必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Hong Kong

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
103.215.81.139 attackbots
$f2bV_matches
2020-05-13 01:32:35
103.215.81.139 attack
$f2bV_matches
2020-04-03 14:26:44
103.215.81.139 attack
Aug  1 07:46:40 MK-Soft-VM5 sshd\[3078\]: Invalid user dante from 103.215.81.139 port 40113
Aug  1 07:46:40 MK-Soft-VM5 sshd\[3078\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.215.81.139
Aug  1 07:46:41 MK-Soft-VM5 sshd\[3078\]: Failed password for invalid user dante from 103.215.81.139 port 40113 ssh2
...
2019-08-01 16:00:58
103.215.81.139 attackspam
SSH invalid-user multiple login attempts
2019-07-31 02:39:12
103.215.81.139 attack
Jul 29 04:03:17 econome sshd[9027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.215.81.139  user=r.r
Jul 29 04:03:18 econome sshd[9027]: Failed password for r.r from 103.215.81.139 port 42025 ssh2
Jul 29 04:03:18 econome sshd[9027]: Received disconnect from 103.215.81.139: 11: Bye Bye [preauth]
Jul 29 04:18:28 econome sshd[9465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.215.81.139  user=r.r
Jul 29 04:18:30 econome sshd[9465]: Failed password for r.r from 103.215.81.139 port 55524 ssh2
Jul 29 04:18:30 econome sshd[9465]: Received disconnect from 103.215.81.139: 11: Bye Bye [preauth]
Jul 29 04:23:24 econome sshd[9664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.215.81.139  user=r.r
Jul 29 
.... truncated .... 

Jul 29 04:03:17 econome sshd[9027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser=........
-------------------------------
2019-07-30 10:54:50
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.215.80.0 - 103.215.83.255'

% Abuse contact for '103.215.80.0 - 103.215.83.255' is 'netadsonlinelimited@gmail.com'

inetnum:        103.215.80.0 - 103.215.83.255
netname:        NOL-HK
descr:          UNIT 1010, MIRAMAR TOWER,
descr:          132 NATHAN ROAD,
descr:          TSIMSHATSUI, KOWLOON
country:        HK
geoloc:         22.335066 114.19588
org:            ORG-NOL1-AP
admin-c:        NOLA1-AP
tech-c:         NOLA1-AP
abuse-c:        AN834-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-NOL-HK
mnt-routes:     MAINT-NOL-HK
mnt-irt:        IRT-NOL-HK
last-modified:  2020-07-07T04:54:09Z
source:         APNIC

irt:            IRT-NOL-HK
address:        UNIT 1010, MIRAMAR TOWER,, 132 NATHAN ROAD,, TSIMSHATSUI, KOWLOON, Hong Kong
e-mail:         netadsonlinelimited@gmail.com
abuse-mailbox:  netadsonlinelimited@gmail.com
admin-c:        NOLA1-AP
tech-c:         NOLA1-AP
auth:           # Filtered
remarks:        netadsonlinelimited@gmail.com was validated on 2026-03-25
mnt-by:         MAINT-NOL-HK
last-modified:  2026-03-25T03:34:03Z
source:         APNIC

organisation:   ORG-NOL1-AP
org-name:       NETADS ONLINE LIMITED
org-type:       LIR
country:        HK
address:        UNIT 1010, MIRAMAR TOWER,
address:        132 NATHAN ROAD,
address:        TSIMSHATSUI, KOWLOON
phone:          +852 8123-7955
e-mail:         netadsonline@hlvpn.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:16:52Z
source:         APNIC

role:           ABUSE NOLHK
country:        ZZ
address:        UNIT 1010, MIRAMAR TOWER,, 132 NATHAN ROAD,, TSIMSHATSUI, KOWLOON, Hong Kong
phone:          +000000000
e-mail:         netadsonlinelimited@gmail.com
admin-c:        NOLA1-AP
tech-c:         NOLA1-AP
nic-hdl:        AN834-AP
remarks:        Generated from irt object IRT-NOL-HK
remarks:        netadsonlinelimited@gmail.com was validated on 2026-03-25
abuse-mailbox:  netadsonlinelimited@gmail.com
mnt-by:         APNIC-ABUSE
last-modified:  2026-03-25T03:34:20Z
source:         APNIC

