必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Kuala Lumpur

省份(region): Kuala Lumpur

国家(country): Malaysia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.82.228.0 - 103.82.228.255'

% Abuse contact for '103.82.228.0 - 103.82.228.255' is 'net.abuse@rocksoft.net'

inetnum:        103.82.228.0 - 103.82.228.255
netname:        ROCKSOFTSDNBHD-MY
descr:          WISDOM CLOUD INTERNET TECHNOLOGY PTE. LTD
country:        SG
admin-c:        RSBA1-AP
tech-c:         RSBA1-AP
abuse-c:        AR983-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-ROCKSOFTSDNBHD-MY
mnt-irt:        IRT-ROCKSOFTSDNBHD-MY
last-modified:  2026-02-02T06:45:31Z
source:         APNIC

irt:            IRT-ROCKSOFTSDNBHD-MY
address:        LG-01, SME Technopreneur Centre 3 ,, Block 3740 Persiaran APEC Cyber 8 ,, Cyberjaya Selangor 63500
e-mail:         net.abuse@rocksoft.net
abuse-mailbox:  net.abuse@rocksoft.net
admin-c:        RSBA1-AP
tech-c:         RSBA1-AP
auth:           # Filtered
remarks:        net.abuse@rocksoft.net was validated on 2025-10-01
mnt-by:         MAINT-ROCKSOFTSDNBHD-MY
last-modified:  2025-11-18T00:31:21Z
source:         APNIC

role:           ABUSE ROCKSOFTSDNBHDMY
country:        ZZ
address:        LG-01, SME Technopreneur Centre 3 ,, Block 3740 Persiaran APEC Cyber 8 ,, Cyberjaya Selangor 63500
phone:          +000000000
e-mail:         net.abuse@rocksoft.net
admin-c:        RSBA1-AP
tech-c:         RSBA1-AP
nic-hdl:        AR983-AP
remarks:        Generated from irt object IRT-ROCKSOFTSDNBHD-MY
remarks:        net.abuse@rocksoft.net was validated on 2025-10-01
abuse-mailbox:  net.abuse@rocksoft.net
mnt-by:         APNIC-ABUSE
last-modified:  2025-10-01T09:18:50Z
source:         APNIC

role:           RockSoft Sdn Bhd administrator
address:        LG-01, SME Technopreneur Centre 3 ,, Block 3740 Persiaran APEC Cyber 8 ,, Cyberjaya Selangor 63500
country:        MY
phone:          +603-8319-3615
fax-no:         +603-8319-3615
e-mail:         net.abuse@rocksoft.net
admin-c:        RSBA1-AP
tech-c:         RSBA1-AP
nic-hdl:        RSBA1-AP
mnt-by:         MAINT-ROCKSOFTSDNBHD-MY
last-modified:  2017-01-04T05:32:36Z
source:         APNIC

% Information related to '103.82.228.0/24AS197537'

route:          103.82.228.0/24
origin:         AS197537
descr:          WISDOM CLOUD INTERNET TECHNOLOGY PTE. LTD
mnt-by:         MAINT-ROCKSOFTSDNBHD-MY
last-modified:  2026-02-13T07:13:35Z
source:         APNIC

% Information related to '103.82.228.0/24AS202736'

