必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): India

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.40.60.0 - 103.40.63.255'

% Abuse contact for '103.40.60.0 - 103.40.63.255' is 'gleamwws@gmail.com'

inetnum:        103.40.60.0 - 103.40.63.255
netname:        GLEM_KPT
descr:          Gleam Worldwide Services Pvt Ltd.
admin-c:        AC1301-AP
tech-c:         AC1301-AP
country:        IN
mnt-by:         MAINT-IN-IRINN
mnt-irt:        IRT-GLEM-IN
mnt-routes:     MAINT-IN-GLEAM
mnt-routes:     MAINT-IN-IRINN
status:         ASSIGNED PORTABLE
last-modified:  2025-08-11T22:49:08Z
source:         APNIC

irt:            IRT-GLEM-IN
address:        guru nanak nagar kanjli road
e-mail:         gleamwws@gmail.com
abuse-mailbox:  gleamwws@gmail.com
admin-c:        AC1301-AP
tech-c:         AC1301-AP
auth:           # Filtered
mnt-by:         MAINT-IN-GLEAM
mnt-by:         MAINT-IN-IRINN
last-modified:  2025-11-18T00:29:24Z
source:         APNIC

role:           Admin Company
address:        guru nanak nagar, kanjli road
country:        IN
phone:          +91 1822329486
e-mail:         gleamwws@gmail.com
admin-c:        MS1747-AP
tech-c:         MS1747-AP
nic-hdl:        AC1301-AP
mnt-by:         MAINT-IN-GLEAM
mnt-by:         MAINT-IN-IRINN
last-modified:  2025-09-27T09:53:57Z
source:         APNIC

% Information related to '103.40.61.0/24AS133700'

route:          103.40.61.0/24
descr:          Gleam Worldwide Services Pvt Ltd.
origin:         AS133700
mnt-by:         MAINT-IN-IRINN
mnt-routes:     MAINT-IN-GLEAM
last-modified:  2018-10-24T06:28:47Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.40.61.98
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30003
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.40.61.98.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025120800 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 09 01:00:09 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 98.61.40.103.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 98.61.40.103.in-addr.arpa: SERVFAIL

相关IP信息:
最新评论:
IP 类型 评论内容 时间
129.226.67.78 attackbots
May 25 07:20:01 l03 sshd[8319]: Invalid user thunder from 129.226.67.78 port 58492
...
2020-05-25 18:05:07
213.178.252.28 attack
2020-05-24 UTC: (34x) - admin,apache,at,bollman,daniel,jboss,kyakushi,lancelot,logan,minecraft,nagios,pcap,plegrand,rares,root(18x),test,vinodh
2020-05-25 18:05:35
175.138.1.97 attack
port scan and connect, tcp 23 (telnet)
2020-05-25 17:58:01
82.189.223.116 attackspam
SSH login attempts.
2020-05-25 17:51:02
210.18.183.120 attackbotsspam
odoo8
...
2020-05-25 18:17:16
195.54.166.184 attackbotsspam
Port scan on 9 port(s): 14128 14411 14557 14596 14781 14784 14944 14957 14961
2020-05-25 18:25:42
179.217.0.66 attackbotsspam
"Unauthorized connection attempt on SSHD detected"
2020-05-25 18:02:23
125.77.23.30 attackspam
2020-05-25T11:17:52.619486  sshd[16137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.77.23.30  user=root
2020-05-25T11:17:54.920345  sshd[16137]: Failed password for root from 125.77.23.30 port 46728 ssh2
2020-05-25T11:28:46.821650  sshd[16439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.77.23.30  user=root
2020-05-25T11:28:48.906519  sshd[16439]: Failed password for root from 125.77.23.30 port 52994 ssh2
...
2020-05-25 17:55:03
148.63.45.182 attack
May 25 10:09:41 host sshd[18524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.63.45.182  user=root
May 25 10:09:43 host sshd[18524]: Failed password for root from 148.63.45.182 port 33774 ssh2
...
2020-05-25 18:04:35
84.2.226.70 attackbotsspam
(sshd) Failed SSH login from 84.2.226.70 (HU/Hungary/ktv5402E246.fixip.t-online.hu): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 25 11:37:17 ubnt-55d23 sshd[29231]: Invalid user skkb from 84.2.226.70 port 36460
May 25 11:37:19 ubnt-55d23 sshd[29231]: Failed password for invalid user skkb from 84.2.226.70 port 36460 ssh2
2020-05-25 18:11:47
165.22.114.208 attackbots
165.22.114.208 - - \[25/May/2020:10:59:40 +0200\] "POST /wp-login.php HTTP/1.0" 200 6524 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
165.22.114.208 - - \[25/May/2020:10:59:47 +0200\] "POST /wp-login.php HTTP/1.0" 200 6343 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
165.22.114.208 - - \[25/May/2020:10:59:52 +0200\] "POST /wp-login.php HTTP/1.0" 200 6347 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-05-25 18:27:39
175.236.156.204 attackspambots
Detected by ModSecurity. Request URI: /wp-login.php
2020-05-25 18:27:21
119.90.51.171 attackspam
Brute-force attempt banned
2020-05-25 17:56:36
157.230.225.35 attackbotsspam
May 25 11:51:14 MainVPS sshd[20050]: Invalid user melanie from 157.230.225.35 port 51400
May 25 11:51:14 MainVPS sshd[20050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.225.35
May 25 11:51:14 MainVPS sshd[20050]: Invalid user melanie from 157.230.225.35 port 51400
May 25 11:51:16 MainVPS sshd[20050]: Failed password for invalid user melanie from 157.230.225.35 port 51400 ssh2
May 25 11:56:29 MainVPS sshd[23910]: Invalid user support from 157.230.225.35 port 58006
...
2020-05-25 18:20:42
94.191.60.213 attackspambots
Fail2Ban Ban Triggered (2)
2020-05-25 18:07:15

最近上报的IP列表

54.156.160.91 176.65.132.157 169.150.207.234 168.160.170.7
146.190.23.179 23.95.68.31 163.61.199.171 163.61.199.161
5.187.35.158 192.204.43.10 59.217.254.123 43.248.109.241
101.67.137.230 95.155.246.159 74.7.230.20 152.32.190.31
74.7.227.4 39.98.43.124 20.168.122.52 74.7.241.172