必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.191.14.0 - 103.191.15.255'

% Abuse contact for '103.191.14.0 - 103.191.15.255' is 'ida@nawasenawasa.com'

inetnum:        103.191.14.0 - 103.191.15.255
netname:        IDNIC-NAWASENA-ID
descr:          PT NAWASENA WASA ANUGERAH
descr:          Corporate / Direct Member IDNIC
descr:          RUKO DUREN SAWIT CENTER,JL.RAYA DUREN SAWIT NO 8
descr:          KLENDER,DUREN SAWIT
descr:          JAKARTA TIMUR 13470
admin-c:        IL345-AP
tech-c:         IL345-AP
remarks:        Send Spam & Abuse Reports to: ida@nawasenawasa.com
country:        ID
mnt-by:         MNT-APJII-ID
mnt-lower:      MAINT-ID-NAWASENA
mnt-irt:        IRT-NAWASENA-ID
mnt-routes:     MAINT-ID-NAWASENA
status:         ALLOCATED PORTABLE
last-modified:  2022-07-10T15:24:31Z
source:         APNIC

irt:            IRT-NAWASENA-ID
address:        PT NAWASENA WASA ANUGERAH
address:        RUKO DUREN SAWIT CENTER,JL.RAYA DUREN SAWIT NO 8
address:        KLENDER,DUREN SAWIT
address:        JAKARTA TIMUR 13470
e-mail:         ida@nawasenawasa.com
abuse-mailbox:  ida@nawasenawasa.com
admin-c:        IL345-AP
tech-c:         IL345-AP
auth:           # Filtered
mnt-by:         MAINT-ID-NAWASENA
last-modified:  2025-11-18T00:36:14Z
source:         APNIC

person:         Ida Laela
address:        RUKO DUREN SAWIT CENTER,JL.RAYA DUREN SAWIT NO 8
address:        KLENDER,DUREN SAWIT
address:        JAKARTA TIMUR 13470
country:        ID
phone:          +6281280569225
e-mail:         ida@nawasenawasa.com
nic-hdl:        IL345-AP
mnt-by:         MAINT-ID-NAWASENA
last-modified:  2022-07-07T16:07:29Z
source:         APNIC

% Information related to '103.191.15.0 - 103.191.15.255'

inetnum:        103.191.15.0 - 103.191.15.255
netname:        LINTASARTA-NET
descr:          Indonesia Online Access
descr:          PT Aplikanusa Lintasarta
country:        ID
admin-c:        LA60-AP
tech-c:         LA60-AP
remarks:        spam and abuse report : abuse@idola.net.id
status:         ASSIGNED NON-PORTABLE
mnt-by:         MNT-APJII-ID
mnt-irt:        IRT-IDNIC-ID
mnt-lower:      MAINT-LINTASARTA
mnt-routes:     MAINT-LINTASARTA
last-modified:  2022-07-30T21:47:00Z
source:         IDNIC

irt:            IRT-IDNIC-ID
address:        Kuningan Barat Gedung Cyber
address:        Cyber Building
address:        Jl. Kuningan Barat No.8
address:        Jakarta Selatan 12710
e-mail:         abuse@idnic.net
abuse-mailbox:  abuse@idnic.net
admin-c:        IA55-AP
tech-c:         IH123-AP
auth:           # Filtered
mnt-by:         MNT-APJII-ID
last-modified:  2024-12-29T14:21:38Z
source:         IDNIC

