必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Brisbane

省份(region): Queensland

国家(country): Australia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '203.40.0.0 - 203.47.255.255'

% Abuse contact for '203.40.0.0 - 203.47.255.255' is 'abuse@telstra.net'

inetnum:        203.40.0.0 - 203.47.255.255
netname:        TELSTRAINTERNET2-AU
descr:          Telstra Limited
country:        AU
org:            ORG-TC6-AP
admin-c:        TIAR-AP
tech-c:         TAN2-AP
abuse-c:        AT1005-AP
status:         ALLOCATED PORTABLE
remarks:        -----
remarks:        All reports regarding SPAM or security breaches
remarks:        should be addressed to abuse@telstra.net
remarks:        ------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-AU-TIAR-AP
mnt-routes:     MAINT-AU-TIAR-AP
mnt-irt:        IRT-TELSTRA-AU
last-modified:  2024-05-10T00:50:23Z
geofeed:        https://geofeed.tools.telstra.net/geofeed.csv
source:         APNIC

irt:            IRT-TELSTRA-AU
address:        Telstra Internet
e-mail:         abuse@telstra.net
abuse-mailbox:  abuse@telstra.net
admin-c:        TIAR-AP
tech-c:         TIAR-AP
auth:           # Filtered
remarks:        abuse@telstra.net was validated on 2026-01-26
mnt-by:         MAINT-AU-TIAR-AP
last-modified:  2026-01-26T01:19:20Z
source:         APNIC

organisation:   ORG-TC6-AP
org-name:       Telstra Limited
org-type:       LIR
country:        AU
address:        242 Exhibition Street
e-mail:         corporateaddressing@team.telstra.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2024-12-06T08:30:50Z
source:         APNIC

role:           ABUSE TELSTRAAU
country:        ZZ
address:        Telstra Internet
phone:          +000000000
e-mail:         abuse@telstra.net
admin-c:        TIAR-AP
tech-c:         TIAR-AP
nic-hdl:        AT1005-AP
remarks:        Generated from irt object IRT-TELSTRA-AU
remarks:        abuse@telstra.net was validated on 2026-01-26
abuse-mailbox:  abuse@telstra.net
mnt-by:         APNIC-ABUSE
last-modified:  2026-01-26T01:19:29Z
source:         APNIC

role:           Telstra AU NOC
address:        Telstra Internet
address:        242 Exhibition Street
address:        Melbourne
address:        VIC 3000
country:        AU
phone:          +61 3 8650 3305
e-mail:         ipnoc-au@team.telstra.com
admin-c:        TIAR-AP
tech-c:         TIAR-AP
nic-hdl:        TAN2-AP
mnt-by:         MAINT-AU-TIAR-AP
last-modified:  2025-11-26T05:11:17Z
source:         APNIC

person:         Telstra Internet Address Registry
address:        Telstra Internet
address:        242 Exhibition St
address:        Melbourne
address:        VIC 3000
country:        AU
phone:          +61 000000000
e-mail:         addressing@telstra.net
nic-hdl:        TIAR-AP
remarks:        Telstra Internet Address Registry Role Object
mnt-by:         MAINT-AU-TIAR-AP
last-modified:  2021-12-09T22:28:56Z
source:         APNIC

% Information related to '203.40.0.0/13AS1221'

route:          203.40.0.0/13
origin:         AS1221
descr:          Telstra Corporation
                242 Exhibition Street
mnt-by:         MAINT-AU-TIAR-AP
last-modified:  2019-12-11T21:09:26Z
source:         APNIC

% Information related to '203.40.0.0/13AS19905'

route:          203.40.0.0/13
origin:         AS19905
descr:          Telstra Corporation Limited
                242 Exhibition Street
mnt-by:         MAINT-AU-TIAR-AP
last-modified:  2022-09-12T02:33:17Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 203.41.43.183
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57476
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;203.41.43.183.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031800 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 18 20:57:18 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 183.43.41.203.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 183.43.41.203.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
37.187.79.55 attackspambots
Aug 23 01:39:48 web9 sshd\[28829\]: Invalid user haldaemon from 37.187.79.55
Aug 23 01:39:48 web9 sshd\[28829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.79.55
Aug 23 01:39:51 web9 sshd\[28829\]: Failed password for invalid user haldaemon from 37.187.79.55 port 43528 ssh2
Aug 23 01:43:30 web9 sshd\[29659\]: Invalid user looque from 37.187.79.55
Aug 23 01:43:30 web9 sshd\[29659\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.79.55
2019-08-23 19:54:45
157.230.163.6 attack
Invalid user sniff from 157.230.163.6 port 51022
2019-08-23 20:09:33
125.109.141.104 attackbots
Invalid user admin from 125.109.141.104 port 36519
2019-08-23 19:44:54
178.62.28.79 attackbots
Invalid user nhc from 178.62.28.79 port 52024
2019-08-23 20:04:20
101.68.70.14 attackbotsspam
Invalid user kg from 101.68.70.14 port 43375
2019-08-23 20:17:25
178.32.219.209 attackspambots
Invalid user uno from 178.32.219.209 port 46912
2019-08-23 20:04:54
120.132.31.165 attackspam
Invalid user anita from 120.132.31.165 port 56194
2019-08-23 19:45:59
178.128.158.146 attackspam
Invalid user didi from 178.128.158.146 port 60838
2019-08-23 20:02:37
81.242.224.188 attackspambots
Aug 23 12:01:22 fr01 sshd[3979]: Invalid user shubham from 81.242.224.188
Aug 23 12:01:22 fr01 sshd[3979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.242.224.188
Aug 23 12:01:22 fr01 sshd[3979]: Invalid user shubham from 81.242.224.188
Aug 23 12:01:24 fr01 sshd[3979]: Failed password for invalid user shubham from 81.242.224.188 port 55367 ssh2
Aug 23 12:58:05 fr01 sshd[13490]: Invalid user test from 81.242.224.188
...
2019-08-23 19:21:31
182.135.64.12 attackbots
Invalid user one from 182.135.64.12 port 26358
2019-08-23 19:36:30
204.111.241.83 attack
Invalid user pi from 204.111.241.83 port 56272
2019-08-23 19:59:34
121.67.44.191 attack
Aug 23 11:44:16 localhost sshd\[15110\]: Invalid user jackieg from 121.67.44.191 port 34964
Aug 23 11:44:16 localhost sshd\[15110\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.67.44.191
Aug 23 11:44:19 localhost sshd\[15110\]: Failed password for invalid user jackieg from 121.67.44.191 port 34964 ssh2
...
2019-08-23 19:45:34
113.190.235.76 attackbots
Invalid user admin from 113.190.235.76 port 39409
2019-08-23 19:47:11
167.71.62.50 attackspam
Invalid user storm from 167.71.62.50 port 48822
2019-08-23 20:07:58
104.248.55.99 attackbots
Invalid user django from 104.248.55.99 port 42512
2019-08-23 19:19:21

最近上报的IP列表

2606:4700:10::6816:1081 2606:4700:10::6814:5498 2606:4700:10::6814:4610 2606:4700:10::6816:1309
2606:4700:10::ac43:1510 2606:4700:10::ac43:2922 2606:4700:10::6814:6130 2606:4700:10::6814:7516
2606:4700:10::6814:4653 2606:4700:10::6814:9223 223.109.252.178 169.150.203.247
110.78.138.229 121.8.28.71 110.78.158.97 2606:4700:10::ac43:654
2606:4700:10::ac43:973 2606:4700:10::ac43:1415 2606:4700:10::6814:8064 2606:4700:10::6816:91