必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Hong Kong

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
103.215.80.101 attack
Scan port
2023-03-21 13:44:29
103.215.80.238 attack
firewall-block, port(s): 445/tcp
2020-05-23 19:13:13
103.215.80.46 attack
Time:     Fri May 15 22:25:39 2020 -0300
IP:       103.215.80.46 (HK/Hong Kong/-)
Failures: 5 (mod_security)
Interval: 3600 seconds
Blocked:  Permanent Block
2020-05-16 15:56:15
103.215.80.81 attackbotsspam
$f2bV_matches
2020-05-13 02:11:23
103.215.80.81 attackbots
$f2bV_matches
2020-04-03 15:15:30
103.215.80.110 attackbots
Automatic report - Banned IP Access
2020-02-17 15:10:00
103.215.80.81 attack
Nov 30 13:49:38 ws22vmsma01 sshd[109648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.215.80.81
Nov 30 13:49:40 ws22vmsma01 sshd[109648]: Failed password for invalid user kraatz from 103.215.80.81 port 40926 ssh2
...
2019-12-01 03:47:51
103.215.80.81 attackbotsspam
Nov 29 07:57:26 [host] sshd[32294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.215.80.81  user=root
Nov 29 07:57:28 [host] sshd[32294]: Failed password for root from 103.215.80.81 port 42234 ssh2
Nov 29 08:02:40 [host] sshd[32401]: Invalid user bonnefoy from 103.215.80.81
Nov 29 08:02:40 [host] sshd[32401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.215.80.81
2019-11-29 17:57:38
103.215.80.81 attackbotsspam
Nov 15 00:18:34 lnxded63 sshd[31678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.215.80.81
2019-11-15 08:29:15
103.215.80.81 attackspam
Automatic report - Banned IP Access
2019-11-09 01:43:04
103.215.80.81 attack
F2B jail: sshd. Time: 2019-10-25 15:16:31, Reported by: VKReport
2019-10-25 21:34:24
103.215.80.81 attack
Oct 21 14:34:22 localhost sshd\[129821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.215.80.81  user=root
Oct 21 14:34:23 localhost sshd\[129821\]: Failed password for root from 103.215.80.81 port 34718 ssh2
Oct 21 14:38:34 localhost sshd\[129952\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.215.80.81  user=root
Oct 21 14:38:36 localhost sshd\[129952\]: Failed password for root from 103.215.80.81 port 57616 ssh2
Oct 21 14:43:03 localhost sshd\[130140\]: Invalid user tester from 103.215.80.81 port 52478
...
2019-10-21 22:55:41
103.215.80.171 attack
Automatic report - Port Scan
2019-10-10 05:39:53
103.215.80.182 attackbotsspam
xmlrpc attack
2019-07-15 03:13:47
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.215.80.0 - 103.215.83.255'

% Abuse contact for '103.215.80.0 - 103.215.83.255' is 'netadsonlinelimited@gmail.com'

inetnum:        103.215.80.0 - 103.215.83.255
netname:        NOL-HK
descr:          UNIT 1010, MIRAMAR TOWER,
descr:          132 NATHAN ROAD,
descr:          TSIMSHATSUI, KOWLOON
country:        HK
geoloc:         22.335066 114.19588
org:            ORG-NOL1-AP
admin-c:        NOLA1-AP
tech-c:         NOLA1-AP
abuse-c:        AN834-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-NOL-HK
mnt-routes:     MAINT-NOL-HK
mnt-irt:        IRT-NOL-HK
last-modified:  2020-07-07T04:54:09Z
source:         APNIC

irt:            IRT-NOL-HK
address:        UNIT 1010, MIRAMAR TOWER,, 132 NATHAN ROAD,, TSIMSHATSUI, KOWLOON, Hong Kong
e-mail:         netadsonlinelimited@gmail.com
abuse-mailbox:  netadsonlinelimited@gmail.com
admin-c:        NOLA1-AP
tech-c:         NOLA1-AP
auth:           # Filtered
remarks:        netadsonlinelimited@gmail.com was validated on 2026-03-25
mnt-by:         MAINT-NOL-HK
last-modified:  2026-03-25T03:34:03Z
source:         APNIC

organisation:   ORG-NOL1-AP
org-name:       NETADS ONLINE LIMITED
org-type:       LIR
country:        HK
address:        UNIT 1010, MIRAMAR TOWER,
address:        132 NATHAN ROAD,
address:        TSIMSHATSUI, KOWLOON
phone:          +852 8123-7955
e-mail:         netadsonline@hlvpn.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:16:52Z
source:         APNIC

role:           ABUSE NOLHK
country:        ZZ
address:        UNIT 1010, MIRAMAR TOWER,, 132 NATHAN ROAD,, TSIMSHATSUI, KOWLOON, Hong Kong
phone:          +000000000
e-mail:         netadsonlinelimited@gmail.com
admin-c:        NOLA1-AP
tech-c:         NOLA1-AP
nic-hdl:        AN834-AP
remarks:        Generated from irt object IRT-NOL-HK
remarks:        netadsonlinelimited@gmail.com was validated on 2026-03-25
abuse-mailbox:  netadsonlinelimited@gmail.com
mnt-by:         APNIC-ABUSE
last-modified:  2026-03-25T03:34:20Z
source:         APNIC

