必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Myanmar

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.25.240.0 - 103.25.243.255'

% Abuse contact for '103.25.240.0 - 103.25.243.255' is 'kothitsein@globalnetmm.com'

inetnum:        103.25.240.0 - 103.25.243.255
netname:        GTCL-MM
descr:          Global Technology Co., Ltd.
country:        MM
org:            ORG-GTCL1-AP
admin-c:        GTCL2-AP
tech-c:         GTCL2-AP
status:         ASSIGNED PORTABLE
abuse-c:        AG818-AP
mnt-by:         APNIC-HM
mnt-lower:      MAINT-GTCL-MM
mnt-routes:     MAINT-GTCL-MM
mnt-irt:        IRT-GTCL-MM
last-modified:  2021-07-30T00:12:49Z
source:         APNIC

irt:            IRT-GTCL-MM
address:        Room (1), Building (7), Myanmar ICT Park, Hlaing Township,, Yangon Yangon 11051
e-mail:         kothitsein@globalnetmm.com
abuse-mailbox:  kothitsein@globalnetmm.com
admin-c:        GTCL2-AP
tech-c:         GTCL2-AP
auth:           # Filtered
remarks:        kothitsein@globalnetmm.com is invalid
mnt-by:         MAINT-GTCL-MM
last-modified:  2025-09-04T07:04:52Z
source:         APNIC

organisation:   ORG-GTCL1-AP
org-name:       Global Technology Co., Ltd.
org-type:       LIR
country:        MM
address:        Room (1), Building (7), Myanmar ICT Park, Hlaing Township,
phone:          +951652324
fax-no:         +951507052
e-mail:         kothitsein@globalnetmm.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:16:24Z
source:         APNIC

role:           ABUSE GTCLMM
country:        ZZ
address:        Room (1), Building (7), Myanmar ICT Park, Hlaing Township,, Yangon Yangon 11051
phone:          +000000000
e-mail:         kothitsein@globalnetmm.com
admin-c:        GTCL2-AP
tech-c:         GTCL2-AP
nic-hdl:        AG818-AP
remarks:        Generated from irt object IRT-GTCL-MM
remarks:        kothitsein@globalnetmm.com is invalid
abuse-mailbox:  kothitsein@globalnetmm.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-05-07T13:08:52Z
source:         APNIC

role:           Global Technology Co Ltd administrator
address:        Room (1), Building (7), Myanmar ICT Park, Hlaing Township,, Yangon Yangon 11051
country:        MM
phone:          +951652324
fax-no:         +951652324
e-mail:         kothitsein@globalnetmm.com
admin-c:        GTCL2-AP
tech-c:         GTCL2-AP
nic-hdl:        GTCL2-AP
mnt-by:         MAINT-GTCL-MM
last-modified:  2014-06-06T04:47:17Z
source:         APNIC

% Information related to '103.25.241.0/24AS133384'

route:          103.25.241.0/24
origin:         AS133384
descr:          RedLink Communications Co., Ltd.
mnt-by:         MAINT-GTCL-MM
last-modified:  2021-07-30T00:21:30Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.25.241.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30627
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.25.241.166.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025101400 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 14 15:06:46 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 166.241.25.103.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 166.241.25.103.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
221.122.115.64 attackspambots
" "
2019-11-02 05:04:02
94.191.70.163 attack
Automatic report - Banned IP Access
2019-11-02 05:21:37
14.244.166.146 attackbotsspam
Unauthorized connection attempt from IP address 14.244.166.146 on Port 445(SMB)
2019-11-02 04:54:02
82.62.146.129 attackbotsspam
Unauthorized connection attempt from IP address 82.62.146.129 on Port 445(SMB)
2019-11-02 04:58:10
49.144.204.207 attack
445/tcp
[2019-11-01]1pkt
2019-11-02 04:56:13
14.141.169.117 attackbots
Unauthorized connection attempt from IP address 14.141.169.117 on Port 445(SMB)
2019-11-02 05:09:44
191.8.96.99 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/191.8.96.99/ 
 
 EU - 1H : (6)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : EU 
 NAME ASN : ASN27699 
 
 IP : 191.8.96.99 
 
 CIDR : 191.8.0.0/17 
 
 PREFIX COUNT : 267 
 
 UNIQUE IP COUNT : 6569728 
 
 
 ATTACKS DETECTED ASN27699 :  
  1H - 8 
  3H - 20 
  6H - 42 
 12H - 89 
 24H - 173 
 
 DateTime : 2019-11-01 21:15:18 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2019-11-02 04:54:34
27.199.13.181 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/27.199.13.181/ 
 
 CN - 1H : (634)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4837 
 
 IP : 27.199.13.181 
 
 CIDR : 27.192.0.0/11 
 
 PREFIX COUNT : 1262 
 
 UNIQUE IP COUNT : 56665856 
 
 
 ATTACKS DETECTED ASN4837 :  
  1H - 14 
  3H - 35 
  6H - 61 
 12H - 129 
 24H - 241 
 
 DateTime : 2019-11-01 21:15:35 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-02 04:53:42
51.38.80.173 attack
Nov  1 22:09:31 MK-Soft-VM5 sshd[17674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.80.173 
Nov  1 22:09:34 MK-Soft-VM5 sshd[17674]: Failed password for invalid user bnc from 51.38.80.173 port 58656 ssh2
...
2019-11-02 05:24:11
139.199.159.77 attackspambots
" "
2019-11-02 04:51:19
67.55.92.90 attack
$f2bV_matches
2019-11-02 05:20:51
221.194.137.28 attack
Nov  1 21:59:53 lnxded64 sshd[22552]: Failed password for root from 221.194.137.28 port 45256 ssh2
Nov  1 21:59:53 lnxded64 sshd[22552]: Failed password for root from 221.194.137.28 port 45256 ssh2
2019-11-02 05:00:39
84.200.211.112 attackbotsspam
Brute force SMTP login attempted.
...
2019-11-02 05:27:31
37.187.79.117 attack
F2B jail: sshd. Time: 2019-11-01 21:48:20, Reported by: VKReport
2019-11-02 05:05:45
144.217.79.233 attackbots
invalid user
2019-11-02 04:57:28

最近上报的IP列表

61.4.105.50 34.38.55.189 3.254.189.236 38.84.164.133
122.10.103.133 104.164.70.104 18.203.178.143 2001:0:348b:fb58:109f:2dc1:83b7:c271
124.72.61.142 158.69.152.252 114.119.119.24 175.107.2.1
153.3.238.28 61.241.54.232 122.225.120.27 210.67.142.230
104.218.235.243 14.212.95.50 113.141.87.37 36.41.68.121