必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Lelystad

省份(region): Flevoland

国家(country): The Netherlands

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
103.214.57.226 attackbotsspam
SpamScore above: 10.0
2020-05-27 21:32:53
103.214.54.34 attack
spam
2020-03-01 19:14:37
103.214.55.14 attack
Automatic report - Banned IP Access
2019-10-13 07:32:27
103.214.54.34 attackbotsspam
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 08:31:55
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.214.4.0 - 103.214.7.255'

% Abuse contact for '103.214.4.0 - 103.214.7.255' is 'info@hostslim.nl'

inetnum:        103.214.4.0 - 103.214.7.255
netname:        RAKAR-AP
descr:          RAKAR INVESTMENTS HOLDING B.V.
country:        NL
org:            ORG-RIHB1-AP
admin-c:        RIHB1-AP
tech-c:         RIHB1-AP
status:         ALLOCATED PORTABLE
abuse-c:        AR773-AP
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-RAKAR-AP
mnt-routes:     MAINT-RAKAR-AP
mnt-irt:        IRT-RAKAR-AP
last-modified:  2026-01-20T02:42:43Z
source:         APNIC

irt:            IRT-RAKAR-AP
address:        Artemisweg 145-G, Lelystad Flevoland 8239DD
e-mail:         info@hostslim.nl
abuse-mailbox:  info@hostslim.nl
admin-c:        RIHB1-AP
tech-c:         RIHB1-AP
auth:           # Filtered
remarks:        info@hostslim.nl was validated on 2026-01-06
mnt-by:         MAINT-RAKAR-AP
last-modified:  2026-01-06T13:10:23Z
source:         APNIC

organisation:   ORG-RIHB1-AP
org-name:       RAKAR INVESTMENTS HOLDING B.V.
org-type:       LIR
country:        NL
address:        Artemisweg 145-G
phone:          +31320301511
e-mail:         abuse@rakar.nl
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:16:53Z
source:         APNIC

role:           ABUSE RAKARAP
country:        ZZ
address:        Artemisweg 145-G, Lelystad Flevoland 8239DD
phone:          +000000000
e-mail:         info@hostslim.nl
admin-c:        RIHB1-AP
tech-c:         RIHB1-AP
nic-hdl:        AR773-AP
remarks:        Generated from irt object IRT-RAKAR-AP
remarks:        info@hostslim.nl was validated on 2026-01-06
abuse-mailbox:  info@hostslim.nl
mnt-by:         APNIC-ABUSE
last-modified:  2026-01-06T13:10:54Z
source:         APNIC

role:           RAKAR INVESTMENTS HOLDING BV administrator
address:        Artemisweg 145-G, Lelystad Flevoland 8239DD
country:        NL
phone:          +31320301511
fax-no:         +31320301511
e-mail:         abuse@rakar.nl
admin-c:        RIHB1-AP
tech-c:         RIHB1-AP
nic-hdl:        RIHB1-AP
mnt-by:         MAINT-RAKAR-AP
last-modified:  2016-05-18T09:31:32Z
source:         APNIC

% Information related to '103.214.4.0/22AS207083'

route:          103.214.4.0/22
origin:         AS207083
descr:          HostSlim BV
                Artemisweg 145-G
                8239 DD Lelystad
                The Netherlands
mnt-by:         MAINT-RAKAR-AP
last-modified:  2026-01-20T02:41:34Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.214.5.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35327
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.214.5.133.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031602 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 17 12:31:22 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
b'133.5.214.103.in-addr.arpa has no PTR record
'
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
*** Can't find 133.5.214.103.in-addr.arpa.: No answer

