必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
103.82.74.122 attack
unauthorized connection attempt
2020-02-16 18:47:04
103.82.79.231 attackspam
Looking for resource vulnerabilities
2019-08-11 04:02:23
103.82.78.244 attackbots
Wednesday, July 24, 2019 4:46 AM Received from: 103.82.78.244 From: sophie@get-online-visibility.com Google ranking India SEO form spam bot
2019-07-27 13:18:07
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.82.7.0 - 103.82.7.255'

% Abuse contact for '103.82.7.0 - 103.82.7.255' is 'abuse@sqiva.com'

inetnum:        103.82.7.0 - 103.82.7.255
netname:        IDNIC-SQIVA-ID
descr:          PT Sqiva Sistem
descr:          Corporate / Direct Member IDNIC
descr:          Jl. Gatot Subroto Kav 50-52
descr:          Jakarta
admin-c:        AW772-AP
tech-c:         AW772-AP
country:        ID
mnt-by:         MNT-APJII-ID
mnt-irt:        IRT-SQIVA-ID
mnt-routes:     MAINT-ID-SQIVA
status:         ASSIGNED PORTABLE
last-modified:  2016-12-23T07:52:23Z
source:         APNIC

irt:            IRT-SQIVA-ID
address:        PT Sqiva Sistem
address:        Jl. Gatot Subroto Kav 50-52
address:        Jakarta
e-mail:         sni@sqiva.com
abuse-mailbox:  abuse@sqiva.com
admin-c:        AW772-AP
tech-c:         AW772-AP
auth:           # Filtered
mnt-by:         MAINT-ID-SQIVA
last-modified:  2026-03-09T15:39:19Z
source:         APNIC

person:         Alexander Warman
address:        Jl. Gatot Subroto Kav 50-52
address:        Jakarta 10260, Indonesia
country:        ID
phone:          +62-21-30051300
e-mail:         w-alex@sqiva.com
nic-hdl:        AW772-AP
mnt-by:         MNT-APJII-ID
last-modified:  2016-12-23T07:31:28Z
source:         APNIC

% Information related to '103.82.7.0 - 103.82.7.255'

inetnum:        103.82.7.0 - 103.82.7.255
netname:        IDNIC-SQIVA-ID
descr:          PT Sqiva Sistem
descr:          Corporate / Direct Member IDNIC
descr:          Jl. Gatot Subroto Kav 50-52
descr:          Jakarta
admin-c:        AW772-AP
tech-c:         AW772-AP
country:        ID
mnt-by:         MNT-APJII-ID
mnt-irt:        IRT-SQIVA-ID
mnt-routes:     MAINT-ID-SQIVA
status:         ASSIGNED PORTABLE
last-modified:  2016-12-23T07:52:23Z
source:         IDNIC

irt:            IRT-SQIVA-ID
address:        PT Sqiva Sistem
address:        Jl. Gatot Subroto Kav 50-52
address:        Jakarta
e-mail:         sni@sqiva.com
abuse-mailbox:  abuse@sqiva.com
admin-c:        AW772-AP
tech-c:         AW772-AP
auth:           # Filtered
mnt-by:         MAINT-ID-SQIVA
last-modified:  2016-12-23T07:47:03Z
source:         IDNIC

