城市(city): unknown
省份(region): unknown
国家(country): Myanmar
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '103.47.185.0 - 103.47.185.255'
% Abuse contact for '103.47.185.0 - 103.47.185.255' is 'support@mtg.com.mm'
inetnum: 103.47.185.0 - 103.47.185.255
netname: MTGCL-MM
descr: Myanmar Technology Gateway Co., Ltd
country: MM
admin-c: MTGC2-AP
tech-c: MTGC2-AP
abuse-c: AM2415-AP
status: ASSIGNED NON-PORTABLE
mnt-by: MAINT-MTGCL-MM
mnt-irt: IRT-MTGCL-MM
last-modified: 2021-11-26T02:43:54Z
source: APNIC
irt: IRT-MTGCL-MM
address: No 560, Kabaraye Pagoda Road., Yangon Yangon
e-mail: support@mtg.com.mm
abuse-mailbox: support@mtg.com.mm
admin-c: MTGC2-AP
tech-c: MTGC2-AP
auth: # Filtered
remarks: support@mtg.com.mm was validated on 2025-11-13
mnt-by: MAINT-MTGCL-MM
last-modified: 2025-11-18T00:29:34Z
source: APNIC
role: ABUSE MTGCLMM
country: ZZ
address: No 560, Kabaraye Pagoda Road., Yangon Yangon
phone: +000000000
e-mail: support@mtg.com.mm
admin-c: MTGC2-AP
tech-c: MTGC2-AP
nic-hdl: AM2415-AP
remarks: Generated from irt object IRT-MTGCL-MM
remarks: support@mtg.com.mm was validated on 2025-11-13
abuse-mailbox: support@mtg.com.mm
mnt-by: APNIC-ABUSE
last-modified: 2025-11-13T06:56:58Z
source: APNIC
role: Myanmar Technology Gateway Co Ltd administrator
address: No 560, Kabaraye Pagoda Road., Yangon Yangon
country: MM
phone: +9595000263
fax-no: +9595000263
e-mail: support@mtg.com.mm
admin-c: MTGC2-AP
tech-c: MTGC2-AP
nic-hdl: MTGC2-AP
mnt-by: MAINT-MTGCL-MM
last-modified: 2014-12-29T01:32:30Z
source: APNIC
% Information related to '103.47.185.0/24AS135149'
route: 103.47.185.0/24
descr: route object for 103.47.185.0/24
origin: AS135149
mnt-by: MAINT-MTGCL-MM
country: MM
last-modified: 2021-11-26T02:29:53Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.47.185.226
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57506
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.47.185.226. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032600 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 26 21:48:03 CST 2026
;; MSG SIZE rcvd: 107
b'226.185.47.103.in-addr.arpa domain name pointer ncddmis.com.
'
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
226.185.47.103.in-addr.arpa name = ncddmis.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 216.218.206.104 | attackspambots | Port scan: Attack repeated for 24 hours |
2020-04-07 00:09:53 |
| 112.135.196.233 | attackbots | 23/tcp [2020-04-06]1pkt |
2020-04-06 23:38:32 |
| 112.85.42.176 | attackbotsspam | Apr 6 18:23:48 vpn01 sshd[12593]: Failed password for root from 112.85.42.176 port 28232 ssh2 Apr 6 18:23:52 vpn01 sshd[12593]: Failed password for root from 112.85.42.176 port 28232 ssh2 ... |
2020-04-07 00:28:32 |
| 45.112.205.59 | attackspam | Port probing on unauthorized port 6379 |
2020-04-06 23:45:51 |
| 157.230.132.100 | attack | (sshd) Failed SSH login from 157.230.132.100 (US/United States/-): 10 in the last 3600 secs |
2020-04-07 00:05:48 |
| 116.196.82.80 | attackspam | Apr 6 17:32:08 pve sshd[8878]: Failed password for root from 116.196.82.80 port 47892 ssh2 Apr 6 17:34:53 pve sshd[9278]: Failed password for root from 116.196.82.80 port 45872 ssh2 |
2020-04-06 23:59:22 |
| 156.238.160.137 | attack | 2020-04-06T15:30:17.183339shield sshd\[10623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.238.160.137 user=root 2020-04-06T15:30:18.850998shield sshd\[10623\]: Failed password for root from 156.238.160.137 port 42580 ssh2 2020-04-06T15:32:06.206380shield sshd\[10912\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.238.160.137 user=root 2020-04-06T15:32:07.838733shield sshd\[10912\]: Failed password for root from 156.238.160.137 port 43374 ssh2 2020-04-06T15:33:56.021933shield sshd\[11201\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.238.160.137 user=root |
2020-04-06 23:34:26 |
| 140.213.188.201 | attackbots | Automatic report - XMLRPC Attack |
2020-04-07 00:08:53 |
| 178.128.226.2 | attackbotsspam | 2020-04-06T17:29:21.778414vps751288.ovh.net sshd\[20687\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.226.2 user=root 2020-04-06T17:29:24.093459vps751288.ovh.net sshd\[20687\]: Failed password for root from 178.128.226.2 port 42394 ssh2 2020-04-06T17:33:01.997714vps751288.ovh.net sshd\[20719\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.226.2 user=root 2020-04-06T17:33:04.181981vps751288.ovh.net sshd\[20719\]: Failed password for root from 178.128.226.2 port 47885 ssh2 2020-04-06T17:36:45.899766vps751288.ovh.net sshd\[20749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.226.2 user=root |
2020-04-07 00:25:33 |
| 141.98.10.129 | attackspambots | VoIP Brute Force - 141.98.10.129 - Auto Report ... |
2020-04-07 00:24:31 |
| 197.87.131.133 | attack | 445/tcp [2020-04-06]1pkt |
2020-04-07 00:04:49 |
| 183.82.1.45 | attack | Apr 6 17:30:57 dcd-gentoo sshd[381]: Invalid user ubuntu from 183.82.1.45 port 42420 Apr 6 17:34:06 dcd-gentoo sshd[512]: Invalid user ubuntu from 183.82.1.45 port 48690 Apr 6 17:37:16 dcd-gentoo sshd[616]: Invalid user gitlab from 183.82.1.45 port 54922 ... |
2020-04-06 23:38:00 |
| 222.186.42.155 | attackbotsspam | Apr 6 18:15:12 server sshd[29057]: Failed password for root from 222.186.42.155 port 41105 ssh2 Apr 6 18:15:14 server sshd[29057]: Failed password for root from 222.186.42.155 port 41105 ssh2 Apr 6 18:15:17 server sshd[29057]: Failed password for root from 222.186.42.155 port 41105 ssh2 |
2020-04-07 00:17:43 |
| 46.41.134.48 | attackspambots | Apr 6 18:09:00 legacy sshd[23909]: Failed password for root from 46.41.134.48 port 58268 ssh2 Apr 6 18:12:51 legacy sshd[24037]: Failed password for root from 46.41.134.48 port 60258 ssh2 ... |
2020-04-07 00:30:12 |
| 139.59.27.226 | attack | 139.59.27.226 - - [06/Apr/2020:17:36:39 +0200] "POST /wp-login.php HTTP/1.0" 200 2195 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 139.59.27.226 - - [06/Apr/2020:17:36:42 +0200] "POST /wp-login.php HTTP/1.0" 200 2184 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-04-07 00:35:33 |