必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.163.87.0 - 103.163.87.255'

% Abuse contact for '103.163.87.0 - 103.163.87.255' is 'abuse@telkomsat.co.id'

inetnum:        103.163.87.0 - 103.163.87.255
netname:        TELKOMSAT-ID
descr:          PT Telkom Satelit Indonesia
descr:          Internet Service Provider
descr:          Jl. K. H. Sholeh Iskandar KM. 6, Cibadak
descr:          Bogor, Jawa Barat, 16166
descr:          Tanah Sareal, Bogor
country:        ID
admin-c:        HT667-AP
tech-c:         HT667-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MNT-APJII-ID
mnt-irt:        IRT-TELKOMSAT-ID
mnt-lower:      MAINT-ID-TELKOMSAT
mnt-routes:     MAINT-ID-TELKOMSAT
remarks:        Send Spam & Abuse Reports to: admin@telkomsat.co.id
last-modified:  2023-12-27T04:51:20Z
source:         APNIC

irt:            IRT-TELKOMSAT-ID
address:        TELKOMSAT
address:        PT Telkom Satelit Indonesia
address:        Jl. K. H. Sholeh Iskandar KM. 6, Cibadak
address:        Bogor, Jawa Barat, 16166
e-mail:         admin@telkomsat.co.id
abuse-mailbox:  abuse@telkomsat.co.id
admin-c:        HT667-AP
tech-c:         HT667-AP
auth:           # Filtered
remarks:        admin@telkomsat.co.id was validated on 2023-10-18
mnt-by:         MAINT-ID-TELKOMSAT
last-modified:  2026-03-09T15:39:22Z
source:         APNIC

person:         Hostmaster TELKOMSAT
address:        Jl. K. H. Sholeh Iskandar KM.6, Cibadak, Bogor
address:        Jawa Barat - Indonesia
country:        ID
phone:          +62-2518305400
e-mail:         hostmaster@telkomsat.co.id
nic-hdl:        HT667-AP
mnt-by:         MAINT-ID-TELKOMSAT
fax-no:         +62-2518305430
last-modified:  2022-08-30T04:54:17Z
source:         APNIC

% Information related to '103.163.87.0/24AS10137'

route:          103.163.87.0/24
descr:          Route Object of PATRA TELEKOMUNIKASI INDONESIA
descr:          Kwarnas Building 17th Floor Merdeka Timur no.6 Jakarta 10110
origin:         AS10137
mnt-by:         MAINT-ID-PATRANET
last-modified:  2021-02-26T08:39:48Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.163.87.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57864
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.163.87.201.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040602 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 07 07:23:15 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 201.87.163.103.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 201.87.163.103.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
101.89.147.85 attackbots
Nov 15 17:43:23 vps666546 sshd\[30711\]: Invalid user 123456 from 101.89.147.85 port 36803
Nov 15 17:43:23 vps666546 sshd\[30711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.147.85
Nov 15 17:43:25 vps666546 sshd\[30711\]: Failed password for invalid user 123456 from 101.89.147.85 port 36803 ssh2
Nov 15 17:48:46 vps666546 sshd\[30971\]: Invalid user P0s123 from 101.89.147.85 port 54349
Nov 15 17:48:46 vps666546 sshd\[30971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.147.85
...
2019-11-16 00:53:46
41.92.30.187 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/41.92.30.187/ 
 
 MA - 1H : (7)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : MA 
 NAME ASN : ASN36925 
 
