必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.25.103.0 - 103.25.103.255'

% Abuse contact for '103.25.103.0 - 103.25.103.255' is 'support@global-na.net'

inetnum:        103.25.103.0 - 103.25.103.255
netname:        NTT_Communications_Corporation
descr:          NTT Communications Corporation
country:        JP
admin-c:        SM1178-AP
tech-c:         SM1178-AP
abuse-c:        SM1178-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-GLOBAL-NA-JP
mnt-irt:        IRT-GLOBAL-NA-JP
last-modified:  2026-04-05T11:13:40Z
remarks:        For SPAM/ABUSE Issue:info@zlidc.net
source:         APNIC

irt:            IRT-GLOBAL-NA-JP
address:        Mimoza-Building 3F Minami-Ootsuka2-11-10 Toshima-ku Tokyo Japan 170-0005
e-mail:         support@global-na.net
abuse-mailbox:  support@global-na.net
admin-c:        GNAI1-AP
tech-c:         GNAI1-AP
auth:           # Filtered
remarks:        support@global-na.net was validated on 2025-12-30
mnt-by:         MAINT-GLOBAL-NA-JP
last-modified:  2025-12-30T14:10:44Z
source:         APNIC

person:         Sachie Mochimaru
address:        Mimoza-Building 3F Minami-Ootsuka2-11-10, Toshima-ku Tokyo 170-0005
country:        JP
phone:          +81-3-6682-5901
e-mail:         sachie.mochimaru@global-na.net
nic-hdl:        SM1178-AP
abuse-mailbox:  abuse@global-na.net
mnt-by:         MAINT-GLOBAL-NA-JP
last-modified:  2015-06-15T07:23:19Z
source:         APNIC

% Information related to '103.25.103.0/24AS148996'

route:          103.25.103.0/24
origin:         AS148996
descr:          Global Network Agency Inc.
                Mimoza-Building 3F Minami-Ootsuka2-11-10
mnt-by:         MAINT-GLOBAL-NA-JP
last-modified:  2025-11-04T08:00:24Z
source:         APNIC

% Information related to '103.25.103.0/24AS23532'

route:          103.25.103.0/24
origin:         AS23532
descr:          Global Network Agency Inc.
                Mimoza-Building 3F Minami-Ootsuka2-11-10
mnt-by:         MAINT-GLOBAL-NA-JP
last-modified:  2025-11-10T00:57:26Z
source:         APNIC

% Information related to '103.25.103.0/24AS2914'

route:          103.25.103.0/24
origin:         AS2914
descr:          NTT Communications Corporation
mnt-by:         MAINT-GLOBAL-NA-JP
last-modified:  2026-04-05T11:31:10Z
source:         APNIC

% Information related to '103.25.103.0/24AS400342'

route:          103.25.103.0/24
origin:         AS400342
descr:          Global Network Agency Inc.
                Mimoza-Building 3F Minami-Ootsuka2-11-10
mnt-by:         MAINT-GLOBAL-NA-JP
last-modified:  2025-11-10T00:57:06Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.25.103.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44818
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.25.103.252.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042600 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 26 22:07:47 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
b'Host 252.103.25.103.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 103.25.103.252.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
59.80.31.23 attackspam
Unauthorized connection attempt detected from IP address 59.80.31.23 to port 200 [T]
2020-01-09 04:22:54
60.190.202.44 attackbotsspam
Unauthorized connection attempt detected from IP address 60.190.202.44 to port 445 [T]
2020-01-09 04:22:21
222.186.175.23 attackbots
Jan  8 21:25:19 MK-Soft-Root1 sshd[31204]: Failed password for root from 222.186.175.23 port 16468 ssh2
Jan  8 21:25:22 MK-Soft-Root1 sshd[31204]: Failed password for root from 222.186.175.23 port 16468 ssh2
Jan  8 21:25:25 MK-Soft-Root1 sshd[31204]: Failed password for root from 222.186.175.23 port 16468 ssh2
...
2020-01-09 04:26:51
223.221.240.54 attackspam
Unauthorized connection attempt detected from IP address 223.221.240.54 to port 445 [T]
2020-01-09 04:00:43
41.216.186.50 attackbots
SASL Brute Force
2020-01-09 03:56:27
119.66.200.31 attack
Unauthorized connection attempt detected from IP address 119.66.200.31 to port 5555 [T]
2020-01-09 04:17:35
180.171.163.107 attackbotsspam
Unauthorized connection attempt detected from IP address 180.171.163.107 to port 445 [T]
2020-01-09 04:10:09
222.215.254.212 attackbots
Unauthorized connection attempt detected from IP address 222.215.254.212 to port 1433 [T]
2020-01-09 04:02:12
180.153.104.89 attackbots
Unauthorized connection attempt detected from IP address 180.153.104.89 to port 7001 [T]
2020-01-09 04:32:51
202.106.149.130 attack
Jan  8 20:54:16 icinga sshd[27739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.106.149.130
Jan  8 20:54:17 icinga sshd[27739]: Failed password for invalid user admin from 202.106.149.130 port 52730 ssh2
...
2020-01-09 04:31:03
221.214.179.51 attackspam
Unauthorized connection attempt detected from IP address 221.214.179.51 to port 22 [T]
2020-01-09 04:05:11
180.108.19.192 attack
Unauthorized connection attempt detected from IP address 180.108.19.192 to port 23 [T]
2020-01-09 04:10:24
101.254.182.206 attack
Unauthorized connection attempt detected from IP address 101.254.182.206 to port 1433 [T]
2020-01-09 04:20:42
221.125.248.132 attack
Unauthorized connection attempt detected from IP address 221.125.248.132 to port 23 [T]
2020-01-09 04:29:13
218.16.123.136 attackbotsspam
Unauthorized connection attempt detected from IP address 218.16.123.136 to port 1433 [T]
2020-01-09 04:07:13

最近上报的IP列表

176.65.139.177 2606:4700:10::6814:6404 2606:4700:10::ac43:2367 2606:4700:10::6814:5524
2606:4700:10::6814:7468 223.160.232.206 205.185.116.229 110.78.158.88
2606:4700:10::6816:4548 94.103.57.94 207.181.1.174 125.124.228.141
124.131.0.243 213.180.203.21 175.150.7.80 20.111.57.15
203.88.204.212 38.248.95.254 104.236.111.168 2606:4700:10::6814:7181