必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Surabaya

省份(region): Jawa Timur

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
43.252.159.78 attackbotsspam
Automatic report - Port Scan Attack
2019-11-21 01:26:39
43.252.159.78 attackspambots
Unauthorized connection attempt from IP address 43.252.159.78 on Port 445(SMB)
2019-10-30 15:37:11
43.252.159.78 attackspam
Unauthorized connection attempt from IP address 43.252.159.78 on Port 445(SMB)
2019-09-09 22:49:53
43.252.159.80 attackbotsspam
Unauthorized connection attempt from IP address 43.252.159.80 on Port 445(SMB)
2019-08-30 20:56:27
43.252.159.11 attack
Unauthorized connection attempt from IP address 43.252.159.11 on Port 445(SMB)
2019-07-31 12:33:52
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '43.252.159.0 - 43.252.159.255'

% Abuse contact for '43.252.159.0 - 43.252.159.255' is 'abuse@gmedia.net.id'

inetnum:        43.252.159.0 - 43.252.159.255
netname:        GMEDIA-ID-BALI
descr:          PT Media Sarana Data
descr:          Internet Service Provider
descr:          Jl. Daradasih No. 11A
descr:          Patangpuluhan, Yogyakarta
descr:          DIY Yogyakarta, 55251
country:        ID
admin-c:        GH788-AP
tech-c:         GH788-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-ID-GMEDIA
mnt-irt:        IRT-GMEDIA-ID
last-modified:  2021-04-22T09:29:19Z
source:         APNIC

irt:            IRT-GMEDIA-ID
address:        Jl. Daradasih No. 11A
address:        Patangpuluhan, Yogyakarta
address:        DIY Yogyakarta, 55251
e-mail:         hostmaster@gmedia.net.id
abuse-mailbox:  abuse@gmedia.net.id
admin-c:        GH788-AP
tech-c:         GH788-AP
auth:           # Filtered
mnt-by:         MAINT-ID-GMEDIA
last-modified:  2026-03-09T15:38:33Z
source:         APNIC

person:         GMEDIA HOSTMASTER
address:        Jl. Daradasih No. 11A
address:        Patangpuluhan, Yogyakarta
address:        DIY Yogyakarta, 55251
country:        ID
phone:          +62-274-380345
fax-no:         +62-274-379593
e-mail:         hostmaster@gmedia.net.id
nic-hdl:        GH788-AP
notify:         agusr@gmedia.co.id
mnt-by:         MAINT-ID-GMEDIA
last-modified:  2011-02-28T19:00:02Z
source:         APNIC

% Information related to '43.252.159.0/24AS55666'

route:          43.252.159.0/24
descr:          PT Media Sarana Data
descr:          YOGYAKARTA
country:        ID
origin:         AS55666
mnt-by:         MAINT-ID-GMEDIA
last-modified:  2015-11-20T04:30:01Z
source:         APNIC

% Information related to '43.252.159.0 - 43.252.159.255'

inetnum:        43.252.159.0 - 43.252.159.255
netname:        BLIP-ID
descr:          PT Blip Integrator Provider
descr:          Internet Service Provider
descr:          Unit Komersial Blok Broadway 2 No. 11 Istana Kuta Galeria
descr:          Jl. Patih Jelantik Desa Legian
descr:          Kec. Kuta, Kab. Badung, Bali 80361
country:        ID
admin-c:        PBIP1-AP
tech-c:         PBIP1-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-ID-GMEDIA
mnt-irt:        IRT-GMEDIA-ID
remarks:        Send Spam& Abuse report to: abuse@gmedia.net.id
last-modified:  2023-02-22T05:22:16Z
source:         IDNIC

irt:            IRT-GMEDIA-ID
address:        Jl. Daradasih No. 11A
address:        Patangpuluhan, Yogyakarta
address:        DIY Yogyakarta, 55251
e-mail:         hostmaster@gmedia.net.id
abuse-mailbox:  abuse@gmedia.net.id
admin-c:        GH788-AP
tech-c:         GH788-AP
auth:           # Filtered
mnt-by:         MAINT-ID-GMEDIA
last-modified:  2011-02-25T10:06:50Z
source:         IDNIC