person:         Alexander Warman
address:        Jl. Gatot Subroto Kav 50-52
address:        Jakarta 10260, Indonesia
country:        ID
phone:          +62-21-30051300
e-mail:         w-alex@sqiva.com
nic-hdl:        AW772-AP
mnt-by:         MNT-APJII-ID
last-modified:  2016-12-23T07:31:28Z
source:         IDNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.82.7.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59363
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.82.7.216.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032300 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 20:38:08 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
Host 216.7.82.103.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 216.7.82.103.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
181.30.28.120 attackbotsspam
Apr 19 23:56:49 mail sshd\[65143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.28.120  user=root
...
2020-04-20 15:00:54
49.235.234.94 attack
Apr 20 09:05:04 server sshd[12592]: Failed password for invalid user ap from 49.235.234.94 port 44638 ssh2
Apr 20 09:09:16 server sshd[13805]: Failed password for invalid user ubuntu from 49.235.234.94 port 34780 ssh2
Apr 20 09:13:38 server sshd[15036]: Failed password for invalid user el from 49.235.234.94 port 53162 ssh2
2020-04-20 15:19:21
163.172.230.4 attackbots
[2020-04-20 02:34:00] NOTICE[1170][C-00002b21] chan_sip.c: Call from '' (163.172.230.4:58427) to extension '44011972592277524' rejected because extension not found in context 'public'.
[2020-04-20 02:34:00] SECURITY[1184] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-20T02:34:00.268-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="44011972592277524",SessionID="0x7f6c0825cda8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.230.4/58427",ACLName="no_extension_match"
[2020-04-20 02:34:18] NOTICE[1170][C-00002b24] chan_sip.c: Call from '' (163.172.230.4:58757) to extension '66011972592277524' rejected because extension not found in context 'public'.
[2020-04-20 02:34:18] SECURITY[1184] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-20T02:34:18.906-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="66011972592277524",SessionID="0x7f6c0824ccd8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="I
...
2020-04-20 14:51:07
104.236.142.89 attackbotsspam
*Port Scan* detected from 104.236.142.89 (US/United States/California/San Francisco/-). 4 hits in the last 35 seconds
2020-04-20 15:00:08
51.254.16.233 attack
GB - - [19 Apr 2020:20:12:37 +0300] "POST  wp-login.php?action=register HTTP 1.1" 302 - "-" "Mozilla 5.0 Windows NT 6.1; Win64; x64; rv:66.0 Gecko 20100101 Firefox 66.0"
2020-04-20 15:17:32
5.135.94.191 attack
Invalid user admin from 5.135.94.191 port 47192
2020-04-20 14:49:15
200.73.128.100 attackspam
Invalid user jp from 200.73.128.100 port 51782
2020-04-20 15:22:27
222.187.81.130 attack
Port probing on unauthorized port 5555
2020-04-20 15:05:32
129.211.59.87 attackbotsspam
2020-04-19T23:53:30.679425linuxbox-skyline sshd[266094]: Invalid user wi from 129.211.59.87 port 59712
...
2020-04-20 15:15:15
51.75.203.178 attack
18641/tcp
[2020-04-20]1pkt
2020-04-20 15:19:39
128.199.155.218 attack
2020-04-20T04:46:22.600402shield sshd\[19915\]: Invalid user admin from 128.199.155.218 port 47834
2020-04-20T04:46:22.604073shield sshd\[19915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.155.218
2020-04-20T04:46:25.041114shield sshd\[19915\]: Failed password for invalid user admin from 128.199.155.218 port 47834 ssh2
2020-04-20T04:50:57.808129shield sshd\[21111\]: Invalid user tu from 128.199.155.218 port 52679
2020-04-20T04:50:57.812256shield sshd\[21111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.155.218
2020-04-20 14:53:31
179.52.22.104 attack
(smtpauth) Failed SMTP AUTH login from 179.52.22.104 (DO/Dominican Republic/104.22.52.179.d.dyn.claro.net.do): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-04-20 08:26:27 login authenticator failed for (ADMIN) [179.52.22.104]: 535 Incorrect authentication data (set_id=heidari@safanicu.com)
2020-04-20 15:20:50
106.12.6.136 attackspam
$f2bV_matches
2020-04-20 14:57:53
106.12.27.11 attackspambots
$f2bV_matches
2020-04-20 14:45:15
164.132.197.108 attackspambots
Apr 20 07:49:31 server sshd[25864]: Failed password for invalid user hi from 164.132.197.108 port 42724 ssh2
Apr 20 07:53:12 server sshd[26547]: Failed password for root from 164.132.197.108 port 40596 ssh2
Apr 20 07:55:47 server sshd[27022]: Failed password for invalid user test123 from 164.132.197.108 port 46040 ssh2
2020-04-20 14:40:32

最近上报的IP列表

107.148.156.33 103.209.153.82 10.162.99.170 10.135.4.85
10.140.38.131 10.110.199.138 10.12.35.130 10.116.159.20
10.130.72.191 0.0.1.126 249.25.243.152 249.25.243.103
195.250.122.70 2606:4700:10::6816:4641 2606:4700:10::6814:7340 2606:4700:10::6816:193
2606:4700:10::ac43:2181 2606:4700:10::6814:7907 2606:4700:10::6814:4360 2606:4700:10::6814:6314