必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Gurugram

省份(region): Haryana

国家(country): India

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
103.208.70.46 attack
20/8/25@23:53:39: FAIL: Alarm-Network address from=103.208.70.46
...
2020-08-26 15:06:26
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.208.70.0 - 103.208.70.255'

% Abuse contact for '103.208.70.0 - 103.208.70.255' is 'Smrutiranjan.Panda@tataplayfiber.com'

inetnum:        103.208.70.0 - 103.208.70.255
netname:        TATAPLAYBROADBAND-IN
descr:          TATASKYBB
country:        IN
admin-c:        TPBP1-AP
tech-c:         AT1406-AP
abuse-c:        AT1644-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-TATAPLAYBROADBAND-IN
mnt-irt:        IRT-TATAPLAYBROADBAND-IN
last-modified:  2022-01-28T01:24:30Z
source:         APNIC

irt:            IRT-TATAPLAYBROADBAND-IN
address:        Unit 306, 3rd Floor, Windsor, Off. C.S.T. Road, Kalina Santacruz (East), Mumbai 400098
phone:          +91-9811918518
e-mail:         Smrutiranjan.Panda@tataplayfiber.com
abuse-mailbox:  Smrutiranjan.Panda@tataplayfiber.com
admin-c:        TPBP1-AP
tech-c:         TPBP1-AP
auth:           # Filtered
remarks:        smrutiranjan.panda@tataplayfiber.com was validated on 2025-11-28
mnt-by:         MAINT-TATAPLAYBROADBAND-IN
last-modified:  2025-11-28T08:48:59Z
source:         APNIC

role:           ABUSE TATASKYBROADBANDIN
address:        Office nos. 132 to 138, Regus Imperial Business Park Centre Pvt. Ltd., Block-A, Level-1
address:        Shiv Sagar Estate, Dr. Annie, Besant Road, Worli. Mumbai-400018, Maharashtra, India
country:        ZZ
phone:          +000000000
e-mail:         Vikas.Singh1@tataskybb.com
admin-c:        TPBP1-AP
tech-c:         TPBP1-AP
nic-hdl:        AT1406-AP
remarks:        Generated from irt object IRT-TATASKYBROADBAND-IN
remarks:        vikas.singh1@tataskybb.com was validated on 2022-01-03
abuse-mailbox:  Vikas.Singh1@tataskybb.com
mnt-by:         APNIC-ABUSE
last-modified:  2022-01-28T00:47:36Z
source:         APNIC

role:           ABUSE TATAPLAYBROADBANDIN
country:        ZZ
address:        Unit 306, 3rd Floor, Windsor, Off. C.S.T. Road, Kalina Santacruz (East), Mumbai 400098
phone:          +91-9811918518
e-mail:         Smrutiranjan.Panda@tataplayfiber.com
admin-c:        TPBP1-AP
tech-c:         TPBP1-AP
nic-hdl:        AT1644-AP
remarks:        Generated from irt object IRT-TATAPLAYBROADBAND-IN
remarks:        smrutiranjan.panda@tataplayfiber.com was validated on 2025-11-28
abuse-mailbox:  Smrutiranjan.Panda@tataplayfiber.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-11-28T08:49:24Z
source:         APNIC

role:           Tata Play Broadband Private Limited Administrator
address:        Office nos. 132 to 138, Regus Imperial Business Park Centre Pvt. Ltd., Block-A, Level-1
address:        Shiv Sagar Estate, Dr. Annie, Besant Road, Worli. Mumbai-400018, Maharashtra, India
country:        IN
phone:          +91-9967139939
e-mail:         vikas.singh1@tataskybb.com
admin-c:        TPBP1-AP
tech-c:         TPBP1-AP
nic-hdl:        TPBP1-AP
notify:         vikas.singh1@tataskybb.com
mnt-by:         MAINT-TATAPLAYBROADBAND-IN
last-modified:  2022-01-28T00:59:15Z
source:         APNIC