role:           LINTASARTA ADMINISTRATOR
address:        PT Aplikanusa Lintasarta
address:        MH Thamrin Kav 3
address:        Menara Thamrin Bulding 12th Floor
address:        Jakarta 10250
country:        ID
phone:          +62-21-2302345
fax-no:         +62-21-2303883
e-mail:         hostmaster@idola.net.id
remarks:        spam and abuse report : abuse@idola.net.id
remarks:        technical and routing : support@idola.net.id
remarks:        hostmasters : hostmaster@idola.net.id
remarks:        LINTASARTA administrators role object
admin-c:        GP509-AP
tech-c:         MT1062-AP
nic-hdl:        LA60-AP
notify:         hostmaster@idola.net.id
mnt-by:         MAINT-LINTASARTA
last-modified:  2024-08-01T09:37:22Z
source:         IDNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.191.15.151
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26542
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.191.15.151.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121000 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 10 22:31:41 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 151.15.191.103.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 151.15.191.103.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
72.167.9.245 attack
Invalid user ubuntu from 72.167.9.245 port 53250
2019-10-25 02:17:35
42.200.66.164 attack
Oct 24 08:05:21 friendsofhawaii sshd\[23922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42-200-66-164.static.imsbiz.com  user=root
Oct 24 08:05:23 friendsofhawaii sshd\[23922\]: Failed password for root from 42.200.66.164 port 39906 ssh2
Oct 24 08:12:09 friendsofhawaii sshd\[24576\]: Invalid user admin!\$ from 42.200.66.164
Oct 24 08:12:09 friendsofhawaii sshd\[24576\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42-200-66-164.static.imsbiz.com
Oct 24 08:12:11 friendsofhawaii sshd\[24576\]: Failed password for invalid user admin!\$ from 42.200.66.164 port 50768 ssh2
2019-10-25 02:24:28
51.83.41.76 attackbots
2019-10-24T15:01:57.717583lon01.zurich-datacenter.net sshd\[6278\]: Invalid user 654321 from 51.83.41.76 port 54397
2019-10-24T15:01:57.724594lon01.zurich-datacenter.net sshd\[6278\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.ip-51-83-41.eu
2019-10-24T15:01:59.408946lon01.zurich-datacenter.net sshd\[6278\]: Failed password for invalid user 654321 from 51.83.41.76 port 54397 ssh2
2019-10-24T15:06:01.961709lon01.zurich-datacenter.net sshd\[6371\]: Invalid user Passw@rd from 51.83.41.76 port 45858
2019-10-24T15:06:01.972120lon01.zurich-datacenter.net sshd\[6371\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.ip-51-83-41.eu
...
2019-10-25 02:21:49
181.49.219.114 attackbots
Oct 24 23:44:21 itv-usvr-01 sshd[25047]: Invalid user marcelo from 181.49.219.114
Oct 24 23:44:21 itv-usvr-01 sshd[25047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.49.219.114
Oct 24 23:44:21 itv-usvr-01 sshd[25047]: Invalid user marcelo from 181.49.219.114
Oct 24 23:44:23 itv-usvr-01 sshd[25047]: Failed password for invalid user marcelo from 181.49.219.114 port 45976 ssh2
Oct 24 23:48:57 itv-usvr-01 sshd[25217]: Invalid user apache from 181.49.219.114
2019-10-25 02:40:23
148.72.212.161 attackspambots
Automatic report - Banned IP Access
2019-10-25 02:47:08
54.36.111.38 attack
Invalid user corlene from 54.36.111.38 port 35126
2019-10-25 02:20:48
218.88.164.159 attackspambots
Oct 24 19:35:50 bouncer sshd\[1781\]: Invalid user mhkim from 218.88.164.159 port 51671
Oct 24 19:35:50 bouncer sshd\[1781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.88.164.159 
Oct 24 19:35:52 bouncer sshd\[1781\]: Failed password for invalid user mhkim from 218.88.164.159 port 51671 ssh2
...
2019-10-25 02:30:31
180.168.137.198 attackspam
Invalid user support from 180.168.137.198 port 58372
2019-10-25 02:40:47
196.203.31.154 attackbots
Invalid user ubuntu from 196.203.31.154 port 40990
2019-10-25 02:35:06
3.114.93.105 attackbots
Invalid user user from 3.114.93.105 port 21045
2019-10-25 02:28:52
68.183.124.53 attackspambots
Invalid user qy from 68.183.124.53 port 55138
2019-10-25 02:17:56
18.213.238.136 attackspam
Invalid user usuario from 18.213.238.136 port 32928
2019-10-25 02:28:34
117.121.100.228 attack
Invalid user user from 117.121.100.228 port 36308
2019-10-25 02:03:56
59.17.83.93 attack
Oct 24 19:56:55 odroid64 sshd\[14375\]: Invalid user admin from 59.17.83.93
Oct 24 19:56:55 odroid64 sshd\[14375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.17.83.93
...
2019-10-25 02:20:00
50.2.189.106 attack
Oct 24 19:51:41 server sshd\[24069\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.2.189.106  user=root
Oct 24 19:51:43 server sshd\[24069\]: Failed password for root from 50.2.189.106 port 36400 ssh2
Oct 24 19:55:28 server sshd\[25099\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.2.189.106  user=root
Oct 24 19:55:30 server sshd\[25099\]: Failed password for root from 50.2.189.106 port 42596 ssh2
Oct 24 20:13:49 server sshd\[29183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.2.189.106  user=root
...
2019-10-25 02:22:48

最近上报的IP列表

2.58.56.55 91.25.109.227 216.36.96.207 167.172.177.125
81.94.156.226 135.237.126.203 39.144.162.230 180.178.57.74
34.231.195.239 221.207.34.189 28.76.5.176 142.93.199.16
5.180.186.61 1.82.133.130 100.30.248.17 83.4.161.145
47.84.99.214 47.237.80.102 100.26.230.4 135.233.112.103