必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Hong Kong

省份(region): unknown

国家(country): Hong Kong

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.181.164.0 - 103.181.165.255'

% Abuse contact for '103.181.164.0 - 103.181.165.255' is 'abouse@syhots.com'

inetnum:        103.181.164.0 - 103.181.165.255
netname:        SLNTCL-CN
descr:          Shenzhen lesuyun Network Technology Co., Ltd
country:        CN
org:            ORG-AA198-AP
admin-c:        SL3902-AP
tech-c:         SL3902-AP
abuse-c:        AS3297-AP
status:         ASSIGNED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-routes:     MAINT-SLNTCL-CN
mnt-irt:        IRT-SLNTCL-CN
last-modified:  2024-01-10T22:16:24Z
geoloc:         22.362146 114.134409
language:       en
geofeed:        https://iplocal.s3.us-west-1.amazonaws.com/geofeeds.csv
source:         APNIC

irt:            IRT-SLNTCL-CN
address:        Cheung Wing Industrial Building 109-115 Wo Yi Hop Road Kwai Chung, New Territories Hong Kong
e-mail:         abouse@syhots.com
abuse-mailbox:  abouse@syhots.com
admin-c:        SL3902-AP
tech-c:         SL3902-AP
auth:           # Filtered
remarks:        abouse@syhots.com was validated on 2026-03-10
mnt-by:         MAINT-SLNTCL-CN
last-modified:  2026-03-10T08:27:53Z
source:         APNIC

organisation:   ORG-AA198-AP
org-name:       Shenzhen lesuyun Network Technology Co., Ltd
org-type:       LIR
country:        CN
address:        Flat B, 2/F, Cheung Wing Industrial Building 109-115 Wo Yi H
phone:          +85264829930
e-mail:         wwl@syhots.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:18:46Z
source:         APNIC

role:           ABUSE SLNTCLCN
country:        ZZ
address:        Cheung Wing Industrial Building 109-115 Wo Yi Hop Road Kwai Chung, New Territories Hong Kong
phone:          +000000000
e-mail:         abouse@syhots.com
admin-c:        SL3902-AP
tech-c:         SL3902-AP
nic-hdl:        AS3297-AP
remarks:        Generated from irt object IRT-SLNTCL-CN
remarks:        abouse@syhots.com was validated on 2026-03-10
abuse-mailbox:  abouse@syhots.com
mnt-by:         APNIC-ABUSE
last-modified:  2026-03-10T08:28:36Z
source:         APNIC

role:           SPEEDCLOUD LIMITED
address:        Cheung Wing Industrial Building 109-115 Wo Yi Hop Road Kwai Chung, New Territories Hong Kong
country:        HK
phone:          +13365607539
e-mail:         abouse@syhots.com
admin-c:        SL3902-AP
tech-c:         SL3902-AP
nic-hdl:        SL3902-AP
notify:         abouse@syhots.com
mnt-by:         MAINT-SLNTCL-CN
last-modified:  2023-08-11T19:44:35Z
source:         APNIC

% Information related to '103.181.165.0/24AS149513'

route:          103.181.165.0/24
country:        HK
origin:         AS149513
descr:          Shenzhen lesuyun Network Technology Co., Ltd
                Flat B, 2/F, Cheung Wing Industrial Building 109-115 Wo Yi H
mnt-by:         MAINT-SLNTCL-CN
last-modified:  2024-04-25T19:32:11Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.181.165.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3598
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.181.165.69.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032502 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 26 13:04:08 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 69.165.181.103.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 69.165.181.103.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.175.150 attackspam
Feb 14 12:08:04 plusreed sshd[18373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.150  user=root
Feb 14 12:08:06 plusreed sshd[18373]: Failed password for root from 222.186.175.150 port 22170 ssh2
Feb 14 12:08:10 plusreed sshd[18373]: Failed password for root from 222.186.175.150 port 22170 ssh2
Feb 14 12:08:13 plusreed sshd[18373]: Failed password for root from 222.186.175.150 port 22170 ssh2
Feb 14 12:08:20 plusreed sshd[18373]: error: maximum authentication attempts exceeded for root from 222.186.175.150 port 22170 ssh2 [preauth]
...
2020-02-15 01:15:33
185.139.191.38 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 01:20:19
179.60.156.178 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 01:25:20
184.105.247.252 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 01:41:37
202.137.20.58 attackbots
Automatic report - Banned IP Access
2020-02-15 01:49:00
184.105.247.248 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 01:45:47
107.189.10.180 attackspam
scan z
2020-02-15 01:44:49
157.230.247.184 attackbots
Automatic report - XMLRPC Attack
2020-02-15 01:27:33
157.230.239.99 attackbotsspam
$f2bV_matches
2020-02-15 01:50:27
179.51.27.120 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 01:52:51
186.91.126.123 attackbots
Automatic report - Port Scan Attack
2020-02-15 01:40:12
89.218.218.202 attackbots
Microsoft SQL Server User Authentication Brute Force Attempt, PTR: PTR record not found
2020-02-15 01:56:48
51.140.182.113 attack
GET /admin/config.php?file=config.php&display=badreferer&handler=reload&args=run?
2020-02-15 02:01:30
52.53.122.66 attack
GET /vpns/
2020-02-15 01:38:35
59.108.66.247 attack
Automatic report - SSH Brute-Force Attack
2020-02-15 01:46:53

最近上报的IP列表

85.190.165.106 119.11.26.185 2606:4700:10::6814:6986 2606:4700:10::6814:9761
2606:4700:10::6816:3461 2606:4700:10::6816:4823 2606:4700:10::6816:3089 2606:4700:10::6814:9644
2606:4700:10::6814:8976 2606:4700:10::ac43:47e 2606:4700:10::6816:2482 2606:4700:10::6814:4687
122.193.247.96 10.255.32.160 218.204.167.202 2606:4700:10::6816:4687
121.234.219.134 2606:4700:10::6816:3046 2606:4700:10::6814:8864 2606:4700:10::6816:3021