城市(city): Las Piñas
省份(region): National Capital Region
国家(country): Philippines
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '112.208.0.0 - 112.208.127.255'
% Abuse contact for '112.208.0.0 - 112.208.127.255' is 'abuse@pldt.net'
inetnum: 112.208.0.0 - 112.208.127.255
netname: Residential_DSL
descr: HOME_DSL
descr: This space has been assigned as DYNAMIC
country: PH
admin-c: NOC36-AP
tech-c: NOC36-AP
abuse-c: AP713-AP
status: ASSIGNED NON-PORTABLE
remarks: assigned 20210807
mnt-by: PHIX-NOC-AP
mnt-irt: IRT-PLDT-PH
last-modified: 2023-07-31T07:40:55Z
source: APNIC
irt: IRT-PLDT-PH
address: Philippine Long Distance Telephone Company
address: G/F PLDT Smart Integrated Center (IOC)
address: Nicanor Garcia St, Makati City
address: Philippines
e-mail: abuse@pldt.net
abuse-mailbox: abuse@pldt.net
admin-c: NOC36-AP
tech-c: NOC36-AP
auth: # Filtered
remarks: abuse@pldt.net is invalid
mnt-by: PHIX-NOC-AP
last-modified: 2026-03-11T13:08:57Z
source: APNIC
role: ABUSE PLDTPH
country: ZZ
address: Philippine Long Distance Telephone Company
address: G/F PLDT Smart Integrated Center (IOC)
address: Nicanor Garcia St, Makati City
address: Philippines
phone: +000000000
e-mail: abuse@pldt.net
admin-c: NOC36-AP
tech-c: NOC36-AP
nic-hdl: AP713-AP
remarks: Generated from irt object IRT-PLDT-PH
remarks: abuse@pldt.net is invalid
abuse-mailbox: abuse@pldt.net
mnt-by: APNIC-ABUSE
last-modified: 2026-03-11T13:09:44Z
source: APNIC
person: PLDT APNIC NOC
nic-hdl: NOC36-AP
e-mail: Noc_pldt@pldt.com.ph
address: NFCSM-PLDT, 6/F Innolab Bldg, Boni Ave, Mandaluyong City, MM, Philippnes 1550
phone: +632-584-0201
country: PH
mnt-by: PHIX-NOC-AP
last-modified: 2017-02-01T02:28:01Z
source: APNIC
% Information related to '112.208.112.0/20AS9299'
route: 112.208.112.0/20
origin: AS9299
descr: Philippine Long Distance Telephone Co.
14/F Ramon Cojuangco Building
Makati Avenue
mnt-by: PHIX-NOC-AP
last-modified: 2022-05-16T10:25:10Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.208.127.31
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16521
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;112.208.127.31. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032001 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 21 04:52:45 CST 2026
;; MSG SIZE rcvd: 107
31.127.208.112.in-addr.arpa domain name pointer 112.208.127.31.pldt.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
31.127.208.112.in-addr.arpa name = 112.208.127.31.pldt.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 106.12.125.241 | attack | Invalid user user from 106.12.125.241 port 37298 |
2020-08-22 17:33:31 |
| 60.251.183.90 | attackspambots | Bruteforce detected by fail2ban |
2020-08-22 17:35:30 |
| 159.65.158.172 | attackspam | Aug 22 11:25:17 haigwepa sshd[5496]: Failed password for root from 159.65.158.172 port 51428 ssh2 ... |
2020-08-22 17:37:58 |
| 189.216.48.81 | attackspam | 189.216.48.81 - - [22/Aug/2020:04:48:29 +0100] "POST /wp-login.php HTTP/1.1" 200 1874 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 189.216.48.81 - - [22/Aug/2020:04:48:32 +0100] "POST /wp-login.php HTTP/1.1" 200 1877 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 189.216.48.81 - - [22/Aug/2020:04:48:54 +0100] "POST /wp-login.php HTTP/1.1" 200 1874 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-08-22 17:23:56 |
| 66.45.251.154 | attackbots | failed root login |
2020-08-22 17:47:17 |
| 106.13.233.186 | attack | Aug 22 05:44:24 plg sshd[13237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.233.186 Aug 22 05:44:25 plg sshd[13237]: Failed password for invalid user 2 from 106.13.233.186 port 51949 ssh2 Aug 22 05:45:52 plg sshd[13257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.233.186 Aug 22 05:45:54 plg sshd[13257]: Failed password for invalid user t7adm from 106.13.233.186 port 59110 ssh2 Aug 22 05:47:20 plg sshd[13263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.233.186 user=root Aug 22 05:47:23 plg sshd[13263]: Failed password for invalid user root from 106.13.233.186 port 38033 ssh2 ... |
2020-08-22 17:26:23 |
| 138.185.76.81 | attackspambots | notenschluessel-fulda.de 138.185.76.81 [22/Aug/2020:05:48:48 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4336 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36" notenschluessel-fulda.de 138.185.76.81 [22/Aug/2020:05:48:51 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4336 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36" |
2020-08-22 17:26:09 |
| 180.250.247.45 | attackspambots | Aug 22 11:02:35 [host] sshd[26684]: Invalid user x Aug 22 11:02:35 [host] sshd[26684]: pam_unix(sshd: Aug 22 11:02:37 [host] sshd[26684]: Failed passwor |
2020-08-22 17:19:43 |
| 78.189.32.106 | attack | Attempted connection to port 445. |
2020-08-22 17:44:18 |
| 2607:5300:60:1c57:: | attackbotsspam | Automatically reported by fail2ban report script (mx1) |
2020-08-22 17:53:03 |
| 185.234.218.68 | attackspam | 2020-08-22T02:57:14.632234linuxbox-skyline auth[46706]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=tech-support rhost=185.234.218.68 ... |
2020-08-22 17:47:01 |
| 178.165.99.208 | attack | Aug 21 20:08:05 web9 sshd\[15667\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.165.99.208 user=root Aug 21 20:08:08 web9 sshd\[15667\]: Failed password for root from 178.165.99.208 port 50954 ssh2 Aug 21 20:12:02 web9 sshd\[16157\]: Invalid user odoo from 178.165.99.208 Aug 21 20:12:02 web9 sshd\[16157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.165.99.208 Aug 21 20:12:04 web9 sshd\[16157\]: Failed password for invalid user odoo from 178.165.99.208 port 58208 ssh2 |
2020-08-22 17:32:02 |
| 80.191.169.66 | attackspam | Dovecot Invalid User Login Attempt. |
2020-08-22 17:40:56 |
| 46.39.20.4 | attackspambots | SSH bruteforce |
2020-08-22 17:13:05 |
| 37.23.242.86 | attackspambots | 2020-08-21T23:48:59.025547devel sshd[14757]: Failed password for root from 37.23.242.86 port 45048 ssh2 2020-08-21T23:49:01.013386devel sshd[14757]: Failed password for root from 37.23.242.86 port 45048 ssh2 2020-08-21T23:49:03.333325devel sshd[14757]: Failed password for root from 37.23.242.86 port 45048 ssh2 |
2020-08-22 17:13:59 |