% Information related to '103.208.70.0/24AS134674'

route:          103.208.70.0/24
origin:         AS134674
descr:          TATA PLAY BROADBAND PRIVATE LIMITED
                Unit 306, 3rd Floor, Windsor, Off. C.S.T. Road, Kalina
                Santacruz (East), Mumbai 400098
mnt-by:         MAINT-TATAPLAYBROADBAND-IN
last-modified:  2022-01-28T01:18:58Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.208.70.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49501
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.208.70.212.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026020600 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 06 17:37:02 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 212.70.208.103.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 212.70.208.103.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
123.155.7.52 attackspambots
Unauthorised access (Oct  3) SRC=123.155.7.52 LEN=40 TTL=49 ID=9839 TCP DPT=8080 WINDOW=59638 SYN 
Unauthorised access (Oct  2) SRC=123.155.7.52 LEN=40 TTL=49 ID=34990 TCP DPT=8080 WINDOW=46490 SYN 
Unauthorised access (Oct  1) SRC=123.155.7.52 LEN=40 TTL=49 ID=53455 TCP DPT=8080 WINDOW=59638 SYN
2019-10-03 08:33:21
42.119.201.181 attackspam
(Oct  3)  LEN=40 TTL=47 ID=47178 TCP DPT=8080 WINDOW=32533 SYN 
 (Oct  2)  LEN=40 TTL=47 ID=34886 TCP DPT=8080 WINDOW=32533 SYN 
 (Oct  2)  LEN=40 TTL=47 ID=19517 TCP DPT=8080 WINDOW=23861 SYN 
 (Oct  2)  LEN=40 TTL=47 ID=17855 TCP DPT=8080 WINDOW=18477 SYN 
 (Oct  1)  LEN=40 TTL=47 ID=6355 TCP DPT=8080 WINDOW=23861 SYN 
 (Oct  1)  LEN=40 TTL=47 ID=29727 TCP DPT=8080 WINDOW=63148 SYN 
 (Oct  1)  LEN=40 TTL=47 ID=30662 TCP DPT=8080 WINDOW=23861 SYN 
 (Oct  1)  LEN=40 TTL=47 ID=14700 TCP DPT=8080 WINDOW=63148 SYN 
 (Oct  1)  LEN=40 TTL=47 ID=43390 TCP DPT=8080 WINDOW=32533 SYN 
 (Oct  1)  LEN=40 TTL=47 ID=49416 TCP DPT=8080 WINDOW=32533 SYN 
 (Sep 30)  LEN=40 TTL=43 ID=7115 TCP DPT=8080 WINDOW=32533 SYN 
 (Sep 30)  LEN=40 TTL=43 ID=35 TCP DPT=8080 WINDOW=63148 SYN 
 (Sep 30)  LEN=40 TTL=48 ID=27801 TCP DPT=8080 WINDOW=23861 SYN 
 (Sep 30)  LEN=40 TTL=47 ID=14719 TCP DPT=8080 WINDOW=18477 SYN
2019-10-03 08:08:16
66.155.18.238 attackbots
Oct  2 13:50:11 php1 sshd\[26105\]: Invalid user server from 66.155.18.238
Oct  2 13:50:11 php1 sshd\[26105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.155.18.238
Oct  2 13:50:14 php1 sshd\[26105\]: Failed password for invalid user server from 66.155.18.238 port 38544 ssh2
Oct  2 13:54:16 php1 sshd\[26495\]: Invalid user qwerty from 66.155.18.238
Oct  2 13:54:16 php1 sshd\[26495\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.155.18.238
2019-10-03 08:09:33
122.188.209.211 attackbots
Oct  2 14:05:03 tdfoods sshd\[14632\]: Invalid user mc1 from 122.188.209.211
Oct  2 14:05:03 tdfoods sshd\[14632\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.188.209.211
Oct  2 14:05:05 tdfoods sshd\[14632\]: Failed password for invalid user mc1 from 122.188.209.211 port 38184 ssh2
Oct  2 14:09:13 tdfoods sshd\[15048\]: Invalid user lighttpd from 122.188.209.211
Oct  2 14:09:13 tdfoods sshd\[15048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.188.209.211
2019-10-03 08:12:06
94.177.242.181 attackbotsspam
10/02/2019-19:14:09.384765 94.177.242.181 Protocol: 17 ET SCAN Sipvicious User-Agent Detected (friendly-scanner)
2019-10-03 08:36:13
121.128.1.179 attackspambots
2019-10-02T21:25:46Z - RDP login failed multiple times. (121.128.1.179)
2019-10-03 08:18:40
151.80.140.13 attack
Oct  3 03:01:41 www sshd\[50040\]: Failed password for games from 151.80.140.13 port 57216 ssh2Oct  3 03:05:19 www sshd\[50210\]: Invalid user sysadmin from 151.80.140.13Oct  3 03:05:21 www sshd\[50210\]: Failed password for invalid user sysadmin from 151.80.140.13 port 39464 ssh2
...
2019-10-03 08:21:50
209.99.131.147 attackbots
Unauthorized access detected from banned ip
2019-10-03 08:10:22
148.70.249.72 attackbots
Oct  2 19:37:15 ny01 sshd[13752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.249.72
Oct  2 19:37:18 ny01 sshd[13752]: Failed password for invalid user newsnews from 148.70.249.72 port 50544 ssh2
Oct  2 19:42:37 ny01 sshd[14683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.249.72
2019-10-03 08:07:20
95.110.17.107 attackbotsspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/95.110.17.107/ 
 RU - 1H : (524)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : RU 
 NAME ASN : ASN28812 
 
