必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Vietnam

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
103.199.98.220 attack
$f2bV_matches
2020-10-06 01:23:42
103.199.98.220 attack
SSH Invalid Login
2020-10-04 05:46:32
103.199.98.220 attack
Oct  3 14:26:24 prox sshd[31838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.199.98.220 
Oct  3 14:26:26 prox sshd[31838]: Failed password for invalid user marjorie from 103.199.98.220 port 39002 ssh2
2020-10-03 21:47:48
103.199.98.220 attackspambots
Invalid user redmine from 103.199.98.220 port 59542
2020-10-03 13:29:52
103.199.98.220 attack
Invalid user webftp from 103.199.98.220 port 39014
2020-09-21 20:32:54
103.199.98.220 attackbotsspam
Invalid user webftp from 103.199.98.220 port 39014
2020-09-21 12:23:51
103.199.98.220 attackbots
Invalid user tf2mgeserver from 103.199.98.220 port 54704
2020-09-21 04:15:28
103.199.98.220 attack
Invalid user guest from 103.199.98.220 port 36374
2020-08-25 17:24:40
103.199.98.220 attackbotsspam
Aug 15 14:08:59 ns382633 sshd\[16822\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.199.98.220  user=root
Aug 15 14:09:00 ns382633 sshd\[16822\]: Failed password for root from 103.199.98.220 port 51070 ssh2
Aug 15 14:18:41 ns382633 sshd\[18511\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.199.98.220  user=root
Aug 15 14:18:42 ns382633 sshd\[18511\]: Failed password for root from 103.199.98.220 port 54090 ssh2
Aug 15 14:23:52 ns382633 sshd\[19405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.199.98.220  user=root
2020-08-15 22:09:40
103.199.98.220 attackbotsspam
Aug  2 18:15:40 php1 sshd\[11057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.199.98.220  user=root
Aug  2 18:15:42 php1 sshd\[11057\]: Failed password for root from 103.199.98.220 port 32822 ssh2
Aug  2 18:19:57 php1 sshd\[11464\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.199.98.220  user=root
Aug  2 18:19:59 php1 sshd\[11464\]: Failed password for root from 103.199.98.220 port 59280 ssh2
Aug  2 18:25:00 php1 sshd\[12111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.199.98.220  user=root
2020-08-03 12:35:09
103.199.99.134 attackbotsspam
Automatic report - Banned IP Access
2020-08-03 06:45:27
103.199.98.220 attackbots
Jul  8 15:55:02 ncomp sshd[31604]: User mail from 103.199.98.220 not allowed because none of user's groups are listed in AllowGroups
Jul  8 15:55:02 ncomp sshd[31604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.199.98.220  user=mail
Jul  8 15:55:02 ncomp sshd[31604]: User mail from 103.199.98.220 not allowed because none of user's groups are listed in AllowGroups
Jul  8 15:55:04 ncomp sshd[31604]: Failed password for invalid user mail from 103.199.98.220 port 53278 ssh2
2020-07-09 01:37:51
103.199.98.220 attackbots
2020-06-27T14:12:51.397510ns386461 sshd\[28818\]: Invalid user liao from 103.199.98.220 port 59464
2020-06-27T14:12:51.401107ns386461 sshd\[28818\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.199.98.220
2020-06-27T14:12:53.134340ns386461 sshd\[28818\]: Failed password for invalid user liao from 103.199.98.220 port 59464 ssh2
2020-06-27T14:22:32.496007ns386461 sshd\[5065\]: Invalid user admin from 103.199.98.220 port 44714
2020-06-27T14:22:32.500444ns386461 sshd\[5065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.199.98.220
...
2020-06-27 20:24:46
103.199.98.220 attack
May  4 09:06:36 ms-srv sshd[34241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.199.98.220  user=root
May  4 09:06:38 ms-srv sshd[34241]: Failed password for invalid user root from 103.199.98.220 port 46496 ssh2
2020-06-17 03:49:24
103.199.99.134 attack
Port probing on unauthorized port 23
2020-05-28 01:07:33
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.199.8.0 - 103.199.11.255'

% Abuse contact for '103.199.8.0 - 103.199.11.255' is 'hm-changed@vnnic.vn'

inetnum:        103.199.8.0 - 103.199.11.255
netname:        GLTEC-VN
descr:          GLTEC Corp
descr:          P304-A5, 29 Lac Trung, Vinh Tuy, Hai Ba Trung, HaNoi
admin-c:        GHC11-AP
tech-c:         PNP4-AP
country:        VN
mnt-by:         MAINT-VN-VNNIC
mnt-lower:      MAINT-VN-VNNIC
mnt-irt:        IRT-VNNIC-AP
mnt-routes:     MAINT-VN-VNNIC
status:         ALLOCATED PORTABLE
last-modified:  2019-03-20T03:49:34Z
source:         APNIC

irt:            IRT-VNNIC-AP
address:        Ha Noi, VietNam
phone:          +84-24-35564944
fax-no:         +84-24-37821462
e-mail:         hm-changed@vnnic.vn
abuse-mailbox:  hm-changed@vnnic.vn
admin-c:        NTTT1-AP
tech-c:         NTTT1-AP
auth:           # Filtered
mnt-by:         MAINT-VN-VNNIC
last-modified:  2026-04-06T06:49:37Z
source:         APNIC

person:         Giap Hung Cuong
address:        GLTEC-VN
country:        VN
phone:          +84-849861111
e-mail:         congtygltec@gmail.com
nic-hdl:        GHC11-AP
mnt-by:         MAINT-VN-VNNIC
last-modified:  2019-03-20T03:39:53Z
source:         APNIC

person:         Pham Ngoc Phuc
address:        GLTEC-VN
country:        VN
phone:          +84-989925679
e-mail:         kythuat@vinacis.com
nic-hdl:        PNP4-AP
mnt-by:         MAINT-VN-VNNIC
last-modified:  2020-07-08T09:52:58Z
source:         APNIC

