必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Myanmar

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.47.185.0 - 103.47.185.255'

% Abuse contact for '103.47.185.0 - 103.47.185.255' is 'support@mtg.com.mm'

inetnum:        103.47.185.0 - 103.47.185.255
netname:        MTGCL-MM
descr:          Myanmar Technology Gateway Co., Ltd
country:        MM
admin-c:        MTGC2-AP
tech-c:         MTGC2-AP
abuse-c:        AM2415-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-MTGCL-MM
mnt-irt:        IRT-MTGCL-MM
last-modified:  2021-11-26T02:43:54Z
source:         APNIC

irt:            IRT-MTGCL-MM
address:        No 560, Kabaraye Pagoda Road., Yangon Yangon
e-mail:         support@mtg.com.mm
abuse-mailbox:  support@mtg.com.mm
admin-c:        MTGC2-AP
tech-c:         MTGC2-AP
auth:           # Filtered
remarks:        support@mtg.com.mm was validated on 2025-11-13
mnt-by:         MAINT-MTGCL-MM
last-modified:  2025-11-18T00:29:34Z
source:         APNIC

role:           ABUSE MTGCLMM
country:        ZZ
address:        No 560, Kabaraye Pagoda Road., Yangon Yangon
phone:          +000000000
e-mail:         support@mtg.com.mm
admin-c:        MTGC2-AP
tech-c:         MTGC2-AP
nic-hdl:        AM2415-AP
remarks:        Generated from irt object IRT-MTGCL-MM
remarks:        support@mtg.com.mm was validated on 2025-11-13
abuse-mailbox:  support@mtg.com.mm
mnt-by:         APNIC-ABUSE
last-modified:  2025-11-13T06:56:58Z
source:         APNIC

role:           Myanmar Technology Gateway Co Ltd administrator
address:        No 560, Kabaraye Pagoda Road., Yangon Yangon
country:        MM
phone:          +9595000263
fax-no:         +9595000263
e-mail:         support@mtg.com.mm
admin-c:        MTGC2-AP
tech-c:         MTGC2-AP
nic-hdl:        MTGC2-AP
mnt-by:         MAINT-MTGCL-MM
last-modified:  2014-12-29T01:32:30Z
source:         APNIC

% Information related to '103.47.185.0/24AS135149'

route:          103.47.185.0/24
descr:          route object for 103.47.185.0/24
origin:         AS135149
mnt-by:         MAINT-MTGCL-MM
country:        MM
last-modified:  2021-11-26T02:29:53Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.47.185.226
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57506
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.47.185.226.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032600 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 26 21:48:03 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
b'226.185.47.103.in-addr.arpa domain name pointer ncddmis.com.
'
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
226.185.47.103.in-addr.arpa	name = ncddmis.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
216.218.206.104 attackspambots
Port scan: Attack repeated for 24 hours
2020-04-07 00:09:53
112.135.196.233 attackbots
23/tcp
[2020-04-06]1pkt
2020-04-06 23:38:32
112.85.42.176 attackbotsspam
Apr  6 18:23:48 vpn01 sshd[12593]: Failed password for root from 112.85.42.176 port 28232 ssh2
Apr  6 18:23:52 vpn01 sshd[12593]: Failed password for root from 112.85.42.176 port 28232 ssh2
...
2020-04-07 00:28:32
45.112.205.59 attackspam
Port probing on unauthorized port 6379
2020-04-06 23:45:51
157.230.132.100 attack
(sshd) Failed SSH login from 157.230.132.100 (US/United States/-): 10 in the last 3600 secs
2020-04-07 00:05:48
116.196.82.80 attackspam
Apr  6 17:32:08 pve sshd[8878]: Failed password for root from 116.196.82.80 port 47892 ssh2
Apr  6 17:34:53 pve sshd[9278]: Failed password for root from 116.196.82.80 port 45872 ssh2
2020-04-06 23:59:22
156.238.160.137 attack
2020-04-06T15:30:17.183339shield sshd\[10623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.238.160.137  user=root
2020-04-06T15:30:18.850998shield sshd\[10623\]: Failed password for root from 156.238.160.137 port 42580 ssh2
2020-04-06T15:32:06.206380shield sshd\[10912\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.238.160.137  user=root
2020-04-06T15:32:07.838733shield sshd\[10912\]: Failed password for root from 156.238.160.137 port 43374 ssh2
2020-04-06T15:33:56.021933shield sshd\[11201\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.238.160.137  user=root
2020-04-06 23:34:26
140.213.188.201 attackbots
Automatic report - XMLRPC Attack
2020-04-07 00:08:53
178.128.226.2 attackbotsspam
2020-04-06T17:29:21.778414vps751288.ovh.net sshd\[20687\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.226.2  user=root
2020-04-06T17:29:24.093459vps751288.ovh.net sshd\[20687\]: Failed password for root from 178.128.226.2 port 42394 ssh2
2020-04-06T17:33:01.997714vps751288.ovh.net sshd\[20719\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.226.2  user=root
2020-04-06T17:33:04.181981vps751288.ovh.net sshd\[20719\]: Failed password for root from 178.128.226.2 port 47885 ssh2
2020-04-06T17:36:45.899766vps751288.ovh.net sshd\[20749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.226.2  user=root
2020-04-07 00:25:33
141.98.10.129 attackspambots
VoIP Brute Force - 141.98.10.129 - Auto Report
...
2020-04-07 00:24:31
197.87.131.133 attack
445/tcp
[2020-04-06]1pkt
2020-04-07 00:04:49
183.82.1.45 attack
Apr  6 17:30:57 dcd-gentoo sshd[381]: Invalid user ubuntu from 183.82.1.45 port 42420
Apr  6 17:34:06 dcd-gentoo sshd[512]: Invalid user ubuntu from 183.82.1.45 port 48690
Apr  6 17:37:16 dcd-gentoo sshd[616]: Invalid user gitlab from 183.82.1.45 port 54922
...
2020-04-06 23:38:00
222.186.42.155 attackbotsspam
Apr  6 18:15:12 server sshd[29057]: Failed password for root from 222.186.42.155 port 41105 ssh2
Apr  6 18:15:14 server sshd[29057]: Failed password for root from 222.186.42.155 port 41105 ssh2
Apr  6 18:15:17 server sshd[29057]: Failed password for root from 222.186.42.155 port 41105 ssh2
2020-04-07 00:17:43
46.41.134.48 attackspambots
Apr  6 18:09:00 legacy sshd[23909]: Failed password for root from 46.41.134.48 port 58268 ssh2
Apr  6 18:12:51 legacy sshd[24037]: Failed password for root from 46.41.134.48 port 60258 ssh2
...
2020-04-07 00:30:12
139.59.27.226 attack
139.59.27.226 - - [06/Apr/2020:17:36:39 +0200] "POST /wp-login.php HTTP/1.0" 200 2195 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.59.27.226 - - [06/Apr/2020:17:36:42 +0200] "POST /wp-login.php HTTP/1.0" 200 2184 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-04-07 00:35:33

最近上报的IP列表

192.252.183.219 122.192.203.78 122.193.247.71 110.77.226.11
2606:4700:10::ac43:2839 110.78.150.142 2606:4700:10::6814:6688 2606:4700:10::ac43:2650
2606:4700:10::6814:8754 110.77.248.127 2606:4700:10::ac43:1251 138.199.167.219
251.148.24.133 185.241.137.230 160.119.76.17 2606:4700:10::6816:365
2606:4700:10::ac43:2644 2606:4700:10::6816:444 2606:4700:10::6816:1900 2606:4700:10::ac43:866