person:         PT BLIP INTEGRATOR PROVIDER
address:        Unit Komersial Blok Broadway 2 No. 11 Istana Kuta Galeria
address:        Jl. Patih Jelantik Desa Legian, Kec. Kuta, Kab. Badung, Bali
country:        ID
phone:          +62-361-6205157
e-mail:         info@blip.co.id
nic-hdl:        PBIP1-AP
mnt-by:         MAINT-ID-BLIP
last-modified:  2022-07-13T07:08:38Z
source:         IDNIC

% Information related to '43.252.159.0/24AS55666'

route:          43.252.159.0/24
descr:          PT Media Sarana Data
descr:          YOGYAKARTA
country:        ID
origin:         AS55666
mnt-by:         MAINT-ID-GMEDIA
last-modified:  2015-11-20T04:30:01Z
source:         IDNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 43.252.159.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62555
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;43.252.159.41.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026052400 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 24 16:01:00 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
41.159.252.43.in-addr.arpa domain name pointer ipv4-41-159-252.as55666.net.
NSLOOKUP信息:
b'41.159.252.43.in-addr.arpa	name = ipv4-41-159-252.as55666.net.

Authoritative answers can be found from:

'
相关IP信息:
最新评论:
IP 类型 评论内容 时间
194.26.29.122 attackbots
Feb  3 09:10:18 h2177944 kernel: \[3915546.352376\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=194.26.29.122 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=176 ID=51966 PROTO=TCP SPT=41169 DPT=8889 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb  3 09:10:18 h2177944 kernel: \[3915546.352389\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=194.26.29.122 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=176 ID=51966 PROTO=TCP SPT=41169 DPT=8889 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb  3 09:13:54 h2177944 kernel: \[3915762.135799\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=194.26.29.122 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=176 ID=32412 PROTO=TCP SPT=41169 DPT=33893 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb  3 09:13:54 h2177944 kernel: \[3915762.135813\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=194.26.29.122 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=176 ID=32412 PROTO=TCP SPT=41169 DPT=33893 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb  3 09:14:55 h2177944 kernel: \[3915823.426510\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=194.26.29.122 DST=85.214.117
2020-02-03 16:19:49
198.50.197.223 attack
Feb  3 07:51:01 v22018076622670303 sshd\[30193\]: Invalid user riot from 198.50.197.223 port 48664
Feb  3 07:51:01 v22018076622670303 sshd\[30193\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.50.197.223
Feb  3 07:51:04 v22018076622670303 sshd\[30193\]: Failed password for invalid user riot from 198.50.197.223 port 48664 ssh2
...
2020-02-03 16:37:57
182.61.177.109 attackbotsspam
Feb  3 08:16:48 server sshd\[13103\]: Invalid user desiderio from 182.61.177.109
Feb  3 08:16:48 server sshd\[13103\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.177.109 
Feb  3 08:16:50 server sshd\[13103\]: Failed password for invalid user desiderio from 182.61.177.109 port 42354 ssh2
Feb  3 08:36:07 server sshd\[18454\]: Invalid user teste from 182.61.177.109
Feb  3 08:36:07 server sshd\[18454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.177.109 
...
2020-02-03 16:04:12
134.175.68.129 attackbots
Unauthorized connection attempt detected from IP address 134.175.68.129 to port 2220 [J]
2020-02-03 16:32:32
209.30.149.134 attackspambots
