必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Auckland

省份(region): Auckland

国家(country): New Zealand

运营商(isp): Vodafone

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '203.109.224.0 - 203.109.255.255'

% Abuse contact for '203.109.224.0 - 203.109.255.255' is 'abuse@one.nz'

inetnum:        203.109.224.0 - 203.109.255.255
netname:        VFNZ-DSL-3
descr:          Vodafone NZ - Customers
country:        NZ
admin-c:        VFNZ-NOC
tech-c:         VFNZ-NOC
abuse-c:        AO464-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-ONENZ-NZ
mnt-irt:        IRT-ONENZ-NZ
last-modified:  2023-03-30T00:05:00Z
source:         APNIC

irt:            IRT-ONENZ-NZ
address:        Level 6, Tower B, 30 Daldy Street
address:        Auckalnd Central
address:        Auckland 1010 New Zealand
e-mail:         PlanningandDesign.Networks@one.nz
abuse-mailbox:  abuse@one.nz
admin-c:        ONZG1-AP
tech-c:         ONZG1-AP
auth:           # Filtered
remarks:        abuse@one.nz was validated on 2026-02-25
remarks:        planninganddesign.networks@one.nz was validated on 2026-02-25
mnt-by:         MAINT-ONENZ-NZ
last-modified:  2026-02-25T20:24:11Z
source:         APNIC

role:           ABUSE ONENZNZ
country:        ZZ
address:        Level 6, Tower B, 30 Daldy Street
address:        Auckalnd Central
address:        Auckland 1010 New Zealand
phone:          +000000000
e-mail:         PlanningandDesign.Networks@one.nz
admin-c:        ONZG1-AP
tech-c:         ONZG1-AP
nic-hdl:        AO464-AP
remarks:        Generated from irt object IRT-ONENZ-NZ
remarks:        abuse@one.nz was validated on 2026-02-25
remarks:        planninganddesign.networks@one.nz was validated on 2026-02-25
abuse-mailbox:  abuse@one.nz
mnt-by:         APNIC-ABUSE
last-modified:  2026-02-25T20:24:28Z
source:         APNIC

role:           Vodafone NZ Network Operations
nic-hdl:        VFNZ-NOC
e-mail:         noc.nz@vodafone.com
address:        20 Viaduct Harbour Avenue
address:        Private Bag 92161
address:        Auckland
country:        NZ
phone:          +64-9-3552000
fax-no:         +64-9-3552001
admin-c:        VFNZ-NOC
tech-c:         VFNZ-NOC
mnt-by:         MAINT-VFNZ
last-modified:  2017-08-01T02:32:01Z
source:         APNIC
remarks:        replaces NO26-AP

% Information related to '203.109.128.0/17AS9500'

route:          203.109.128.0/17
descr:          One NZ Private Bag 92161 Victoria Street West Auckland 1142 New Zealand
origin:         AS9500
mnt-by:         MAINT-ONENZ-NZ
last-modified:  2024-07-01T22:29:27Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 203.109.250.95
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26857
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;203.109.250.95.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032300 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 19:00:30 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
b'95.250.109.203.in-addr.arpa domain name pointer 203-109-250-95.ihug.net.
'
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
95.250.109.203.in-addr.arpa	name = 203-109-250-95.ihug.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
83.220.175.93 attackspambots
Jan 26 09:49:17 thevastnessof sshd[17704]: Failed password for root from 83.220.175.93 port 45492 ssh2
...
2020-01-26 17:51:10
45.67.14.179 attackbots
[portscan] tcp/22 [SSH]
*(RWIN=65535)(01261133)
2020-01-26 17:49:56
142.93.64.126 attackbots
Jan 24 16:24:00 roadrisk sshd[11036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.64.126  user=r.r
Jan 24 16:24:02 roadrisk sshd[11036]: Failed password for r.r from 142.93.64.126 port 55002 ssh2
Jan 24 16:24:02 roadrisk sshd[11036]: Received disconnect from 142.93.64.126: 11: Bye Bye [preauth]
Jan 24 16:34:30 roadrisk sshd[11443]: Failed password for invalid user ihor from 142.93.64.126 port 53330 ssh2
Jan 24 16:34:30 roadrisk sshd[11443]: Received disconnect from 142.93.64.126: 11: Bye Bye [preauth]
Jan 24 16:36:38 roadrisk sshd[11563]: Failed password for invalid user m from 142.93.64.126 port 49170 ssh2
Jan 24 16:36:38 roadrisk sshd[11563]: Received disconnect from 142.93.64.126: 11: Bye Bye [preauth]
Jan 24 16:38:45 roadrisk sshd[11610]: Failed password for invalid user chase from 142.93.64.126 port 45010 ssh2
Jan 24 16:38:45 roadrisk sshd[11610]: Received disconnect from 142.93.64.126: 11: Bye Bye [preauth]


........
-----------------------------------
2020-01-26 18:22:25
222.186.42.136 attackspambots
Unauthorized connection attempt detected from IP address 222.186.42.136 to port 22 [T]
2020-01-26 17:44:07
117.44.164.66 attack
Unauthorized connection attempt from IP address 117.44.164.66 on Port 445(SMB)
2020-01-26 18:05:55
46.38.144.179 attackbots
Jan 26 11:07:20 relay postfix/smtpd\[4603\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 26 11:07:45 relay postfix/smtpd\[1225\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 26 11:07:57 relay postfix/smtpd\[4604\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 26 11:08:22 relay postfix/smtpd\[32479\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 26 11:08:31 relay postfix/smtpd\[4603\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-01-26 18:17:57
104.227.139.186 attack
Jan 26 08:12:44 meumeu sshd[1450]: Failed password for git from 104.227.139.186 port 56106 ssh2
Jan 26 08:15:41 meumeu sshd[1879]: Failed password for root from 104.227.139.186 port 54870 ssh2
...
2020-01-26 17:53:26
94.123.180.173 attackspambots
Unauthorized connection attempt from IP address 94.123.180.173 on Port 445(SMB)
2020-01-26 18:23:33
104.168.104.41 attack
Unauthorized connection attempt detected from IP address 104.168.104.41 to port 2220 [J]
2020-01-26 18:08:41
110.45.155.101 attack
Unauthorized connection attempt detected from IP address 110.45.155.101 to port 2220 [J]
2020-01-26 17:56:31
1.164.107.116 attackbotsspam
Unauthorized connection attempt from IP address 1.164.107.116 on Port 445(SMB)
2020-01-26 18:02:55
84.197.224.169 attack
Unauthorized connection attempt detected from IP address 84.197.224.169 to port 22 [J]
2020-01-26 18:24:52
120.50.19.106 attack
Unauthorized connection attempt from IP address 120.50.19.106 on Port 445(SMB)
2020-01-26 18:07:20
118.24.122.36 attackspambots
Unauthorized connection attempt detected from IP address 118.24.122.36 to port 2220 [J]
2020-01-26 17:57:52
180.183.246.96 attackbotsspam
Try access to SMTP/POP/IMAP server.
2020-01-26 18:00:07

最近上报的IP列表

83.243.173.228 75.103.16.62 67.223.14.233 69.247.9.99
2606:4700:10::6816:2121 2606:4700:10::6814:8137 2606:4700:10::ac43:861 2606:4700:10::6814:4550
2606:4700:10::ac43:2105 2606:4700:10::6816:4952 2606:4700:10::6814:9508 2606:4700:10::ac43:1755
2606:4700:10::6814:5732 2606:4700:10::6814:9666 2606:4700:10::6816:4128 64.227.120.77
82.254.172.3 37.125.250.250 31.172.173.209 243.223.175.91