必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Lindfield

省份(region): New South Wales

国家(country): Australia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.21.130.47
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29216
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.21.130.47.			IN	A

;; AUTHORITY SECTION:
.			373	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 13:40:44 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
47.130.21.103.in-addr.arpa domain name pointer ip-103-21-130-47.mdg-it.net.au.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
47.130.21.103.in-addr.arpa	name = ip-103-21-130-47.mdg-it.net.au.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
46.105.102.68 attackspambots
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-07-28 22:36:30
54.39.57.1 attack
Jul 28 14:13:40 jumpserver sshd[284972]: Invalid user hjsung from 54.39.57.1 port 57836
Jul 28 14:13:42 jumpserver sshd[284972]: Failed password for invalid user hjsung from 54.39.57.1 port 57836 ssh2
Jul 28 14:17:56 jumpserver sshd[285045]: Invalid user pai from 54.39.57.1 port 41528
...
2020-07-28 22:29:48
218.92.0.165 attackspambots
Jul 28 15:13:41 ajax sshd[4717]: Failed password for root from 218.92.0.165 port 61062 ssh2
Jul 28 15:13:45 ajax sshd[4717]: Failed password for root from 218.92.0.165 port 61062 ssh2
2020-07-28 22:24:13
206.189.121.29 attackspam
Automatic report - XMLRPC Attack
2020-07-28 22:25:45
139.59.215.241 attackbots
139.59.215.241 - - \[28/Jul/2020:15:27:43 +0200\] "POST /wp-login.php HTTP/1.0" 200 6827 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
139.59.215.241 - - \[28/Jul/2020:15:27:43 +0200\] "POST /wp-login.php HTTP/1.0" 200 6642 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
139.59.215.241 - - \[28/Jul/2020:15:27:43 +0200\] "POST /wp-login.php HTTP/1.0" 200 6639 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-07-28 22:17:21
60.251.42.155 attackspam
*Port Scan* detected from 60.251.42.155 (TW/Taiwan/Taiwan/Taipei/60-251-42-155.HINET-IP.hinet.net). 4 hits in the last 190 seconds
2020-07-28 22:19:56
45.134.179.57 attackspam
Jul 28 16:16:04 debian-2gb-nbg1-2 kernel: \[18204264.821569\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.134.179.57 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=33557 PROTO=TCP SPT=51398 DPT=306 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-28 22:27:46
106.92.60.189 attackspambots
20 attempts against mh-ssh on acorn
2020-07-28 22:42:28
112.122.5.6 attack
$f2bV_matches
2020-07-28 22:40:33
142.93.101.21 attackbotsspam
Jul 28 12:06:16 localhost sshd\[27603\]: Invalid user lzs from 142.93.101.21 port 56872
Jul 28 12:06:16 localhost sshd\[27603\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.101.21
Jul 28 12:06:19 localhost sshd\[27603\]: Failed password for invalid user lzs from 142.93.101.21 port 56872 ssh2
...
2020-07-28 22:16:49
174.253.128.112 attack
His name is josh Cruz from Beverly hills Florida. He's been stealing my accounts money emails just everything he can do he stole my identity too. April Stacey.  He's going by my name too. kristiparker6966@gmail.com thanks
2020-07-28 22:59:53
220.225.126.55 attackspambots
Jul 28 14:38:42 eventyay sshd[32102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.225.126.55
Jul 28 14:38:44 eventyay sshd[32102]: Failed password for invalid user jmiller from 220.225.126.55 port 57770 ssh2
Jul 28 14:43:30 eventyay sshd[32224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.225.126.55
...
2020-07-28 22:47:44
50.235.70.202 attackbots
$f2bV_matches
2020-07-28 22:57:52
165.22.122.246 attackbotsspam
Jul 28 14:17:43 prod4 sshd\[8119\]: Invalid user ibpzxz from 165.22.122.246
Jul 28 14:17:45 prod4 sshd\[8119\]: Failed password for invalid user ibpzxz from 165.22.122.246 port 45534 ssh2
Jul 28 14:22:23 prod4 sshd\[10932\]: Invalid user xueshuxinxing from 165.22.122.246
...
2020-07-28 22:48:07
162.247.74.204 attackspambots
(webmin) Failed Webmin login from 162.247.74.204 (US/United States/billsf.tor-exit.calyxinstitute.org): 1 in the last 3600 secs
2020-07-28 22:15:17

最近上报的IP列表

103.21.130.180 103.21.131.25 103.21.150.17 103.21.182.71
103.21.252.219 103.211.197.29 103.211.216.159 103.211.216.161
103.211.216.200 103.211.216.208 103.211.216.69 103.211.217.18
103.211.217.187 103.211.217.202 103.211.217.224 103.211.218.35
103.211.54.254 103.212.145.16 82.224.99.33 103.212.158.78