必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       161.248.0.0 - 161.248.255.255
CIDR:           161.248.0.0/16
NetName:        APNIC-ERX-161-248-0-0
NetHandle:      NET-161-248-0-0-1
Parent:         NET161 (NET-161-0-0-0-0)
NetType:        Early Registrations, Transferred to APNIC
OriginAS:       
Organization:   Asia Pacific Network Information Centre (APNIC)
RegDate:        2004-02-18
Updated:        2009-10-08
Comment:        This IP address range is not registered in the ARIN database.
Comment:        This range was transferred to the APNIC Whois Database as
Comment:        part of the ERX (Early Registration Transfer) project.
Comment:        For details, refer to the APNIC Whois Database via
Comment:        WHOIS.APNIC.NET or http://wq.apnic.net/apnic-bin/whois.pl
Comment:        
Comment:        ** IMPORTANT NOTE: APNIC is the Regional Internet Registry
Comment:        for the Asia Pacific region.  APNIC does not operate networks
Comment:        using this IP address range and is not able to investigate
Comment:        spam or abuse reports relating to these addresses.  For more
Comment:        help, refer to http://www.apnic.net/apnic-info/whois_search2/abuse-and-spamming
Ref:            https://rdap.arin.net/registry/ip/161.248.0.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois.apnic.net


OrgName:        Asia Pacific Network Information Centre
OrgId:          APNIC
Address:        PO Box 3646
City:           South Brisbane
StateProv:      QLD
PostalCode:     4101
Country:        AU
RegDate:        
Updated:        2012-01-24
Ref:            https://rdap.arin.net/registry/entity/APNIC

ReferralServer:  whois://whois.apnic.net
ResourceLink:  http://wq.apnic.net/whois-search/static/search.html

OrgTechHandle: AWC12-ARIN
OrgTechName:   APNIC Whois Contact
OrgTechPhone:  +61 7 3858 3188 
OrgTechEmail:  search-apnic-not-arin@apnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN

OrgAbuseHandle: AWC12-ARIN
OrgAbuseName:   APNIC Whois Contact
OrgAbusePhone:  +61 7 3858 3188 
OrgAbuseEmail:  search-apnic-not-arin@apnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.apnic.net.

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '161.248.116.0 - 161.248.117.255'

% Abuse contact for '161.248.116.0 - 161.248.117.255' is 'abuse@quinsis.co.id'

inetnum:        161.248.116.0 - 161.248.117.255
netname:        PQLM-ID
descr:          PT Quinsis Lintas Mitra
country:        ID
org:            ORG-PQLM1-AP
admin-c:        PQLM1-AP
tech-c:         PQLM1-AP
abuse-c:        AP1456-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-PQLM-ID
mnt-routes:     MAINT-PQLM-ID
mnt-irt:        IRT-PQLM-ID
last-modified:  2025-01-07T04:44:55Z
source:         APNIC

irt:            IRT-PQLM-ID
address:        Ruko Ubud Village Blok Kuta A22, Jl. HOS Cokroaminoto, Sudimara Timur, Kec. Ciledug, Tangerang Banten 15151
e-mail:         abuse@quinsis.co.id
abuse-mailbox:  abuse@quinsis.co.id
admin-c:        PQLM1-AP
tech-c:         PQLM1-AP
auth:           # Filtered
remarks:        abuse@quinsis.co.id was validated on 2026-03-12
mnt-by:         MAINT-PQLM-ID
last-modified:  2026-03-12T04:24:26Z
source:         APNIC

organisation:   ORG-PQLM1-AP
org-name:       PT QUINSIS LINTAS MITRA
org-type:       LIR
country:        ID
address:        Ruko Ubud Village Blok Kuta A22
address:        Jl. HOS Cokroaminoto, Sudimara Timur, Kec. Ciledug
phone:          +6221-27566118
e-mail:         info@quinsis.co.id
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2024-12-30T13:11:04Z
source:         APNIC

