必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): San Jose

省份(region): California

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.152.113.0 - 103.152.113.255'

% Abuse contact for '103.152.113.0 - 103.152.113.255' is 'abuse@apernet.io'

inetnum:        103.152.113.0 - 103.152.113.255
netname:        NATO-US-2
descr:          Black Mesa Corporation
country:        US
admin-c:        AA1721-AP
tech-c:         AA1721-AP
abuse-c:        AA1721-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-APERNET
mnt-irt:        IRT-APERNET
last-modified:  2021-09-27T18:56:44Z
source:         APNIC

irt:            IRT-APERNET
address:        Unit 83, 3/F, Yau Lee Center, No. 45 Hoi Yuen Road Kwun Tong, Kowloon
e-mail:         abuse@apernet.io
abuse-mailbox:  abuse@apernet.io
admin-c:        AA1721-AP
tech-c:         AA1721-AP
auth:           # Filtered
remarks:        abuse@apernet.io was validated on 2026-02-14
mnt-by:         MAINT-APERNET
last-modified:  2026-02-14T08:41:45Z
source:         APNIC

role:           AperNet Administrators
address:        Unit 83, 3/F, Yau Lee Center, No. 45 Hoi Yuen Road Kwun Tong, Kowloon
country:        HK
phone:          +852-5803-3891
phone:          +1 (315) 744-5708
e-mail:         noc@apernet.io
admin-c:        AA1721-AP
tech-c:         AA1721-AP
nic-hdl:        AA1721-AP
mnt-by:         MAINT-APERTURE-HK
last-modified:  2020-07-02T04:56:31Z
source:         APNIC

% Information related to '103.152.113.0/24AS46997'

route:          103.152.113.0/24
descr:          Nato Research Ltd.
country:        US
origin:         AS46997
mnt-by:         MAINT-CSRHF-CN
last-modified:  2021-01-25T17:49:37Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.152.113.33
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8629
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.152.113.33.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026051301 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 14 06:46:22 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 33.113.152.103.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 103.152.113.33.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
203.194.110.199 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:06:09.
2019-09-28 04:02:58
103.45.154.215 attackspambots
Sep 27 08:23:37 xb3 sshd[19917]: Failed password for invalid user nelio from 103.45.154.215 port 33834 ssh2
Sep 27 08:23:38 xb3 sshd[19917]: Received disconnect from 103.45.154.215: 11: Bye Bye [preauth]
Sep 27 08:48:16 xb3 sshd[23795]: Failed password for invalid user tg from 103.45.154.215 port 49696 ssh2
Sep 27 08:48:17 xb3 sshd[23795]: Received disconnect from 103.45.154.215: 11: Bye Bye [preauth]
Sep 27 08:52:24 xb3 sshd[22191]: Failed password for invalid user nate from 103.45.154.215 port 52942 ssh2
Sep 27 08:52:25 xb3 sshd[22191]: Received disconnect from 103.45.154.215: 11: Bye Bye [preauth]
Sep 27 09:00:41 xb3 sshd[18607]: Failed password for invalid user mmoseley from 103.45.154.215 port 59432 ssh2
Sep 27 09:00:42 xb3 sshd[18607]: Received disconnect from 103.45.154.215: 11: Bye Bye [preauth]
Sep 27 09:04:56 xb3 sshd[28945]: Failed password for invalid user so360 from 103.45.154.215 port 34442 ssh2
Sep 27 09:04:56 xb3 sshd[28945]: Received disconnect from 103........
-------------------------------
2019-09-28 03:53:39
5.135.182.84 attackspambots
Sep 27 17:33:08 SilenceServices sshd[17311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.182.84
Sep 27 17:33:10 SilenceServices sshd[17311]: Failed password for invalid user docker from 5.135.182.84 port 55650 ssh2
Sep 27 17:38:25 SilenceServices sshd[20608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.182.84
2019-09-28 03:41:14
2.57.76.197 attack
B: zzZZzz blocked content access
2019-09-28 03:47:53
51.91.37.197 attack
Sep 27 20:50:27 saschabauer sshd[10445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.37.197
Sep 27 20:50:29 saschabauer sshd[10445]: Failed password for invalid user 123456 from 51.91.37.197 port 40414 ssh2
2019-09-28 03:39:05
106.53.69.173 attack
Invalid user vps from 106.53.69.173 port 51422
2019-09-28 03:59:18
201.242.197.100 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:06:05.
2019-09-28 04:07:09
144.217.214.25 attackbotsspam
Invalid user 123 from 144.217.214.25 port 39246
2019-09-28 03:39:33
184.105.139.109 attack
firewall-block, port(s): 8443/tcp
2019-09-28 04:06:34
222.188.21.98 attack
Sep 27 14:05:57 mail sshd\[3649\]: Invalid user ubnt from 222.188.21.98
Sep 27 14:05:57 mail sshd\[3649\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.188.21.98
Sep 27 14:05:59 mail sshd\[3649\]: Failed password for invalid user ubnt from 222.188.21.98 port 23346 ssh2
...
2019-09-28 04:09:29
106.3.130.53 attack
2019-09-27T14:11:25.634203abusebot-8.cloudsearch.cf sshd\[8764\]: Invalid user david from 106.3.130.53 port 47664
2019-09-28 03:47:10
104.248.175.232 attack
Sep 27 16:59:21 dedicated sshd[27846]: Invalid user amaina from 104.248.175.232 port 53110
2019-09-28 03:36:41
212.94.8.36 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:06:12.
2019-09-28 04:00:10
88.247.250.200 attackbotsspam
Sep 28 00:24:07 gw1 sshd[3746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.247.250.200
Sep 28 00:24:09 gw1 sshd[3746]: Failed password for invalid user stupid from 88.247.250.200 port 30392 ssh2
...
2019-09-28 03:32:20
89.108.84.80 attackspam
Automated report - ssh fail2ban:
Sep 27 19:29:42 authentication failure 
Sep 27 19:29:44 wrong password, user=aq, port=56090, ssh2
Sep 27 19:34:00 authentication failure
2019-09-28 04:03:42

最近上报的IP列表

172.86.117.157 93.152.208.42 156.235.89.236 2606:4700:10::6814:6303
172.86.114.117 43.156.55.246 2606:4700:10::ac43:1805 2606:4700:10::6814:4396
2606:4700:10::ac43:1634 218.151.38.93 198.100.58.65 172.236.15.113
91.231.89.47 91.231.89.46 91.196.152.239 47.95.192.145
192.109.200.204 2606:4700:10::6816:3970 2606:4700:10::6814:4474 2606:4700:10::6816:4236