route:          103.82.228.0/24
origin:         AS202736
descr:          WISDOM CLOUD INTERNET TECHNOLOGY PTE. LTD
mnt-by:         MAINT-ROCKSOFTSDNBHD-MY
last-modified:  2026-02-13T07:12:57Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.82.228.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23922
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.82.228.55.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042102 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 22 12:12:47 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 55.228.82.103.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 103.82.228.55.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
148.70.201.162 attack
2019-11-18T19:31:26.159724abusebot-7.cloudsearch.cf sshd\[18600\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.201.162  user=root
2019-11-19 03:54:54
109.242.232.165 attackspam
TCP Port Scanning
2019-11-19 03:36:48
148.70.101.245 attackspambots
Automatic report - Banned IP Access
2019-11-19 03:46:23
222.186.175.202 attackspambots
Nov 18 20:30:00 mail sshd[11070]: Failed password for root from 222.186.175.202 port 32072 ssh2
Nov 18 20:30:03 mail sshd[11070]: Failed password for root from 222.186.175.202 port 32072 ssh2
Nov 18 20:30:07 mail sshd[11070]: Failed password for root from 222.186.175.202 port 32072 ssh2
Nov 18 20:30:10 mail sshd[11070]: Failed password for root from 222.186.175.202 port 32072 ssh2
2019-11-19 03:48:08
199.58.86.211 attackbotsspam
Automatic report - Banned IP Access
2019-11-19 03:48:48
123.206.46.177 attack
2019-11-18T13:18:03.3144501495-001 sshd\[30080\]: Invalid user taghvatalab from 123.206.46.177 port 47332
2019-11-18T13:18:03.3218801495-001 sshd\[30080\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.46.177
2019-11-18T13:18:04.7497511495-001 sshd\[30080\]: Failed password for invalid user taghvatalab from 123.206.46.177 port 47332 ssh2
2019-11-18T13:43:39.3599591495-001 sshd\[31004\]: Invalid user jadyn from 123.206.46.177 port 47004
2019-11-18T13:43:39.3634031495-001 sshd\[31004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.46.177
2019-11-18T13:43:40.9913841495-001 sshd\[31004\]: Failed password for invalid user jadyn from 123.206.46.177 port 47004 ssh2
...
2019-11-19 03:34:20
116.214.56.11 attackbots
SSH brutforce
2019-11-19 03:51:09
118.89.27.248 attackspam
Automatic report - Banned IP Access
2019-11-19 03:33:54
118.34.12.35 attack
Nov 18 08:53:57 web1 sshd\[19533\]: Invalid user coel from 118.34.12.35
Nov 18 08:53:57 web1 sshd\[19533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.34.12.35
Nov 18 08:53:58 web1 sshd\[19533\]: Failed password for invalid user coel from 118.34.12.35 port 32848 ssh2
Nov 18 08:58:10 web1 sshd\[19889\]: Invalid user evita from 118.34.12.35
Nov 18 08:58:10 web1 sshd\[19889\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.34.12.35
2019-11-19 03:50:44
183.91.153.250 attack
Nov 18 09:49:02 web1 postfix/smtpd[4964]: warning: unknown[183.91.153.250]: SASL LOGIN authentication failed: authentication failure
...
2019-11-19 03:27:27
106.12.45.108 attack
2019-11-18T18:40:09.734619abusebot-4.cloudsearch.cf sshd\[19938\]: Invalid user ptricia1234 from 106.12.45.108 port 40726
2019-11-19 03:31:20
192.99.32.86 attackbotsspam
Nov 18 19:26:40 server sshd\[20900\]: Invalid user jorrie from 192.99.32.86 port 59940
Nov 18 19:26:40 server sshd\[20900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.32.86
Nov 18 19:26:42 server sshd\[20900\]: Failed password for invalid user jorrie from 192.99.32.86 port 59940 ssh2
Nov 18 19:29:59 server sshd\[17581\]: Invalid user neil from 192.99.32.86 port 40310
Nov 18 19:29:59 server sshd\[17581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.32.86
2019-11-19 03:52:17
202.129.210.59 attack
Nov 18 18:01:15 localhost sshd\[39514\]: Invalid user guest1234678 from 202.129.210.59 port 45776
Nov 18 18:01:15 localhost sshd\[39514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.129.210.59
Nov 18 18:01:16 localhost sshd\[39514\]: Failed password for invalid user guest1234678 from 202.129.210.59 port 45776 ssh2
Nov 18 18:05:39 localhost sshd\[39665\]: Invalid user sendyk from 202.129.210.59 port 56998
Nov 18 18:05:39 localhost sshd\[39665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.129.210.59
...
2019-11-19 03:58:27
107.180.120.59 attackbots
107.180.120.59 - - [18/Nov/2019:09:48:51 -0500] "GET /?page=products&action=view&manufacturerID=61&productID=12L&linkID=7334999999.1%20union%20select%20unhex(hex(version()))%20--%20and%201%3D1 HTTP/1.1" 200 58331 "-" "-"
107.180.120.59 - - [18/Nov/2019:09:48:51 -0500] "GET /?page=products&action=view&manufacturerID=61&productID=12L&linkID=733499999%27%20union%20select%20unhex(hex(version()))%20--%20%27x%27=%27x HTTP/1.1" 200 58331 "-" "-"
107.180.120.59 - - [18/Nov/2019:09:48:51 -0500] "GET /?page=products&action=view&manufacturerID=61&productID=12L&linkID=733499999%22%20union%20select%20unhex(hex(version()))%20--%20%22x%22=%22x HTTP/1.1" 200 58331 "-" "-"
107.180.120.59 - - [18/Nov/2019:09:48:52 -0500] "GET /?page=products&action=view&manufacturerID=61&productID=12L&linkID=7334%20or%20(1,2)=(select*from(select%20name_const(CHAR(111,108,111,108,111,115,104,101,114),1),name_const(CHAR(111,108,111,108,111,115,104,101,114),1))a)%20--%20and%201%3D1 H
2019-11-19 03:35:42
46.37.215.176 attack
1574088495 - 11/18/2019 15:48:15 Host: 46.37.215.176/46.37.215.176 Port: 6001 TCP Blocked
2019-11-19 04:00:19

最近上报的IP列表

2606:4700:10::ac43:2808 219.140.5.111 113.213.4.84 36.101.150.151
2606:4700:10::6816:1406 121.237.149.167 2606:4700:10::6814:8384 2606:4700:10::6814:4750
2606:4700:10::6814:7363 2606:4700:10::6816:2511 240e:454:412c:1355:2c44:c2ff:fe1d:4e6f 66.132.195.92
178.128.114.205 45.207.221.17 111.33.154.219 103.152.175.227
2606:4700:10::ac43:2566 2606:4700:10::ac43:1684 2606:4700:10::ac43:181e 2606:4700:10::ac43:1900