Forbidden directory scan :: 2020/02/03 04:50:57 [error] 1069#1069: *130976 access forbidden by rule, client: 209.30.149.134, server: [censored_1], request: "HEAD /https://www.[censored_1]/ HTTP/1.1", host: "www.[censored_1]"
2020-02-03 16:24:05
45.55.219.124 attackspam
Unauthorized connection attempt detected from IP address 45.55.219.124 to port 2220 [J]
2020-02-03 16:20:21
178.62.64.107 attackbots
<6 unauthorized SSH connections
2020-02-03 16:09:35
1.54.209.231 attack
Email rejected due to spam filtering
2020-02-03 16:43:29
222.184.101.98 attackbots
Lines containing failures of 222.184.101.98
Feb  3 05:34:20 kmh-vmh-002-fsn07 sshd[7556]: Invalid user idaa from 222.184.101.98 port 13898
Feb  3 05:34:20 kmh-vmh-002-fsn07 sshd[7556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.184.101.98 
Feb  3 05:34:22 kmh-vmh-002-fsn07 sshd[7556]: Failed password for invalid user idaa from 222.184.101.98 port 13898 ssh2
Feb  3 05:34:23 kmh-vmh-002-fsn07 sshd[7556]: Received disconnect from 222.184.101.98 port 13898:11: Bye Bye [preauth]
Feb  3 05:34:23 kmh-vmh-002-fsn07 sshd[7556]: Disconnected from invalid user idaa 222.184.101.98 port 13898 [preauth]
Feb  3 05:46:56 kmh-vmh-002-fsn07 sshd[27665]: Invalid user tanhostnameh from 222.184.101.98 port 12458
Feb  3 05:46:56 kmh-vmh-002-fsn07 sshd[27665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.184.101.98 
Feb  3 05:46:58 kmh-vmh-002-fsn07 sshd[27665]: Failed password for invalid user tanh........
------------------------------
2020-02-03 16:41:36
222.186.30.31 attackspam
Feb  2 21:44:32 tdfoods sshd\[7220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.31  user=root
Feb  2 21:44:34 tdfoods sshd\[7220\]: Failed password for root from 222.186.30.31 port 15158 ssh2
Feb  2 21:53:52 tdfoods sshd\[7284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.31  user=root
Feb  2 21:53:54 tdfoods sshd\[7284\]: Failed password for root from 222.186.30.31 port 16221 ssh2
Feb  2 21:53:56 tdfoods sshd\[7284\]: Failed password for root from 222.186.30.31 port 16221 ssh2
2020-02-03 16:01:12
80.82.65.74 attack
02/03/2020-08:20:03.475567 80.82.65.74 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-02-03 16:35:39
68.183.124.53 attack
Feb  3 08:42:33 legacy sshd[21051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.124.53
Feb  3 08:42:35 legacy sshd[21051]: Failed password for invalid user thelma from 68.183.124.53 port 55088 ssh2
Feb  3 08:45:35 legacy sshd[21172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.124.53
...
2020-02-03 16:07:57
171.239.214.26 attack
Feb  3 04:51:27 IngegnereFirenze sshd[26582]: User root from 171.239.214.26 not allowed because not listed in AllowUsers
...
2020-02-03 16:00:30
222.186.175.148 attackbotsspam
Feb  3 09:19:06 MK-Soft-VM6 sshd[23550]: Failed password for root from 222.186.175.148 port 53216 ssh2
Feb  3 09:19:10 MK-Soft-VM6 sshd[23550]: Failed password for root from 222.186.175.148 port 53216 ssh2
...
2020-02-03 16:23:35
183.82.121.34 attackspam
2020-02-03T09:14:43.123757  sshd[15009]: Invalid user iview from 183.82.121.34 port 33284
2020-02-03T09:14:43.139155  sshd[15009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.121.34
2020-02-03T09:14:43.123757  sshd[15009]: Invalid user iview from 183.82.121.34 port 33284
2020-02-03T09:14:45.176026  sshd[15009]: Failed password for invalid user iview from 183.82.121.34 port 33284 ssh2
2020-02-03T09:18:06.645326  sshd[15134]: Invalid user pookie from 183.82.121.34 port 35112
...
2020-02-03 16:42:04

最近上报的IP列表

35.151.143.71 20.163.15.43 143.244.167.224 159.89.234.76
43.165.167.69 157.230.14.114 5.226.140.126 31.14.254.108
213.166.84.59 165.227.146.146 20.195.192.35 49.73.51.155
49.69.255.177 221.227.255.242 123.182.208.30 121.227.150.26
121.224.32.222 117.36.5.157 114.231.190.24 114.230.58.132