必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Shah Alam

省份(region): Selangor

国家(country): Malaysia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '203.106.128.0 - 203.106.128.255'

% Abuse contact for '203.106.128.0 - 203.106.128.255' is 'abuse@tm.com.my'

inetnum:        203.106.128.0 - 203.106.128.255
netname:        INFRA-TMNET
descr:          TMNET
country:        MY
admin-c:        TA35-AP
tech-c:         TA35-AP
abuse-c:        AM2355-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-MY-WEBE
mnt-irt:        IRT-MY-WEBE
last-modified:  2023-06-30T00:02:10Z
source:         APNIC

irt:            IRT-MY-WEBE
address:        Menara TM, Jalan Pantai Baharu,
address:        59100 Kuala Lumpur, Wilayah Persekutuan Kuala Lumpur
address:        Malaysia
phone:          +601110001000
e-mail:         abuse@tm.com.my
abuse-mailbox:  abuse@tm.com.my
admin-c:        ICO1-AP
tech-c:         ICO1-AP
auth:           # Filtered
remarks:        TM AS4788 had recently installed RPKI validator and will be dropping the ????????????Invalid???????????? route by November 2023. Please update your ROA accordingly.
remarks:        abuse@tm.com.my was validated on 2025-12-17
mnt-by:         MAINT-MY-WEBE
last-modified:  2026-01-08T02:19:24Z
source:         APNIC

role:           ABUSE MYWEBE
country:        ZZ
address:        Menara TM, Jalan Pantai Baharu,
address:        59100 Kuala Lumpur, Wilayah Persekutuan Kuala Lumpur
address:        Malaysia
phone:          +601110001000
e-mail:         abuse@tm.com.my
admin-c:        ICO1-AP
tech-c:         ICO1-AP
nic-hdl:        AM2355-AP
remarks:        Generated from irt object IRT-MY-WEBE
remarks:        abuse@tm.com.my was validated on 2025-12-17
abuse-mailbox:  abuse@tm.com.my
mnt-by:         APNIC-ABUSE
last-modified:  2025-12-17T13:15:33Z
source:         APNIC

role:           TMNET IP Administrators
address:        Telekom Malaysia
address:        Jalan Pantai Baru, Kuala Lumpur.
country:        MY
phone:          +6-1800-88-2646
phone:          +603-22466646
fax-no:         +603-22402126
remarks:        dnsadm@tm.com.my [for DNS related]
remarks:        abuse@tm.com.my [for abuse case related]
remarks:        iptac@tm.com.my [for routing related]
e-mail:         abuse@tm.com.my
admin-c:        AS115-AP
tech-c:         SM135-AP
nic-hdl:        TA35-AP
mnt-by:         TM-NET-AP
last-modified:  2019-03-26T14:05:26Z
source:         APNIC

% Information related to '203.106.128.0/18AS4788'

