必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Ho Chi Minh City

省份(region): unknown

国家(country): Vietnam

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '94.103.56.0 - 94.103.59.255'

% Abuse contact for '94.103.56.0 - 94.103.59.255' is 'report@abuseradar.com'

inetnum:        94.103.56.0 - 94.103.59.255
netname:        NET-94-103-56-0-22
country:        VN
geofeed:        https://luminabroadband.com/geofeed.txt
org:            ORG-LBU3-RIPE
admin-c:        LU1063-RIPE
tech-c:         LU1063-RIPE
abuse-c:        LU1063-RIPE
status:         ASSIGNED PA
remarks:        End User Organization
mnt-by:         netutils-mnt
created:        2026-04-02T06:44:33Z
last-modified:  2026-04-20T13:19:45Z
source:         RIPE

organisation:   ORG-LBU3-RIPE
org-name:       Lumina Broadband UAB
org-type:       OTHER
remarks:        End User Organization
address:        Auk?tai?i? g. 6
address:        11341
address:        Vilnius
country:        LT
abuse-c:        LBU1-RIPE
mnt-ref:        netutils-mnt
mnt-by:         netutils-mnt
created:        2025-07-07T09:46:30Z
last-modified:  2025-07-07T09:46:30Z
source:         RIPE # Filtered

role:           Lietparkas UAB
address:        Aukstaiciu str. 6
address:        11341
address:        Vilnius
address:        LT
nic-hdl:        LU1063-RIPE
remarks:        End User Organization
abuse-mailbox:  report@abuseradar.com
mnt-by:         netutils-mnt
created:        2025-06-20T11:01:47Z
last-modified:  2025-06-20T11:01:47Z
source:         RIPE # Filtered

% Information related to '94.103.56.0/22AS215294'

route:          94.103.56.0/22
origin:         AS215294
mnt-by:         netutils-mnt
created:        2026-04-02T06:44:33Z
last-modified:  2026-04-02T06:44:33Z
source:         RIPE

% Information related to '94.103.56.0/22AS21859'