role:           NETADS ONLINE LIMITED administrator
address:        UNIT 1010, MIRAMAR TOWER,, 132 NATHAN ROAD,, TSIMSHATSUI, KOWLOON, Hong Kong
country:        HK
phone:          +852-7783-9940
fax-no:         +852-7783-9940
e-mail:         netadsonlinelimited@gmail.com
admin-c:        NOLA1-AP
tech-c:         NOLA1-AP
nic-hdl:        NOLA1-AP
mnt-by:         MAINT-NOL-HK
last-modified:  2016-04-20T05:32:21Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.215.80.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4466
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.215.80.68.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040902 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 10 07:31:12 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 68.80.215.103.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 68.80.215.103.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
122.51.246.89 attack
$f2bV_matches
2020-01-12 03:20:40
122.51.34.28 attackspam
$f2bV_matches
2020-01-12 03:21:08
122.51.207.46 attackbotsspam
$f2bV_matches
2020-01-12 03:22:49
222.186.173.180 attack
2020-01-11T19:21:20.023306abusebot-4.cloudsearch.cf sshd[30138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.180  user=root
2020-01-11T19:21:22.198104abusebot-4.cloudsearch.cf sshd[30138]: Failed password for root from 222.186.173.180 port 13922 ssh2
2020-01-11T19:21:25.174642abusebot-4.cloudsearch.cf sshd[30138]: Failed password for root from 222.186.173.180 port 13922 ssh2
2020-01-11T19:21:20.023306abusebot-4.cloudsearch.cf sshd[30138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.180  user=root
2020-01-11T19:21:22.198104abusebot-4.cloudsearch.cf sshd[30138]: Failed password for root from 222.186.173.180 port 13922 ssh2
2020-01-11T19:21:25.174642abusebot-4.cloudsearch.cf sshd[30138]: Failed password for root from 222.186.173.180 port 13922 ssh2
2020-01-11T19:21:20.023306abusebot-4.cloudsearch.cf sshd[30138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 
...
2020-01-12 03:29:47
122.51.187.52 attackbotsspam
SSH Brute-Force attacks
2020-01-12 03:23:53
122.51.41.26 attackspambots
Unauthorized connection attempt detected from IP address 122.51.41.26 to port 22
2020-01-12 03:19:21
123.207.107.183 attackbots
$f2bV_matches
2020-01-12 03:03:18
122.51.167.241 attack
$f2bV_matches
2020-01-12 03:25:37
122.51.37.26 attackbots
$f2bV_matches
2020-01-12 03:19:40
123.18.206.15 attack
Jan 11 20:05:58 dedicated sshd[18770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.18.206.15 
Jan 11 20:05:58 dedicated sshd[18770]: Invalid user ubnt from 123.18.206.15 port 51188
Jan 11 20:06:00 dedicated sshd[18770]: Failed password for invalid user ubnt from 123.18.206.15 port 51188 ssh2
Jan 11 20:08:29 dedicated sshd[19231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.18.206.15  user=root
Jan 11 20:08:31 dedicated sshd[19231]: Failed password for root from 123.18.206.15 port 34732 ssh2
2020-01-12 03:10:40
123.108.34.70 attackspam
Jan 11 16:56:26 Ubuntu-1404-trusty-64-minimal sshd\[3361\]: Invalid user webmaster from 123.108.34.70
Jan 11 16:56:26 Ubuntu-1404-trusty-64-minimal sshd\[3361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.108.34.70
Jan 11 16:56:28 Ubuntu-1404-trusty-64-minimal sshd\[3361\]: Failed password for invalid user webmaster from 123.108.34.70 port 50974 ssh2
Jan 11 17:02:52 Ubuntu-1404-trusty-64-minimal sshd\[10590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.108.34.70  user=root
Jan 11 17:02:54 Ubuntu-1404-trusty-64-minimal sshd\[10590\]: Failed password for root from 123.108.34.70 port 35928 ssh2
2020-01-12 03:14:12
122.51.253.156 attackspambots
Jan 11 20:20:45 ncomp sshd[23169]: Invalid user gustavo from 122.51.253.156
Jan 11 20:20:45 ncomp sshd[23169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.253.156
Jan 11 20:20:45 ncomp sshd[23169]: Invalid user gustavo from 122.51.253.156
Jan 11 20:20:47 ncomp sshd[23169]: Failed password for invalid user gustavo from 122.51.253.156 port 35454 ssh2
2020-01-12 03:20:09
122.51.93.116 attack
$f2bV_matches
2020-01-12 03:15:07
122.154.134.38 attackbotsspam
Jan 11 19:02:26 SilenceServices sshd[31159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.154.134.38
Jan 11 19:02:28 SilenceServices sshd[31159]: Failed password for invalid user qhsupport from 122.154.134.38 port 57592 ssh2
Jan 11 19:05:45 SilenceServices sshd[32465]: Failed password for root from 122.154.134.38 port 39350 ssh2
2020-01-12 03:35:42
123.206.81.209 attack
$f2bV_matches
2020-01-12 03:05:07

最近上报的IP列表

104.37.191.3 2606:4700:10::6814:6183 2606:4700:10::6814:6115 2606:4700:10::ac43:890
2606:4700:10::6816:532 2606:4700:10::6814:9959 193.202.9.211 181.94.229.11
17.239.194.181 64.23.180.195 38.250.187.139 122.192.203.117
2606:4700:10::6814:4745 2606:4700:10::6814:6660 2606:4700:10::6816:4263 2606:4700:10::ac43:1989
2606:4700:10::6816:2488 2606:4700:10::6814:9773 110.78.138.160 142.250.69.174