% Information related to '103.199.9.0/24AS135905'

route:          103.199.9.0/24
descr:          GLTEC-VN
origin:         AS135905
mnt-by:         MAINT-VN-VNNIC
last-modified:  2025-10-13T08:09:48Z
source:         APNIC

% Information related to '103.199.9.0/24AS135944'

route:          103.199.9.0/24
descr:          GLTEC-VN
origin:         AS135944
mnt-by:         MAINT-VN-VNNIC
last-modified:  2022-09-12T07:18:35Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.199.9.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13540
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.199.9.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041701 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 17 16:53:58 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 139.9.199.103.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 103.199.9.139.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
91.134.242.199 attackbots
Jul  7 15:35:55 vmd17057 sshd\[15869\]: Invalid user riley from 91.134.242.199 port 44128
Jul  7 15:35:55 vmd17057 sshd\[15869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.242.199
Jul  7 15:35:57 vmd17057 sshd\[15869\]: Failed password for invalid user riley from 91.134.242.199 port 44128 ssh2
...
2019-07-08 02:31:18
93.42.75.89 attack
Jul  7 16:35:29 srv-4 sshd\[15834\]: Invalid user pi from 93.42.75.89
Jul  7 16:35:29 srv-4 sshd\[15836\]: Invalid user pi from 93.42.75.89
Jul  7 16:35:29 srv-4 sshd\[15834\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.42.75.89
...
2019-07-08 02:39:51
113.73.145.147 attackspambots
Banned for posting to wp-login.php without referer {"pwd":"admin1","redirect_to":"http:\/\/meghanduffyhomes.com\/wp-admin\/theme-install.php","testcookie":"1","log":"admin","wp-submit":"Log In"}
2019-07-08 02:40:07
189.126.169.133 attackbots
smtp auth brute force
2019-07-08 02:40:32
139.28.218.130 attackspambots
Postfix DNSBL listed. Trying to send SPAM.
2019-07-08 02:56:39
85.246.129.162 attack
Invalid user oracle2 from 85.246.129.162 port 56319
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.246.129.162
Failed password for invalid user oracle2 from 85.246.129.162 port 56319 ssh2
Invalid user dick from 85.246.129.162 port 36858
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.246.129.162
2019-07-08 02:49:57
117.0.35.153 attack
Jul  7 18:08:19 mail sshd\[15418\]: Invalid user admin from 117.0.35.153 port 58113
Jul  7 18:08:19 mail sshd\[15418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.0.35.153
Jul  7 18:08:21 mail sshd\[15418\]: Failed password for invalid user admin from 117.0.35.153 port 58113 ssh2
Jul  7 18:08:23 mail sshd\[15420\]: Invalid user admin from 117.0.35.153 port 56733
Jul  7 18:08:23 mail sshd\[15420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.0.35.153
...
2019-07-08 02:35:45
187.237.130.98 attack
Jul  7 17:52:30 meumeu sshd[17611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.237.130.98 
Jul  7 17:52:32 meumeu sshd[17611]: Failed password for invalid user test from 187.237.130.98 port 37430 ssh2
Jul  7 17:54:53 meumeu sshd[17875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.237.130.98 
...
2019-07-08 02:32:25
8.209.72.167 attackspambots
RDPBruteGam24
2019-07-08 02:42:15
130.255.130.147 attack
Fail2Ban Ban Triggered
2019-07-08 03:13:30
116.52.9.220 attackspambots
Jul  7 20:34:05 server sshd[18713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.52.9.220
...
2019-07-08 02:45:46
45.55.129.23 attackbotsspam
Tried sshing with brute force.
2019-07-08 03:03:42
62.210.90.109 attackspam
\[2019-07-07 14:31:55\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-07T14:31:55.146-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="886748122518018",SessionID="0x7f02f81c5a28",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.90.109/63603",ACLName="no_extension_match"
\[2019-07-07 14:32:16\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-07T14:32:16.818-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="074648122518018",SessionID="0x7f02f876b078",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.90.109/61404",ACLName="no_extension_match"
\[2019-07-07 14:33:06\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-07T14:33:06.310-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="886848122518018",SessionID="0x7f02f876b078",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.90.109/59149",ACLName="no_
2019-07-08 02:36:10
142.93.248.5 attackbots
Jul  7 16:05:12 dedicated sshd[31663]: Invalid user nu from 142.93.248.5 port 48716
Jul  7 16:05:12 dedicated sshd[31663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.248.5
Jul  7 16:05:12 dedicated sshd[31663]: Invalid user nu from 142.93.248.5 port 48716
Jul  7 16:05:14 dedicated sshd[31663]: Failed password for invalid user nu from 142.93.248.5 port 48716 ssh2
Jul  7 16:08:25 dedicated sshd[31911]: Invalid user rs from 142.93.248.5 port 45994
2019-07-08 03:02:30
77.247.110.188 attack
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-07-08 03:07:53

最近上报的IP列表

103.180.133.82 172.105.5.198 139.162.148.41 114.25.97.133
81.181.166.215 2606:4700:10::6814:7095 2606:4700:10::ac43:2265 2606:4700:10::6814:5200
2606:4700:10::6814:6806 2606:4700:10::ac43:1669 14.207.194.67 88.101.166.185
103.121.95.193 125.78.75.248 35.209.185.59 162.216.150.206
191.79.218.214 2606:4700:10::ac43:1445 2606:4700:10::6816:4031 2606:4700:10::ac43:1249