 14:44:21 own sshd[26525]: Failed password for invalid user ftpuser from 181.63.245.127 port 41121 ssh2
Oct  1 14:44:22 own sshd[26525]: Received disconnect from 181.63.245.127 port 41121:11: Normal Shutdown [preauth]
Oct  1 14:44:22 own sshd[26525]: Disconnected from 181.63.245.127 port 41121 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=181.63.245.127
2019-10-04 14:16:43
187.202.221.105 attackbots
19/10/3@23:56:06: FAIL: IoT-Telnet address from=187.202.221.105
...
2019-10-04 14:41:42
222.186.42.163 attackspambots
SSH Brute Force, server-1 sshd[21086]: Failed password for root from 222.186.42.163 port 54360 ssh2
2019-10-04 14:23:01
159.65.144.233 attackbots
auto-add
2019-10-04 14:21:40
198.20.70.114 attackspambots
Automatic report - Port Scan Attack
2019-10-04 14:34:58
43.242.125.185 attackspambots
IP attempted unauthorised action
2019-10-04 14:45:19
77.234.40.132 attackbots
Sep  3 04:04:29 localhost postfix/smtpd[30134]: lost connection after CONNECT from unknown[77.234.40.132]
Sep  3 04:05:06 localhost postfix/smtpd[30176]: lost connection after AUTH from unknown[77.234.40.132]
Sep  3 04:10:30 localhost postfix/smtpd[30134]: lost connection after AUTH from unknown[77.234.40.132]
Sep  3 04:22:18 localhost postfix/smtpd[2333]: lost connection after EHLO from unknown[77.234.40.132]
Sep  3 04:22:49 localhost postfix/smtpd[2327]: lost connection after EHLO from unknown[77.234.40.132]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=77.234.40.132
2019-10-04 14:25:55
159.65.9.28 attackspam
Oct  3 20:38:21 eddieflores sshd\[27353\]: Invalid user Vogue@123 from 159.65.9.28
Oct  3 20:38:21 eddieflores sshd\[27353\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.9.28
Oct  3 20:38:23 eddieflores sshd\[27353\]: Failed password for invalid user Vogue@123 from 159.65.9.28 port 38232 ssh2
Oct  3 20:43:02 eddieflores sshd\[27842\]: Invalid user 123Alfred from 159.65.9.28
Oct  3 20:43:02 eddieflores sshd\[27842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.9.28
2019-10-04 14:52:31
77.247.110.161 attackspambots
10/04/2019-06:18:05.434479 77.247.110.161 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 74
2019-10-04 14:27:38
117.4.138.8 attackspam
Oct  2 02:08:16 mxgate1 postfix/postscreen[31614]: CONNECT from [117.4.138.8]:17533 to [176.31.12.44]:25
Oct  2 02:08:16 mxgate1 postfix/dnsblog[31619]: addr 117.4.138.8 listed by domain cbl.abuseat.org as 127.0.0.2
Oct  2 02:08:16 mxgate1 postfix/dnsblog[31618]: addr 117.4.138.8 listed by domain zen.spamhaus.org as 127.0.0.11
Oct  2 02:08:16 mxgate1 postfix/dnsblog[31618]: addr 117.4.138.8 listed by domain zen.spamhaus.org as 127.0.0.4
Oct  2 02:08:16 mxgate1 postfix/dnsblog[31618]: addr 117.4.138.8 listed by domain zen.spamhaus.org as 127.0.0.3
Oct  2 02:08:17 mxgate1 postfix/dnsblog[31616]: addr 117.4.138.8 listed by domain b.barracudacentral.org as 127.0.0.2
Oct  2 02:08:17 mxgate1 postfix/dnsblog[31615]: addr 117.4.138.8 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Oct  2 02:08:22 mxgate1 postfix/postscreen[31614]: DNSBL rank 5 for [117.4.138.8]:17533
Oct  2 02:08:23 mxgate1 postfix/postscreen[31614]: NOQUEUE: reject: RCPT from [117.4.138.8]:17533: 550 5.7.1 S........
-------------------------------
2019-10-04 14:12:17
144.135.85.184 attackspambots
Oct  4 07:01:13 h2177944 sshd\[16734\]: Invalid user Admin!2\# from 144.135.85.184 port 42485
Oct  4 07:01:13 h2177944 sshd\[16734\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.135.85.184
Oct  4 07:01:15 h2177944 sshd\[16734\]: Failed password for invalid user Admin!2\# from 144.135.85.184 port 42485 ssh2
Oct  4 07:06:30 h2177944 sshd\[17168\]: Invalid user Sky@123 from 144.135.85.184 port 3366
...
2019-10-04 14:20:46
163.172.251.80 attack
2019-10-04T06:07:29.751983abusebot-6.cloudsearch.cf sshd\[8539\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.251.80  user=root
2019-10-04 14:15:04
145.239.90.235 attackspambots
Oct  4 08:12:53 fr01 sshd[30608]: Invalid user Alpine@123 from 145.239.90.235
...
2019-10-04 14:15:19
42.159.89.4 attackspam
Oct  4 08:18:02 localhost sshd\[30753\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.89.4  user=root
Oct  4 08:18:04 localhost sshd\[30753\]: Failed password for root from 42.159.89.4 port 52010 ssh2
Oct  4 08:22:45 localhost sshd\[31249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.89.4  user=root
2019-10-04 14:41:56

最近上报的IP列表

103.148.72.41 103.148.77.166 103.149.162.110 103.149.162.113
103.149.162.114 103.149.165.109 103.149.170.158 103.15.144.208
103.15.235.35 103.15.50.153 103.15.62.211 103.150.125.189
103.151.238.143 103.151.28.162 103.151.28.229 103.151.28.230
103.151.30.136 103.151.44.2 103.151.47.123 103.151.58.241