role:           ABUSE PQLMID
country:        ZZ
address:        Ruko Ubud Village Blok Kuta A22, Jl. HOS Cokroaminoto, Sudimara Timur, Kec. Ciledug, Tangerang Banten 15151
phone:          +000000000
e-mail:         abuse@quinsis.co.id
admin-c:        PQLM1-AP
tech-c:         PQLM1-AP
nic-hdl:        AP1456-AP
remarks:        Generated from irt object IRT-PQLM-ID
remarks:        abuse@quinsis.co.id was validated on 2026-03-12
abuse-mailbox:  abuse@quinsis.co.id
mnt-by:         APNIC-ABUSE
last-modified:  2026-03-12T04:24:37Z
source:         APNIC

role:           PT QUINSIS LINTAS MITRA administrator
address:        Ruko Ubud Village Blok Kuta A22, Jl. HOS Cokroaminoto, Sudimara Timur, Kec. Ciledug, Tangerang Banten 15151
country:        ID
phone:          +6221-27566118
e-mail:         abuse@quinsis.co.id
admin-c:        PQLM1-AP
tech-c:         PQLM1-AP
nic-hdl:        PQLM1-AP
mnt-by:         MAINT-PQLM-ID
last-modified:  2025-01-06T07:30:42Z
source:         APNIC

% Information related to '161.248.116.0/24AS138106'

