城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): China Unicom
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '114.119.0.0 - 114.119.127.255'
% Abuse contact for '114.119.0.0 - 114.119.127.255' is 'sup2009@139.com'
inetnum: 114.119.0.0 - 114.119.127.255
netname: SACCL
descr: Shenzhen Aosida Communication Co., Ltd.
descr: 808,8th Building,No 4 Nanyou Industry,NanShan District
country: CN
org: ORG-SACC1-AP
admin-c: SACC1-AP
tech-c: SACC1-AP
abuse-c: AS2945-AP
status: ALLOCATED PORTABLE
mnt-by: APNIC-HM
mnt-lower: MAINT-SACCL-CN
mnt-routes: MAINT-SACCL-CN
mnt-irt: IRT-SACCL-CN
last-modified: 2021-01-10T21:57:40Z
source: APNIC
irt: IRT-SACCL-CN
address: 728room,TCL building,NanShan District, ShenZhen Guangdong Province 518000
e-mail: sup2009@139.com
abuse-mailbox: sup2009@139.com
admin-c: SACC1-AP
tech-c: SACC1-AP
auth: # Filtered
remarks: sup2009@139.com was validated on 2025-04-18
mnt-by: MAINT-SACCL-CN
last-modified: 2025-09-04T07:04:04Z
source: APNIC
organisation: ORG-SACC1-AP
org-name: Shenzhen Aosida Communication Co., Ltd.
org-type: LIR
country: CN
address: 6 Gaoxin South 1st Rd,
address: TCL Building,
address: Nanshan Qu,
phone: +86-0755-86158808
fax-no: +86-0755-86158800
e-mail: sherry998877@163.com
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:16:22Z
source: APNIC
role: ABUSE SACCLCN
country: ZZ
address: 728room,TCL building,NanShan District, ShenZhen Guangdong Province 518000
phone: +000000000
e-mail: sup2009@139.com
admin-c: SACC1-AP
tech-c: SACC1-AP
nic-hdl: AS2945-AP
remarks: Generated from irt object IRT-SACCL-CN
remarks: sup2009@139.com was validated on 2025-04-18
abuse-mailbox: sup2009@139.com
mnt-by: APNIC-ABUSE
last-modified: 2025-04-18T07:01:08Z
source: APNIC
role: Shenzhen Aosida Communication Co Ltd administra
address: 808,8th Building,No 4 Nanyou Industry,NanShan District, ShenZhen Guangdong Province 518000
country: CN
phone: +86-0755-86158808
fax-no: +86-0755-86158808
e-mail: sherry998877@163.com
admin-c: SACC1-AP
tech-c: SACC1-AP
nic-hdl: SACC1-AP
mnt-by: MAINT-SACCL-CN
last-modified: 2014-06-03T05:04:27Z
source: APNIC
% Information related to '114.119.0.0/17AS17816'
route: 114.119.0.0/17
descr: China Unicom CHINA169 Guangdong Province network
descr: Addresses from CNNIC
country: CN
origin: AS17816
mnt-by: MAINT-CNCGROUP-RR
last-modified: 2009-02-02T03:25:12Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.119.119.24
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50912
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;114.119.119.24. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025101400 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 14 17:47:50 CST 2025
;; MSG SIZE rcvd: 107
Host 24.119.119.114.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 24.119.119.114.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
51.15.207.74 | attackbots | (sshd) Failed SSH login from 51.15.207.74 (FR/France/74-207-15-51.rev.cloud.scaleway.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 20 19:41:17 amsweb01 sshd[30871]: Invalid user admin123 from 51.15.207.74 port 50062 Apr 20 19:41:18 amsweb01 sshd[30871]: Failed password for invalid user admin123 from 51.15.207.74 port 50062 ssh2 Apr 20 19:50:27 amsweb01 sshd[32125]: Invalid user tp from 51.15.207.74 port 58916 Apr 20 19:50:29 amsweb01 sshd[32125]: Failed password for invalid user tp from 51.15.207.74 port 58916 ssh2 Apr 20 19:54:40 amsweb01 sshd[32576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.207.74 user=root |
2020-04-21 03:48:49 |
106.13.104.8 | attackbots | Apr 20 16:01:37 server sshd[19518]: Failed password for root from 106.13.104.8 port 59874 ssh2 Apr 20 16:07:11 server sshd[23360]: Failed password for root from 106.13.104.8 port 33458 ssh2 Apr 20 16:12:34 server sshd[27270]: Failed password for invalid user admin from 106.13.104.8 port 59472 ssh2 |
2020-04-21 03:33:10 |
61.216.17.26 | attack | Invalid user k from 61.216.17.26 port 19264 |
2020-04-21 03:44:01 |
45.146.253.35 | attackbots | nginx botsearch |
2020-04-21 04:02:07 |
106.13.173.38 | attackbotsspam | Invalid user admin from 106.13.173.38 port 51574 |
2020-04-21 03:32:39 |
51.38.51.200 | attackspam | Bruteforce detected by fail2ban |
2020-04-21 03:48:12 |
45.127.134.32 | attack | Invalid user nt from 45.127.134.32 port 49132 |
2020-04-21 03:51:39 |
94.33.52.178 | attack | Invalid user re from 94.33.52.178 port 57198 |
2020-04-21 03:39:44 |
51.178.2.79 | attackspam | Apr 20 14:00:49 mail sshd\[3583\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.2.79 user=root ... |
2020-04-21 03:46:57 |
13.81.113.86 | attackspam | Invalid user asicminer from 13.81.113.86 port 34638 |
2020-04-21 03:58:53 |
62.104.16.224 | attackbotsspam | k+ssh-bruteforce |
2020-04-21 03:43:35 |
103.202.99.40 | attackbots | Brute-force attempt banned |
2020-04-21 03:36:34 |
95.110.229.194 | attackspam | Apr 20 12:21:58 mockhub sshd[9516]: Failed password for root from 95.110.229.194 port 37496 ssh2 ... |
2020-04-21 03:39:27 |
164.132.108.195 | attackspam | $f2bV_matches |
2020-04-21 04:03:23 |
107.170.17.129 | attackbots | (sshd) Failed SSH login from 107.170.17.129 (US/United States/-): 5 in the last 3600 secs |
2020-04-21 03:31:29 |