城市(city): Kuala Lumpur
省份(region): Kuala Lumpur
国家(country): Malaysia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '103.82.228.0 - 103.82.228.255'
% Abuse contact for '103.82.228.0 - 103.82.228.255' is 'net.abuse@rocksoft.net'
inetnum: 103.82.228.0 - 103.82.228.255
netname: ROCKSOFTSDNBHD-MY
descr: WISDOM CLOUD INTERNET TECHNOLOGY PTE. LTD
country: SG
admin-c: RSBA1-AP
tech-c: RSBA1-AP
abuse-c: AR983-AP
status: ALLOCATED NON-PORTABLE
mnt-by: MAINT-ROCKSOFTSDNBHD-MY
mnt-irt: IRT-ROCKSOFTSDNBHD-MY
last-modified: 2026-02-02T06:45:31Z
source: APNIC
irt: IRT-ROCKSOFTSDNBHD-MY
address: LG-01, SME Technopreneur Centre 3 ,, Block 3740 Persiaran APEC Cyber 8 ,, Cyberjaya Selangor 63500
e-mail: net.abuse@rocksoft.net
abuse-mailbox: net.abuse@rocksoft.net
admin-c: RSBA1-AP
tech-c: RSBA1-AP
auth: # Filtered
remarks: net.abuse@rocksoft.net was validated on 2025-10-01
mnt-by: MAINT-ROCKSOFTSDNBHD-MY
last-modified: 2025-11-18T00:31:21Z
source: APNIC
role: ABUSE ROCKSOFTSDNBHDMY
country: ZZ
address: LG-01, SME Technopreneur Centre 3 ,, Block 3740 Persiaran APEC Cyber 8 ,, Cyberjaya Selangor 63500
phone: +000000000
e-mail: net.abuse@rocksoft.net
admin-c: RSBA1-AP
tech-c: RSBA1-AP
nic-hdl: AR983-AP
remarks: Generated from irt object IRT-ROCKSOFTSDNBHD-MY
remarks: net.abuse@rocksoft.net was validated on 2025-10-01
abuse-mailbox: net.abuse@rocksoft.net
mnt-by: APNIC-ABUSE
last-modified: 2025-10-01T09:18:50Z
source: APNIC
role: RockSoft Sdn Bhd administrator
address: LG-01, SME Technopreneur Centre 3 ,, Block 3740 Persiaran APEC Cyber 8 ,, Cyberjaya Selangor 63500
country: MY
phone: +603-8319-3615
fax-no: +603-8319-3615
e-mail: net.abuse@rocksoft.net
admin-c: RSBA1-AP
tech-c: RSBA1-AP
nic-hdl: RSBA1-AP
mnt-by: MAINT-ROCKSOFTSDNBHD-MY
last-modified: 2017-01-04T05:32:36Z
source: APNIC
% Information related to '103.82.228.0/24AS197537'
route: 103.82.228.0/24
origin: AS197537
descr: WISDOM CLOUD INTERNET TECHNOLOGY PTE. LTD
mnt-by: MAINT-ROCKSOFTSDNBHD-MY
last-modified: 2026-02-13T07:13:35Z
source: APNIC
% Information related to '103.82.228.0/24AS202736'
route: 103.82.228.0/24
origin: AS202736
descr: WISDOM CLOUD INTERNET TECHNOLOGY PTE. LTD
mnt-by: MAINT-ROCKSOFTSDNBHD-MY
last-modified: 2026-02-13T07:12:57Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.82.228.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23922
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.82.228.55. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042102 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 22 12:12:47 CST 2026
;; MSG SIZE rcvd: 106
b'Host 55.228.82.103.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 103.82.228.55.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 148.70.201.162 | attack | 2019-11-18T19:31:26.159724abusebot-7.cloudsearch.cf sshd\[18600\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.201.162 user=root |
2019-11-19 03:54:54 |
| 109.242.232.165 | attackspam | TCP Port Scanning |
2019-11-19 03:36:48 |
| 148.70.101.245 | attackspambots | Automatic report - Banned IP Access |
2019-11-19 03:46:23 |
| 222.186.175.202 | attackspambots | Nov 18 20:30:00 mail sshd[11070]: Failed password for root from 222.186.175.202 port 32072 ssh2 Nov 18 20:30:03 mail sshd[11070]: Failed password for root from 222.186.175.202 port 32072 ssh2 Nov 18 20:30:07 mail sshd[11070]: Failed password for root from 222.186.175.202 port 32072 ssh2 Nov 18 20:30:10 mail sshd[11070]: Failed password for root from 222.186.175.202 port 32072 ssh2 |
2019-11-19 03:48:08 |
| 199.58.86.211 | attackbotsspam | Automatic report - Banned IP Access |
2019-11-19 03:48:48 |
