城市(city): unknown
省份(region): unknown
国家(country): India
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '103.155.210.0 - 103.155.211.255'
% Abuse contact for '103.155.210.0 - 103.155.211.255' is 'jagdishpaliya@ucnindia.com'
inetnum: 103.155.210.0 - 103.155.211.255
netname: UCNFNPL
descr: Ucn Fibrenet Pvt Ltd
admin-c: JP1516-AP
tech-c: NA831-AP
country: IN
mnt-by: MAINT-IN-IRINN
mnt-lower: MAINT-IN-IRINN
mnt-irt: IRT-UCNFNPL-IN
mnt-routes: MAINT-IN-UCNFNPL
mnt-routes: MAINT-IN-IRINN
status: ALLOCATED PORTABLE
last-modified: 2025-08-11T22:50:40Z
source: APNIC
irt: IRT-UCNFNPL-IN
address: 4th Floor, Milestone, Wardha Road, Ramdaspeth, Nagpur,Nagpur,Maharashtra-440012
e-mail: ashutoshkane@ucnindia.com
abuse-mailbox: jagdishpaliya@ucnindia.com
admin-c: NA831-AP
tech-c: NA831-AP
auth: # Filtered
mnt-by: MAINT-IN-UCNFNPL
mnt-by: MAINT-IN-IRINN
last-modified: 2026-02-10T04:58:09Z
source: APNIC
role: network admin
address: 4th Floor, Milestone, Wardha Road, Ramdaspeth, Nagpur,Nagpur,Maharashtra-440012
country: IN
phone: +91 7126633999
e-mail: jagdishpaliya@ucnindia.com
admin-c: JP1516-AP
tech-c: JP1516-AP
nic-hdl: NA831-AP
mnt-by: MAINT-IN-UCNFNPL
mnt-by: MAINT-IN-IRINN
last-modified: 2025-09-27T10:03:28Z
source: APNIC
person: Jagdish paliya
address: 4th Floor, Milestone, Wardha Road, Ramdaspeth, Nagpur,Nagpur,Maharashtra-440012
country: IN
phone: +91 7126633999
e-mail: jagdishpaliya@ucnindia.com
nic-hdl: JP1516-AP
mnt-by: MAINT-IN-UCNFNPL
mnt-by: MAINT-IN-IRINN
last-modified: 2025-09-27T10:03:28Z
source: APNIC
% Information related to '103.155.210.0/24AS133007'
route: 103.155.210.0/24
descr: Ucn Fibrenet Pvt Ltd
mnt-routes: MAINT-IN-UCNFNPL
mnt-by: MAINT-IN-UCNFNPL
mnt-by: MAINT-IN-IRINN
mnt-routes: MAINT-IN-IRINN
origin: AS133007
last-modified: 2025-12-14T22:22:34Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.155.210.152
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40480
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.155.210.152. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032500 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 25 14:30:37 CST 2026
;; MSG SIZE rcvd: 108
152.210.155.103.in-addr.arpa domain name pointer j152.ucndns.in.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
152.210.155.103.in-addr.arpa name = j152.ucndns.in.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 162.255.22.162 | attackspambots | Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): |
2020-09-25 05:11:32 |
| 68.183.80.42 | attackbotsspam | Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): |
2020-09-25 04:54:31 |
| 54.39.152.32 | attackspam | 54.39.152.32 - - [24/Sep/2020:20:54:45 +0100] "POST /wp-login.php HTTP/1.1" 200 2863 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 54.39.152.32 - - [24/Sep/2020:20:54:47 +0100] "POST /wp-login.php HTTP/1.1" 200 2844 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 54.39.152.32 - - [24/Sep/2020:20:54:48 +0100] "POST /wp-login.php HTTP/1.1" 200 2844 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-09-25 04:55:48 |
| 165.22.121.56 | attackspambots | Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root |
2020-09-25 05:11:07 |
| 36.156.154.218 | attackspambots | Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): |
2020-09-25 05:00:07 |
| 123.157.219.83 | attack | Invalid user jenkins from 123.157.219.83 port 15422 |
2020-09-25 05:22:37 |
| 139.59.129.59 | attack | bruteforce detected |
2020-09-25 05:18:15 |
| 134.175.150.132 | attackbotsspam | Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): |
2020-09-25 05:20:21 |
| 193.181.245.235 | attackbots | Sep 24 20:55:53 *** sshd[14353]: User root from 193.181.245.235 not allowed because not listed in AllowUsers |
2020-09-25 05:05:20 |
| 39.100.28.79 | attackspambots | Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): |
2020-09-25 04:59:08 |
| 185.246.130.69 | attackspam | Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root |
2020-09-25 05:07:27 |
| 161.35.99.100 | attack | Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root |
2020-09-25 05:12:30 |
| 134.209.235.129 | attack | Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): |
2020-09-25 05:19:55 |
| 185.7.39.75 | attackspambots | Time: Thu Sep 24 20:39:06 2020 +0000 IP: 185.7.39.75 (FR/France/-) Failures: 5 (sshd) Interval: 3600 seconds Blocked: Permanent Block [LF_SSHD] Log entries: Sep 24 20:30:28 activeserver sshd[28860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.7.39.75 user=root Sep 24 20:30:30 activeserver sshd[28860]: Failed password for root from 185.7.39.75 port 54958 ssh2 Sep 24 20:33:00 activeserver sshd[5848]: Invalid user teste from 185.7.39.75 port 42708 Sep 24 20:33:03 activeserver sshd[5848]: Failed password for invalid user teste from 185.7.39.75 port 42708 ssh2 Sep 24 20:39:02 activeserver sshd[21973]: Invalid user hadoop from 185.7.39.75 port 38450 |
2020-09-25 05:07:48 |
| 159.65.68.239 | attack | Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root |
2020-09-25 05:13:44 |