role:           NETADS ONLINE LIMITED administrator
address:        UNIT 1010, MIRAMAR TOWER,, 132 NATHAN ROAD,, TSIMSHATSUI, KOWLOON, Hong Kong
country:        HK
phone:          +852-7783-9940
fax-no:         +852-7783-9940
e-mail:         netadsonlinelimited@gmail.com
admin-c:        NOLA1-AP
tech-c:         NOLA1-AP
nic-hdl:        NOLA1-AP
mnt-by:         MAINT-NOL-HK
last-modified:  2016-04-20T05:32:21Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.215.81.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34894
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.215.81.14.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042802 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 29 17:18:17 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 14.81.215.103.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.81.215.103.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
142.93.195.189 attackbots
Mar  5 23:51:17 lukav-desktop sshd\[1855\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.195.189  user=root
Mar  5 23:51:18 lukav-desktop sshd\[1855\]: Failed password for root from 142.93.195.189 port 47054 ssh2
Mar  5 23:55:09 lukav-desktop sshd\[1942\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.195.189  user=daemon
Mar  5 23:55:11 lukav-desktop sshd\[1942\]: Failed password for daemon from 142.93.195.189 port 35934 ssh2
Mar  5 23:58:53 lukav-desktop sshd\[2055\]: Invalid user yamashita from 142.93.195.189
2020-03-06 06:59:20
114.67.113.90 attackbotsspam
Mar  5 22:59:26 serwer sshd\[27107\]: Invalid user test from 114.67.113.90 port 44112
Mar  5 22:59:26 serwer sshd\[27107\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.113.90
Mar  5 22:59:28 serwer sshd\[27107\]: Failed password for invalid user test from 114.67.113.90 port 44112 ssh2
...
2020-03-06 06:27:56
78.110.159.40 attackspambots
Mar  5 22:59:27 debian-2gb-nbg1-2 kernel: \[5704735.686440\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=78.110.159.40 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=8192 PROTO=TCP SPT=47753 DPT=3791 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-06 06:30:02
148.153.65.30 attack
" "
2020-03-06 06:37:40
193.70.43.220 attackspambots
2020-03-05T21:59:07.267228Z 1636fedfa529 New connection: 193.70.43.220:52414 (172.17.0.6:2222) [session: 1636fedfa529]
2020-03-05T21:59:34.967466Z 80f6f4cda22a New connection: 193.70.43.220:56404 (172.17.0.6:2222) [session: 80f6f4cda22a]
2020-03-06 06:23:29
187.207.184.31 attack
detected by Fail2Ban
2020-03-06 07:04:27
120.132.6.27 attackspam
$f2bV_matches
2020-03-06 06:45:37
171.241.0.90 attack
Honeypot attack, port: 445, PTR: dynamic-ip-adsl.viettel.vn.
2020-03-06 06:21:40
185.27.193.99 attack
CMS (WordPress or Joomla) login attempt.
2020-03-06 06:50:19
110.43.34.48 attack
fail2ban
2020-03-06 06:35:42
46.105.244.17 attack
Mar  5 12:20:50 eddieflores sshd\[21724\]: Invalid user tsadmin from 46.105.244.17
Mar  5 12:20:50 eddieflores sshd\[21724\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.244.17
Mar  5 12:20:52 eddieflores sshd\[21724\]: Failed password for invalid user tsadmin from 46.105.244.17 port 35314 ssh2
Mar  5 12:21:33 eddieflores sshd\[21801\]: Invalid user user1 from 46.105.244.17
Mar  5 12:21:33 eddieflores sshd\[21801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.244.17
2020-03-06 06:25:13
106.54.112.154 attack
Mar  5 23:41:26 vps647732 sshd[8692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.112.154
Mar  5 23:41:28 vps647732 sshd[8692]: Failed password for invalid user dbuser from 106.54.112.154 port 57832 ssh2
...
2020-03-06 06:47:09
177.69.233.244 attackspam
Automatic report - Port Scan Attack
2020-03-06 06:21:11
101.231.146.34 attack
Mar  5 22:59:36 vpn01 sshd[20985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.231.146.34
Mar  5 22:59:38 vpn01 sshd[20985]: Failed password for invalid user ftp_user from 101.231.146.34 port 46526 ssh2
...
2020-03-06 06:22:08
221.159.152.134 attackspambots
Honeypot attack, port: 5555, PTR: PTR record not found
2020-03-06 06:34:23

最近上报的IP列表

43.153.208.49 34.62.187.246 2606:4700:10::6816:1625 121.234.219.199
2606:4700:10::6814:8349 131.103.141.18 69.3.235.157 49.7.235.5
43.160.219.138 45.135.193.131 110.77.248.117 2606:4700:10::ac43:2396
2606:4700:10::6814:7604 108.181.4.106 45.89.106.122 44.220.188.231
43.248.0.253 2606:4700:10::6814:7756 172.105.4.196 91.210.169.154