必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.6.220.0 - 103.6.223.255'

% Abuse contact for '103.6.220.0 - 103.6.223.255' is 'yuhg@51idc.com'

inetnum:        103.6.220.0 - 103.6.223.255
netname:        Ruisu-51IDC
descr:          Shanghai ruisu Network Technology Co.,Ltd
descr:          Building 4,intelligence industry park,
descr:          No.1 Hulan West Road,Shanghai
country:        CN
admin-c:        YW7308-AP
tech-c:         YW7187-AP
mnt-by:         MAINT-CNNIC-AP
mnt-lower:      MAINT-CNNIC-AP
mnt-irt:        IRT-51IDC-CN
mnt-routes:     MAINT-CNNIC-AP
status:         ALLOCATED PORTABLE
last-modified:  2023-12-27T06:10:23Z
source:         APNIC

irt:            IRT-51IDC-CN
address:        Building 4,intelligence industry park,
address:        No.1 Hulan West Road,Shanghai
e-mail:         yuhg@51idc.com
abuse-mailbox:  yuhg@51idc.com
admin-c:        YW7308-AP
tech-c:         YW7187-AP
auth:           # Filtered
mnt-by:         MAINT-CNNIC-AP
last-modified:  2025-11-18T00:37:27Z
source:         APNIC

person:         Yu Huagang
address:        Building 4,intelligence industry park,
address:        No.1 Hulan West Road,Shanghai
country:        CN
phone:          +86-13818683083
e-mail:         yuhg@51idc.com
nic-hdl:        YW7187-AP
mnt-by:         MAINT-CNNIC-AP
last-modified:  2023-12-27T06:11:46Z
source:         APNIC

person:         Zheng Xiaochuan
address:        Building 4,intelligence industry park,
address:        No.1 Hulan West Road,Shanghai
country:        CN
phone:          +86-18516630940
e-mail:         anch-resource@51idc.com
nic-hdl:        YW7308-AP
mnt-by:         MAINT-CNNIC-AP
last-modified:  2023-12-27T06:07:15Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.6.222.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42447
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.6.222.1.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032302 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 24 09:55:33 CST 2026
;; MSG SIZE  rcvd: 104
HOST信息:
Host 1.222.6.103.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 1.222.6.103.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.92.0.179 attackbotsspam
2020-01-30T16:51:15.254050xentho-1 sshd[918195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.179  user=root
2020-01-30T16:51:16.846606xentho-1 sshd[918195]: Failed password for root from 218.92.0.179 port 21866 ssh2
2020-01-30T16:51:21.504571xentho-1 sshd[918195]: Failed password for root from 218.92.0.179 port 21866 ssh2
2020-01-30T16:51:15.254050xentho-1 sshd[918195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.179  user=root
2020-01-30T16:51:16.846606xentho-1 sshd[918195]: Failed password for root from 218.92.0.179 port 21866 ssh2
2020-01-30T16:51:21.504571xentho-1 sshd[918195]: Failed password for root from 218.92.0.179 port 21866 ssh2
2020-01-30T16:51:15.254050xentho-1 sshd[918195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.179  user=root
2020-01-30T16:51:16.846606xentho-1 sshd[918195]: Failed password for root from 218.92
...
2020-01-31 05:54:35
61.148.90.42 attack
Unauthorized connection attempt detected from IP address 61.148.90.42 to port 1433 [T]
2020-01-31 05:53:45
77.21.75.16 attack
Unauthorized connection attempt detected from IP address 77.21.75.16 to port 22 [J]
2020-01-31 06:16:48
221.6.29.73 attackbotsspam
firewall-block, port(s): 1433/tcp
2020-01-31 05:54:03
134.175.117.8 attackspam
Jan 30 22:37:13 sd-53420 sshd\[27145\]: Invalid user yufei from 134.175.117.8
Jan 30 22:37:13 sd-53420 sshd\[27145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.117.8
Jan 30 22:37:15 sd-53420 sshd\[27145\]: Failed password for invalid user yufei from 134.175.117.8 port 38270 ssh2
Jan 30 22:39:55 sd-53420 sshd\[27538\]: Invalid user nandanamala from 134.175.117.8
Jan 30 22:39:55 sd-53420 sshd\[27538\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.117.8
...
2020-01-31 06:03:50
40.77.167.80 attackbots
Web App Attack
2020-01-31 06:00:43
114.233.79.25 attackspambots
Honeypot attack, port: 5555, PTR: PTR record not found
2020-01-31 06:20:40
192.144.164.229 attackspam
2020-1-30 10:40:08 PM: failed ssh attempt
2020-01-31 05:44:42
222.186.31.83 attackspambots
Jan 30 23:00:20 vps691689 sshd[18204]: Failed password for root from 222.186.31.83 port 53245 ssh2
Jan 30 23:00:23 vps691689 sshd[18204]: Failed password for root from 222.186.31.83 port 53245 ssh2
Jan 30 23:00:26 vps691689 sshd[18204]: Failed password for root from 222.186.31.83 port 53245 ssh2
...
2020-01-31 06:03:18
218.92.0.175 attack
Jan 31 03:17:59 areeb-Workstation sshd[10461]: Failed password for root from 218.92.0.175 port 9023 ssh2
Jan 31 03:18:03 areeb-Workstation sshd[10461]: Failed password for root from 218.92.0.175 port 9023 ssh2
...
2020-01-31 05:55:55
209.6.202.140 attackbots
Jan 30 21:40:07 prox sshd[11282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.6.202.140 
Jan 30 21:40:08 prox sshd[11282]: Failed password for invalid user bhupen from 209.6.202.140 port 47720 ssh2
2020-01-31 05:43:42
42.237.46.61 attack
Honeypot attack, port: 81, PTR: hn.kd.ny.adsl.
2020-01-31 05:58:44
185.175.158.50 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-31 06:16:20
176.110.169.82 attackbots
Honeypot attack, port: 445, PTR: ip-176-110-169-82.clients.345000.ru.
2020-01-31 06:14:14
62.234.146.92 attack
Jan 30 22:31:15 ns392434 sshd[24870]: Invalid user shreemayi from 62.234.146.92 port 52056
Jan 30 22:31:15 ns392434 sshd[24870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.146.92
Jan 30 22:31:15 ns392434 sshd[24870]: Invalid user shreemayi from 62.234.146.92 port 52056
Jan 30 22:31:17 ns392434 sshd[24870]: Failed password for invalid user shreemayi from 62.234.146.92 port 52056 ssh2
Jan 30 22:37:20 ns392434 sshd[24970]: Invalid user bahula from 62.234.146.92 port 57414
Jan 30 22:37:20 ns392434 sshd[24970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.146.92
Jan 30 22:37:20 ns392434 sshd[24970]: Invalid user bahula from 62.234.146.92 port 57414
Jan 30 22:37:22 ns392434 sshd[24970]: Failed password for invalid user bahula from 62.234.146.92 port 57414 ssh2
Jan 30 22:42:06 ns392434 sshd[25072]: Invalid user dola from 62.234.146.92 port 56406
2020-01-31 05:50:16

最近上报的IP列表

103.6.223.1 101.227.69.37 103.20.248.1 103.20.249.1
103.36.132.1 103.36.135.1 168.98.205.133 2606:4700:10::6814:9607
2606:4700:10::6814:7625 2606:4700:10::6814:6016 2606:4700:10::6816:2577 2606:4700:10::ac43:2852
135.250.165.17 12.57.177.62 118.63.230.32 66.102.189.240
74.126.83.120 207.40.26.225 192.128.254.104 172.21.135.90