 IP : 95.110.17.107 
 
 CIDR : 95.110.0.0/17 
 
 PREFIX COUNT : 29 
 
 UNIQUE IP COUNT : 319232 
 
 
 WYKRYTE ATAKI Z ASN28812 :  
  1H - 1 
  3H - 1 
  6H - 3 
 12H - 6 
 24H - 7 
 
 DateTime : 2019-10-02 23:25:45 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-10-03 08:17:42
103.247.88.136 attack
Oct  3 02:07:52 mail kernel: [1250639.684976] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=103.247.88.136 DST=77.73.69.240 LEN=40 TOS=0x08 PREC=0x20 TTL=78 ID=8407 DF PROTO=TCP SPT=56166 DPT=443 WINDOW=29200 RES=0x00 SYN URGP=0 
...
2019-10-03 08:09:00
182.214.170.72 attackbots
Oct  3 03:14:44 www2 sshd\[39189\]: Invalid user hanna from 182.214.170.72Oct  3 03:14:46 www2 sshd\[39189\]: Failed password for invalid user hanna from 182.214.170.72 port 36996 ssh2Oct  3 03:19:24 www2 sshd\[39713\]: Invalid user bot from 182.214.170.72
...
2019-10-03 08:28:17
121.15.2.178 attackspam
Oct  2 23:09:59 apollo sshd\[13110\]: Invalid user service from 121.15.2.178Oct  2 23:10:02 apollo sshd\[13110\]: Failed password for invalid user service from 121.15.2.178 port 51016 ssh2Oct  2 23:25:19 apollo sshd\[13198\]: Failed password for www-data from 121.15.2.178 port 35966 ssh2
...
2019-10-03 08:34:54
172.108.154.2 attackbots
Oct  2 14:15:02 php1 sshd\[28530\]: Invalid user fbackup from 172.108.154.2
Oct  2 14:15:02 php1 sshd\[28530\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.108.154.2
Oct  2 14:15:04 php1 sshd\[28530\]: Failed password for invalid user fbackup from 172.108.154.2 port 59407 ssh2
Oct  2 14:19:32 php1 sshd\[28976\]: Invalid user an from 172.108.154.2
Oct  2 14:19:32 php1 sshd\[28976\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.108.154.2
2019-10-03 08:20:39
144.135.85.184 attackbots
Oct  3 01:29:12 icinga sshd[20306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.135.85.184
Oct  3 01:29:14 icinga sshd[20306]: Failed password for invalid user smmsp from 144.135.85.184 port 13075 ssh2
...
2019-10-03 08:22:57

最近上报的IP列表

167.71.248.1 159.223.71.126 66.90.98.106 162.216.149.65
49.153.165.66 217.168.244.241 20.65.110.35 157.238.154.183
198.235.24.179 8.215.41.147 106.54.176.158 8.129.86.52
211.175.22.22 57.135.128.105 46.201.41.112 106.11.31.25
52.146.21.82 1.4.134.5 94.231.206.4 94.231.206.35