route:          94.103.56.0/22
origin:         AS21859
mnt-by:         netutils-mnt
created:        2025-02-03T09:21:20Z
last-modified:  2025-02-03T09:21:20Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (ABERDEEN)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.103.57.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37482
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.103.57.94.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042600 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 26 21:22:15 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
Host 94.57.103.94.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 94.57.103.94.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.77.222.232 attackspam
$f2bV_matches
2019-08-31 20:08:33
137.63.184.100 attack
$f2bV_matches_ltvn
2019-08-31 20:56:20
107.170.113.190 attack
Aug 31 07:52:27 vps200512 sshd\[19799\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.113.190  user=ubuntu
Aug 31 07:52:28 vps200512 sshd\[19799\]: Failed password for ubuntu from 107.170.113.190 port 40814 ssh2
Aug 31 07:57:26 vps200512 sshd\[19919\]: Invalid user alison from 107.170.113.190
Aug 31 07:57:26 vps200512 sshd\[19919\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.113.190
Aug 31 07:57:29 vps200512 sshd\[19919\]: Failed password for invalid user alison from 107.170.113.190 port 35058 ssh2
2019-08-31 20:11:07
182.214.170.72 attackbotsspam
Aug 31 13:56:19 vps691689 sshd[18204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.214.170.72
Aug 31 13:56:22 vps691689 sshd[18204]: Failed password for invalid user naresh from 182.214.170.72 port 57894 ssh2
...
2019-08-31 20:12:30
138.68.245.137 attackbots
xmlrpc.php
2019-08-31 20:28:32
189.181.207.16 attackspam
Aug 31 13:17:32 mail sshd\[24104\]: Invalid user netdiag from 189.181.207.16 port 55711
Aug 31 13:17:32 mail sshd\[24104\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.181.207.16
...
2019-08-31 20:20:04
41.82.208.182 attackbots
Aug 31 13:41:45 vps647732 sshd[7641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.82.208.182
Aug 31 13:41:47 vps647732 sshd[7641]: Failed password for invalid user stx from 41.82.208.182 port 14517 ssh2
...
2019-08-31 20:39:45
2.136.131.36 attack
Aug 31 02:12:28 kapalua sshd\[20260\]: Invalid user shakira from 2.136.131.36
Aug 31 02:12:28 kapalua sshd\[20260\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.red-2-136-131.staticip.rima-tde.net
Aug 31 02:12:30 kapalua sshd\[20260\]: Failed password for invalid user shakira from 2.136.131.36 port 56188 ssh2
Aug 31 02:16:51 kapalua sshd\[20602\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.red-2-136-131.staticip.rima-tde.net  user=root
Aug 31 02:16:53 kapalua sshd\[20602\]: Failed password for root from 2.136.131.36 port 45090 ssh2
2019-08-31 20:17:16
92.222.71.125 attack
Aug 31 14:04:33 plex sshd[14798]: Invalid user testdb from 92.222.71.125 port 49576
2019-08-31 20:25:01
167.114.18.68 attack
WordPress wp-login brute force :: 167.114.18.68 0.068 BYPASS [31/Aug/2019:21:42:12  1000] [censored_4] "POST /wp-login.php HTTP/1.1" 200 3989 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:61.0.1) Gecko/20120101 Firefox/61.0.1"
2019-08-31 20:18:54
51.75.247.13 attackspam
Aug 31 02:08:39 hcbb sshd\[15160\]: Invalid user sebastian from 51.75.247.13
Aug 31 02:08:39 hcbb sshd\[15160\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.ip-51-75-247.eu
Aug 31 02:08:42 hcbb sshd\[15160\]: Failed password for invalid user sebastian from 51.75.247.13 port 39167 ssh2
Aug 31 02:12:32 hcbb sshd\[15603\]: Invalid user haxor from 51.75.247.13
Aug 31 02:12:32 hcbb sshd\[15603\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.ip-51-75-247.eu
2019-08-31 20:27:34
209.17.96.34 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2019-08-31 20:35:13
37.139.21.75 attackspam
Aug 31 14:29:56 mail sshd\[3995\]: Invalid user test from 37.139.21.75 port 43806
Aug 31 14:29:56 mail sshd\[3995\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.21.75
Aug 31 14:29:59 mail sshd\[3995\]: Failed password for invalid user test from 37.139.21.75 port 43806 ssh2
Aug 31 14:34:48 mail sshd\[4584\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.21.75  user=root
Aug 31 14:34:51 mail sshd\[4584\]: Failed password for root from 37.139.21.75 port 59234 ssh2
2019-08-31 20:43:19
107.131.126.71 attack
Aug 31 12:10:08 hcbbdb sshd\[10817\]: Invalid user user from 107.131.126.71
Aug 31 12:10:08 hcbbdb sshd\[10817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107-131-126-71.lightspeed.sntcca.sbcglobal.net
Aug 31 12:10:10 hcbbdb sshd\[10817\]: Failed password for invalid user user from 107.131.126.71 port 46240 ssh2
Aug 31 12:14:13 hcbbdb sshd\[11212\]: Invalid user lancelot from 107.131.126.71
Aug 31 12:14:13 hcbbdb sshd\[11212\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107-131-126-71.lightspeed.sntcca.sbcglobal.net
2019-08-31 20:30:24
61.32.112.246 attackbots
Aug 31 14:13:27 OPSO sshd\[10870\]: Invalid user viola from 61.32.112.246 port 44692
Aug 31 14:13:27 OPSO sshd\[10870\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.32.112.246
Aug 31 14:13:29 OPSO sshd\[10870\]: Failed password for invalid user viola from 61.32.112.246 port 44692 ssh2
Aug 31 14:18:10 OPSO sshd\[11473\]: Invalid user marcin from 61.32.112.246 port 59908
Aug 31 14:18:10 OPSO sshd\[11473\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.32.112.246
2019-08-31 20:33:50

最近上报的IP列表

176.65.139.177 2606:4700:10::6814:6404 2606:4700:10::ac43:2367 2606:4700:10::6814:5524
2606:4700:10::6814:7468 223.160.232.206 205.185.116.229 110.78.158.88
2606:4700:10::6816:4548 207.181.1.174 125.124.228.141 124.131.0.243
213.180.203.21 103.25.103.252 175.150.7.80 20.111.57.15
203.88.204.212 38.248.95.254 104.236.111.168 2606:4700:10::6814:7181