route:          161.248.116.0/24
descr:          PT Lintas Telematika Nusantara
origin:         AS138106
mnt-by:         MAINT-PQLM-ID
last-modified:  2025-02-14T13:05:58Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.248.116.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59238
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;161.248.116.1.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026050200 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 02 14:52:33 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 1.116.248.161.in-addr.arpa. not found: 3(NXDOMAIN)
'
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 1.116.248.161.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.175.93.105 attackspambots
185.175.93.105 was recorded 145 times by 35 hosts attempting to connect to the following ports: 6889,4489,4389,9189,2889,3689,6589,4589,2489,2089,10089,8289,6989,6789,3089,9489,3789,1089,9089,2989,6489,3889,5989,9689,2689,6189,8089,8589,9589,9989,5489,4689,5689,5889,8389,8489,6689,7189,8189,8989,4289,5589,1389,3289,6389,2589,4189,2389,3589,4789,3489,1189,5389,1789,6289,2189,9889,5789,4889,7489,9389,7589,1289,1689,1589,2789,4089,5189,1989,5289,7689. Incident counter (4h, 24h, all-time): 145, 306, 8088
2019-11-20 00:56:28
182.123.240.187 attackspambots
Fail2Ban Ban Triggered
2019-11-20 01:07:36
60.190.125.54 attackbots
Unauthorized connection attempt from IP address 60.190.125.54 on Port 445(SMB)
2019-11-20 00:51:57
118.24.173.104 attackspambots
Nov 19 14:00:44 [snip] sshd[30103]: Invalid user guest from 118.24.173.104 port 38571
Nov 19 14:00:44 [snip] sshd[30103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.173.104
Nov 19 14:00:46 [snip] sshd[30103]: Failed password for invalid user guest from 118.24.173.104 port 38571 ssh2[...]
2019-11-20 01:11:21
129.208.243.142 attackspam
Brute force attempt
2019-11-20 01:14:43
49.69.173.133 attackspam
Automatic report - Port Scan Attack
2019-11-20 01:32:06
106.13.103.132 attackbotsspam
Nov 19 16:12:55 venus sshd\[13820\]: Invalid user erman from 106.13.103.132 port 42044
Nov 19 16:12:55 venus sshd\[13820\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.103.132
Nov 19 16:12:57 venus sshd\[13820\]: Failed password for invalid user erman from 106.13.103.132 port 42044 ssh2
...
2019-11-20 01:05:47
92.119.160.143 attack
41633/tcp 41130/tcp 58539/tcp...
[2019-09-18/11-19]3943pkt,1178pt.(tcp)
2019-11-20 01:21:32
111.68.104.156 attackspambots
Nov 19 01:45:04 hgb10502 sshd[1599]: User www-data from 111.68.104.156 not allowed because not listed in AllowUsers
Nov 19 01:45:04 hgb10502 sshd[1599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.68.104.156  user=www-data
Nov 19 01:45:06 hgb10502 sshd[1599]: Failed password for invalid user www-data from 111.68.104.156 port 3739 ssh2
Nov 19 01:45:06 hgb10502 sshd[1599]: Received disconnect from 111.68.104.156 port 3739:11: Bye Bye [preauth]
Nov 19 01:45:06 hgb10502 sshd[1599]: Disconnected from 111.68.104.156 port 3739 [preauth]
Nov 19 01:55:40 hgb10502 sshd[2469]: Invalid user server from 111.68.104.156 port 30304
Nov 19 01:55:42 hgb10502 sshd[2469]: Failed password for invalid user server from 111.68.104.156 port 30304 ssh2
Nov 19 01:55:42 hgb10502 sshd[2469]: Received disconnect from 111.68.104.156 port 30304:11: Bye Bye [preauth]
Nov 19 01:55:42 hgb10502 sshd[2469]: Disconnected from 111.68.104.156 port 30304 [preauth........
-------------------------------
2019-11-20 01:00:12
202.189.3.253 attack
Unauthorized connection attempt from IP address 202.189.3.253 on Port 445(SMB)
2019-11-20 01:28:11
185.87.12.106 attackbotsspam
joshuajohannes.de 185.87.12.106 \[19/Nov/2019:17:47:38 +0100\] "POST /wp-login.php HTTP/1.1" 200 6301 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
joshuajohannes.de 185.87.12.106 \[19/Nov/2019:17:47:38 +0100\] "POST /wp-login.php HTTP/1.1" 200 6269 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
joshuajohannes.de 185.87.12.106 \[19/Nov/2019:17:47:38 +0100\] "POST /xmlrpc.php HTTP/1.1" 200 4098 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-20 01:20:15
116.193.222.123 attackspam
Unauthorized connection attempt from IP address 116.193.222.123 on Port 445(SMB)
2019-11-20 01:10:44
51.77.200.243 attack
Nov 19 13:43:44 Ubuntu-1404-trusty-64-minimal sshd\[20191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.200.243  user=root
Nov 19 13:43:46 Ubuntu-1404-trusty-64-minimal sshd\[20191\]: Failed password for root from 51.77.200.243 port 36570 ssh2
Nov 19 14:00:38 Ubuntu-1404-trusty-64-minimal sshd\[20804\]: Invalid user kalerasi from 51.77.200.243
Nov 19 14:00:38 Ubuntu-1404-trusty-64-minimal sshd\[20804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.200.243
Nov 19 14:00:41 Ubuntu-1404-trusty-64-minimal sshd\[20804\]: Failed password for invalid user kalerasi from 51.77.200.243 port 45316 ssh2
2019-11-20 01:18:02
189.91.238.221 attackspam
19/11/19@08:00:58: FAIL: IoT-Telnet address from=189.91.238.221
...
2019-11-20 01:03:35
46.221.3.98 attackbotsspam
Unauthorized connection attempt from IP address 46.221.3.98 on Port 445(SMB)
2019-11-20 01:01:49

最近上报的IP列表

158.28.54.174 43.248.109.147 110.78.153.115 2606:4700:10::6814:6880
2606:4700:10::6816:735 203.25.78.4 40.124.175.52 10.16.222.185
163.227.180.182 252.46.183.189 168.93.214.89 134.35.157.182
147.185.133.18 190.194.63.241 34.38.101.111 192.71.126.245
2606:4700:10::6814:5594 2606:4700:10::6816:4423 2606:4700:10::6814:6623 104.202.107.244