 IP : 41.92.30.187 
 
 CIDR : 41.92.0.0/18 
 
 PREFIX COUNT : 84 
 
 UNIQUE IP COUNT : 2407936 
 
 
 ATTACKS DETECTED ASN36925 :  
  1H - 1 
  3H - 1 
  6H - 2 
 12H - 2 
 24H - 3 
 
 DateTime : 2019-11-15 15:43:40 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-16 00:56:16
222.186.42.4 attackspam
2019-11-15T16:22:02.350642shield sshd\[21853\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.4  user=root
2019-11-15T16:22:04.177482shield sshd\[21853\]: Failed password for root from 222.186.42.4 port 63700 ssh2
2019-11-15T16:22:07.676627shield sshd\[21853\]: Failed password for root from 222.186.42.4 port 63700 ssh2
2019-11-15T16:22:10.933648shield sshd\[21853\]: Failed password for root from 222.186.42.4 port 63700 ssh2
2019-11-15T16:22:14.061138shield sshd\[21853\]: Failed password for root from 222.186.42.4 port 63700 ssh2
2019-11-16 00:33:13
95.77.8.8 attack
Automatic report - Banned IP Access
2019-11-16 00:50:39
128.199.123.170 attackbots
Nov 15 17:23:04 lnxded64 sshd[29395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.123.170
Nov 15 17:23:06 lnxded64 sshd[29395]: Failed password for invalid user admin from 128.199.123.170 port 46942 ssh2
Nov 15 17:27:05 lnxded64 sshd[30345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.123.170
2019-11-16 00:36:38
195.58.227.150 attackspambots
Port 1433 Scan
2019-11-16 00:41:21
165.227.69.39 attack
Brute-force attempt banned
2019-11-16 00:49:12
114.79.146.115 attackspam
Nov 15 06:49:29 kapalua sshd\[2183\]: Invalid user upl0ad from 114.79.146.115
Nov 15 06:49:29 kapalua sshd\[2183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.79.146.115
Nov 15 06:49:31 kapalua sshd\[2183\]: Failed password for invalid user upl0ad from 114.79.146.115 port 45086 ssh2
Nov 15 06:54:20 kapalua sshd\[2587\]: Invalid user wilkening from 114.79.146.115
Nov 15 06:54:20 kapalua sshd\[2587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.79.146.115
2019-11-16 01:02:53
51.38.236.221 attackspambots
2019-11-15T16:19:54.950142abusebot-4.cloudsearch.cf sshd\[7714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.ip-51-38-236.eu  user=root
2019-11-16 00:20:30
193.70.2.117 attack
Nov 15 17:44:45 MK-Soft-VM6 sshd[13929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.2.117 
Nov 15 17:44:47 MK-Soft-VM6 sshd[13929]: Failed password for invalid user elderwilliam from 193.70.2.117 port 55224 ssh2
...
2019-11-16 00:58:32
107.6.183.162 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-16 00:19:34
211.232.39.8 attackspam
2019-11-15T14:43:58.942156abusebot-8.cloudsearch.cf sshd\[13738\]: Invalid user gloriela from 211.232.39.8 port 48310
2019-11-16 00:42:45
106.38.108.28 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-16 00:52:21
203.163.233.182 attackspambots
" "
2019-11-16 00:38:35
146.185.162.244 attackspam
Nov 15 17:22:45 vps666546 sshd\[29722\]: Invalid user samoiel from 146.185.162.244 port 59973
Nov 15 17:22:45 vps666546 sshd\[29722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.185.162.244
Nov 15 17:22:46 vps666546 sshd\[29722\]: Failed password for invalid user samoiel from 146.185.162.244 port 59973 ssh2
Nov 15 17:29:34 vps666546 sshd\[30027\]: Invalid user test from 146.185.162.244 port 51009
Nov 15 17:29:34 vps666546 sshd\[30027\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.185.162.244
...
2019-11-16 00:44:36

最近上报的IP列表

162.122.168.209 44.121.44.150 45.79.190.96 142.93.229.240
216.118.251.134 124.221.236.99 109.162.251.235 110.77.187.161
2606:4700:10::6814:7438 2606:4700:10::6814:9332 2606:4700:10::6816:3544 2606:4700:10::ac43:2053
2606:4700:10::ac43:1717 2606:4700:10::6816:1445 2606:4700:10::6814:6399 2606:4700:10::6814:7388
202.213.129.125 109.22.68.15 109.22.68.67 221.247.208.14