| 123.206.46.177 | attack | 2019-11-18T13:18:03.3144501495-001 sshd\[30080\]: Invalid user taghvatalab from 123.206.46.177 port 47332 2019-11-18T13:18:03.3218801495-001 sshd\[30080\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.46.177 2019-11-18T13:18:04.7497511495-001 sshd\[30080\]: Failed password for invalid user taghvatalab from 123.206.46.177 port 47332 ssh2 2019-11-18T13:43:39.3599591495-001 sshd\[31004\]: Invalid user jadyn from 123.206.46.177 port 47004 2019-11-18T13:43:39.3634031495-001 sshd\[31004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.46.177 2019-11-18T13:43:40.9913841495-001 sshd\[31004\]: Failed password for invalid user jadyn from 123.206.46.177 port 47004 ssh2 ... |
2019-11-19 03:34:20 |
| 116.214.56.11 | attackbots | SSH brutforce |
2019-11-19 03:51:09 |
| 118.89.27.248 | attackspam | Automatic report - Banned IP Access |
2019-11-19 03:33:54 |
| 118.34.12.35 | attack | Nov 18 08:53:57 web1 sshd\[19533\]: Invalid user coel from 118.34.12.35 Nov 18 08:53:57 web1 sshd\[19533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.34.12.35 Nov 18 08:53:58 web1 sshd\[19533\]: Failed password for invalid user coel from 118.34.12.35 port 32848 ssh2 Nov 18 08:58:10 web1 sshd\[19889\]: Invalid user evita from 118.34.12.35 Nov 18 08:58:10 web1 sshd\[19889\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.34.12.35 |
2019-11-19 03:50:44 |
| 183.91.153.250 | attack | Nov 18 09:49:02 web1 postfix/smtpd[4964]: warning: unknown[183.91.153.250]: SASL LOGIN authentication failed: authentication failure ... |
2019-11-19 03:27:27 |
| 106.12.45.108 | attack | 2019-11-18T18:40:09.734619abusebot-4.cloudsearch.cf sshd\[19938\]: Invalid user ptricia1234 from 106.12.45.108 port 40726 |
2019-11-19 03:31:20 |
| 192.99.32.86 | attackbotsspam | Nov 18 19:26:40 server sshd\[20900\]: Invalid user jorrie from 192.99.32.86 port 59940 Nov 18 19:26:40 server sshd\[20900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.32.86 Nov 18 19:26:42 server sshd\[20900\]: Failed password for invalid user jorrie from 192.99.32.86 port 59940 ssh2 Nov 18 19:29:59 server sshd\[17581\]: Invalid user neil from 192.99.32.86 port 40310 Nov 18 19:29:59 server sshd\[17581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.32.86 |
2019-11-19 03:52:17 |
| 202.129.210.59 | attack | Nov 18 18:01:15 localhost sshd\[39514\]: Invalid user guest1234678 from 202.129.210.59 port 45776 Nov 18 18:01:15 localhost sshd\[39514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.129.210.59 Nov 18 18:01:16 localhost sshd\[39514\]: Failed password for invalid user guest1234678 from 202.129.210.59 port 45776 ssh2 Nov 18 18:05:39 localhost sshd\[39665\]: Invalid user sendyk from 202.129.210.59 port 56998 Nov 18 18:05:39 localhost sshd\[39665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.129.210.59 ... |
2019-11-19 03:58:27 |
| 107.180.120.59 | attackbots | 107.180.120.59 - - [18/Nov/2019:09:48:51 -0500] "GET /?page=products&action=view&manufacturerID=61&productID=12L&linkID=7334999999.1%20union%20select%20unhex(hex(version()))%20--%20and%201%3D1 HTTP/1.1" 200 58331 "-" "-" 107.180.120.59 - - [18/Nov/2019:09:48:51 -0500] "GET /?page=products&action=view&manufacturerID=61&productID=12L&linkID=733499999%27%20union%20select%20unhex(hex(version()))%20--%20%27x%27=%27x HTTP/1.1" 200 58331 "-" "-" 107.180.120.59 - - [18/Nov/2019:09:48:51 -0500] "GET /?page=products&action=view&manufacturerID=61&productID=12L&linkID=733499999%22%20union%20select%20unhex(hex(version()))%20--%20%22x%22=%22x HTTP/1.1" 200 58331 "-" "-" 107.180.120.59 - - [18/Nov/2019:09:48:52 -0500] "GET /?page=products&action=view&manufacturerID=61&productID=12L&linkID=7334%20or%20(1,2)=(select*from(select%20name_const(CHAR(111,108,111,108,111,115,104,101,114),1),name_const(CHAR(111,108,111,108,111,115,104,101,114),1))a)%20--%20and%201%3D1 H |
2019-11-19 03:35:42 |
| 46.37.215.176 | attack | 1574088495 - 11/18/2019 15:48:15 Host: 46.37.215.176/46.37.215.176 Port: 6001 TCP Blocked |
2019-11-19 04:00:19 |