Authoritative answers can be found from:
5.214.103.in-addr.arpa
	origin = dns0.hostslim.nl
	mail addr = dns0.hostslim.nl
	serial = 2025061904
	refresh = 28800
	retry = 7200
	expire = 604800
	minimum = 86400
相关IP信息:
最新评论:
IP 类型 评论内容 时间
86.57.164.109 attack
$f2bV_matches
2020-03-29 14:36:50
109.190.77.152 attackspambots
Invalid user zh from 109.190.77.152 port 56110
2020-03-29 14:23:40
123.140.114.252 attack
2020-03-29T05:57:04.991056dmca.cloudsearch.cf sshd[25980]: Invalid user barretta from 123.140.114.252 port 53854
2020-03-29T05:57:04.997599dmca.cloudsearch.cf sshd[25980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.140.114.252
2020-03-29T05:57:04.991056dmca.cloudsearch.cf sshd[25980]: Invalid user barretta from 123.140.114.252 port 53854
2020-03-29T05:57:06.718779dmca.cloudsearch.cf sshd[25980]: Failed password for invalid user barretta from 123.140.114.252 port 53854 ssh2
2020-03-29T06:04:34.857270dmca.cloudsearch.cf sshd[26442]: Invalid user vco from 123.140.114.252 port 43232
2020-03-29T06:04:34.862835dmca.cloudsearch.cf sshd[26442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.140.114.252
2020-03-29T06:04:34.857270dmca.cloudsearch.cf sshd[26442]: Invalid user vco from 123.140.114.252 port 43232
2020-03-29T06:04:36.694568dmca.cloudsearch.cf sshd[26442]: Failed password for invalid user vc
...
2020-03-29 14:53:01
189.210.177.177 attackspambots
Mar 29 09:47:49 ift sshd\[28120\]: Invalid user aqc from 189.210.177.177Mar 29 09:47:50 ift sshd\[28120\]: Failed password for invalid user aqc from 189.210.177.177 port 42666 ssh2Mar 29 09:51:54 ift sshd\[28748\]: Invalid user bnc from 189.210.177.177Mar 29 09:51:56 ift sshd\[28748\]: Failed password for invalid user bnc from 189.210.177.177 port 54160 ssh2Mar 29 09:56:07 ift sshd\[29534\]: Invalid user qxk from 189.210.177.177
...
2020-03-29 14:57:43
106.12.134.168 attackspambots
Invalid user hv from 106.12.134.168 port 55212
2020-03-29 14:32:57
157.245.171.141 attack
SSH login attempts.
2020-03-29 14:28:08
106.52.50.225 attackbotsspam
Mar 29 05:37:36 work-partkepr sshd\[23621\]: Invalid user mti from 106.52.50.225 port 47080
Mar 29 05:37:36 work-partkepr sshd\[23621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.50.225
...
2020-03-29 14:47:21
106.12.109.33 attackspam
SSH login attempts.
2020-03-29 15:00:11
159.89.201.59 attackbotsspam
Mar 29 03:58:07 localhost sshd[1557]: Invalid user xgt from 159.89.201.59 port 54978
Mar 29 03:58:07 localhost sshd[1557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.201.59
Mar 29 03:58:07 localhost sshd[1557]: Invalid user xgt from 159.89.201.59 port 54978
Mar 29 03:58:09 localhost sshd[1557]: Failed password for invalid user xgt from 159.89.201.59 port 54978 ssh2
Mar 29 04:02:04 localhost sshd[1948]: Invalid user grafana from 159.89.201.59 port 57472
...
2020-03-29 14:52:45
46.38.145.5 attack
Mar 29 08:51:47 srv01 postfix/smtpd\[5219\]: warning: unknown\[46.38.145.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 29 08:52:18 srv01 postfix/smtpd\[5231\]: warning: unknown\[46.38.145.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 29 08:52:48 srv01 postfix/smtpd\[9005\]: warning: unknown\[46.38.145.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 29 08:53:19 srv01 postfix/smtpd\[9005\]: warning: unknown\[46.38.145.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 29 08:53:48 srv01 postfix/smtpd\[5231\]: warning: unknown\[46.38.145.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-03-29 14:57:29
138.68.81.162 attackbotsspam
3x Failed Password
2020-03-29 14:56:07
137.74.119.50 attackspam
Mar 29 01:51:45 NPSTNNYC01T sshd[26944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.119.50
Mar 29 01:51:47 NPSTNNYC01T sshd[26944]: Failed password for invalid user edr from 137.74.119.50 port 46436 ssh2
Mar 29 01:59:14 NPSTNNYC01T sshd[27422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.119.50
...
2020-03-29 15:04:16
41.222.15.157 attackbots
Unauthorized connection attempt detected from IP address 41.222.15.157 to port 23 [T]
2020-03-29 15:00:31
106.12.162.201 attack
Mar 29 07:57:29 * sshd[11856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.162.201
Mar 29 07:57:30 * sshd[11856]: Failed password for invalid user wrj from 106.12.162.201 port 48702 ssh2
2020-03-29 14:53:30
206.189.204.63 attackbots
Invalid user awe from 206.189.204.63 port 56042
2020-03-29 14:24:23

最近上报的IP列表

58.65.241.173 217.76.52.30 170.130.204.2 232.37.222.195
198.18.0.14 34.116.184.202 35.166.75.253 20.253.66.3
101.67.49.39 62.60.131.176 81.20.32.84 159.223.155.62
60.16.197.79 34.61.82.184 182.119.229.226 10.90.31.73
20.14.73.168 52.255.41.213 41.110.4.106 69.10.48.159