route:          203.106.128.0/18
descr:          TMnet route object
origin:         AS4788
mnt-by:         MAINT-MY-WEBE
last-modified:  2023-07-01T06:29:36Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 203.106.128.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28969
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;203.106.128.2.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040400 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 04 18:23:32 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
b'2.128.106.203.in-addr.arpa domain name pointer jhb-hnet01-brf-oc48-so4-0-0.tm.net.my.
'
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
2.128.106.203.in-addr.arpa	name = jhb-hnet01-brf-oc48-so4-0-0.tm.net.my.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
121.204.138.187 attackspam
2019-10-26T03:54:22.666667abusebot.cloudsearch.cf sshd\[19050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.204.138.187  user=root
2019-10-26 12:22:25
40.77.188.39 attackspambots
Calling not existent HTTP content (400 or 404).
2019-10-26 12:21:45
52.60.189.115 attackbotsspam
WordPress wp-login brute force :: 52.60.189.115 0.124 BYPASS [26/Oct/2019:14:53:47  1100] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3777 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36"
2019-10-26 12:43:45
152.32.130.99 attackspambots
Oct 26 06:45:50 dedicated sshd[28582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.130.99  user=root
Oct 26 06:45:53 dedicated sshd[28582]: Failed password for root from 152.32.130.99 port 56146 ssh2
2019-10-26 12:45:58
190.210.42.82 attack
enlinea.de 190.210.42.82 \[26/Oct/2019:05:53:25 +0200\] "POST /wp-login.php HTTP/1.1" 200 5636 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
enlinea.de 190.210.42.82 \[26/Oct/2019:05:53:26 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4142 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-10-26 12:53:53
175.158.50.195 attack
Oct 25 18:11:55 web9 sshd\[21937\]: Invalid user 123456 from 175.158.50.195
Oct 25 18:11:55 web9 sshd\[21937\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.158.50.195
Oct 25 18:11:57 web9 sshd\[21937\]: Failed password for invalid user 123456 from 175.158.50.195 port 43855 ssh2
Oct 25 18:16:44 web9 sshd\[22663\]: Invalid user Danger2017 from 175.158.50.195
Oct 25 18:16:44 web9 sshd\[22663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.158.50.195
2019-10-26 12:26:18
185.176.27.6 attack
Oct 26 03:52:39   TCP Attack: SRC=185.176.27.6 DST=[Masked] LEN=40 TOS=0x08 PREC=0x20 TTL=243  PROTO=TCP SPT=48042 DPT=6832 WINDOW=1024 RES=0x00 SYN URGP=0
2019-10-26 12:40:20
134.175.48.207 attack
Oct 25 18:08:43 wbs sshd\[10573\]: Invalid user df457 from 134.175.48.207
Oct 25 18:08:43 wbs sshd\[10573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.48.207
Oct 25 18:08:44 wbs sshd\[10573\]: Failed password for invalid user df457 from 134.175.48.207 port 51504 ssh2
Oct 25 18:13:51 wbs sshd\[11105\]: Invalid user usrobotics from 134.175.48.207
Oct 25 18:13:51 wbs sshd\[11105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.48.207
2019-10-26 12:32:23
31.14.128.73 attackspambots
Wordpress bruteforce
2019-10-26 12:36:38
189.7.25.34 attackbots
Automatic report - Banned IP Access
2019-10-26 12:20:17
159.65.164.210 attackbotsspam
Oct 26 05:54:19 [host] sshd[29130]: Invalid user helpdesk from 159.65.164.210
Oct 26 05:54:19 [host] sshd[29130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.164.210
Oct 26 05:54:22 [host] sshd[29130]: Failed password for invalid user helpdesk from 159.65.164.210 port 40510 ssh2
2019-10-26 12:22:07
165.22.112.45 attackbots
Oct 26 05:54:06 cvbnet sshd[23351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.112.45 
Oct 26 05:54:08 cvbnet sshd[23351]: Failed password for invalid user victor from 165.22.112.45 port 56150 ssh2
...
2019-10-26 12:28:57
118.25.125.189 attackbots
Oct 26 06:32:43 vps691689 sshd[3015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.125.189
Oct 26 06:32:45 vps691689 sshd[3015]: Failed password for invalid user 123 from 118.25.125.189 port 34438 ssh2
...
2019-10-26 12:45:16
54.39.97.17 attack
Oct 25 18:19:16 kapalua sshd\[19168\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=17.ip-54-39-97.net  user=root
Oct 25 18:19:18 kapalua sshd\[19168\]: Failed password for root from 54.39.97.17 port 36200 ssh2
Oct 25 18:22:55 kapalua sshd\[19498\]: Invalid user ubuntu from 54.39.97.17
Oct 25 18:22:55 kapalua sshd\[19498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=17.ip-54-39-97.net
Oct 25 18:22:57 kapalua sshd\[19498\]: Failed password for invalid user ubuntu from 54.39.97.17 port 45410 ssh2
2019-10-26 12:27:17
113.80.86.2 attackspambots
Oct 26 04:13:32 localhost sshd\[68404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.80.86.2  user=root
Oct 26 04:13:34 localhost sshd\[68404\]: Failed password for root from 113.80.86.2 port 36308 ssh2
Oct 26 04:18:28 localhost sshd\[68527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.80.86.2  user=root
Oct 26 04:18:31 localhost sshd\[68527\]: Failed password for root from 113.80.86.2 port 53986 ssh2
Oct 26 04:23:29 localhost sshd\[68627\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.80.86.2  user=root
...
2019-10-26 12:26:39

最近上报的IP列表

148.88.122.190 147.30.207.214 195.7.81.110 2606:4700:10::6816:3090
2606:4700:10::6814:8924 2606:4700:10::6816:2843 2606:4700:10::ac43:1633 93.65.245.223
8.90.153.16 98.226.212.10 37.9.90.191 88.101.166.241
110.77.187.27 2606:4700:10::6816:4840 2606:4700:10::6814:6839 2606:4700:10::6816:3991
2606:4700:10::6816:2360 2606:4700:10::6814:7088 2606:4700:10::6816:4102 2606:4700:10::6816:692