城市(city): Shenzhen
省份(region): Guangdong
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '115.44.0.0 - 115.45.255.255'
% Abuse contact for '115.44.0.0 - 115.45.255.255' is 'xujing@topway.cn'
inetnum: 115.44.0.0 - 115.45.255.255
netname: Topway-Net
descr: ShenZhen Topway Video Communication Co. Ltd
descr: NO.6001 CaiTian Road, ShenZhen City
descr: GuangDong, China
country: CN
admin-c: JY738-AP
tech-c: JZ421-AP
abuse-c: AC1601-AP
status: ALLOCATED PORTABLE
mnt-by: MAINT-CNNIC-AP
mnt-irt: IRT-TOPWAY-NET-CN
mnt-lower: MAINT-CNNIC-AP
mnt-routes: MAINT-CNNIC-AP
last-modified: 2023-11-28T00:56:55Z
source: APNIC
irt: IRT-Topway-Net-CN
address: NO.6001 CaiTian Road ShenZhen GuangDong P.R.China
e-mail: xujing@topway.cn
abuse-mailbox: xujing@topway.cn
admin-c: JY738-AP
tech-c: JZ421-AP
auth: # Filtered
mnt-by: MAINT-CNNIC-AP
last-modified: 2025-11-18T00:34:47Z
source: APNIC
role: ABUSE CNNICCN
country: ZZ
address: Beijing, China
phone: +000000000
e-mail: ipas@cnnic.cn
admin-c: IP50-AP
tech-c: IP50-AP
nic-hdl: AC1601-AP
remarks: Generated from irt object IRT-CNNIC-CN
remarks: ipas@cnnic.cn is invalid
abuse-mailbox: ipas@cnnic.cn
mnt-by: APNIC-ABUSE
last-modified: 2025-09-19T17:20:32Z
source: APNIC
person: JianWei Yang
nic-hdl: JY738-AP
e-mail: ipadmin@topway.cn
address: NO.6001 CaiTian Road ShenZhen GuangDong
address: P.R.China 518036
phone: +86-755-83066888-3001
fax-no: +86-755-83066011
country: CN
mnt-by: MAINT-NEW
last-modified: 2008-09-04T07:29:18Z
source: APNIC
person: Jie Zhang
nic-hdl: JZ421-AP
e-mail: ipadmin@topway.cn
address: NO.6001 CaiTian Road ShenZhen GuangDong
address: P.R.China 518036
phone: +86-755-83066888-3088
fax-no: +86-755-83066011
country: CN
mnt-by: MAINT-NEW
last-modified: 2008-09-04T07:29:18Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 115.45.43.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5615
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;115.45.43.199. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042000 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 20 16:10:33 CST 2026
;; MSG SIZE rcvd: 106
Host 199.43.45.115.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 199.43.45.115.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 208.86.201.212 | attack | SSH login attempts. |
2020-03-29 16:38:39 |
| 185.212.129.25 | attack | SSH login attempts. |
2020-03-29 16:36:52 |
| 51.77.159.197 | attackbots | Mar 29 09:57:11 OPSO sshd\[32014\]: Invalid user jom from 51.77.159.197 port 47052 Mar 29 09:57:11 OPSO sshd\[32014\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.159.197 Mar 29 09:57:13 OPSO sshd\[32014\]: Failed password for invalid user jom from 51.77.159.197 port 47052 ssh2 Mar 29 10:01:14 OPSO sshd\[655\]: Invalid user fzv from 51.77.159.197 port 33002 Mar 29 10:01:14 OPSO sshd\[655\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.159.197 |
2020-03-29 16:34:29 |
| 104.236.224.69 | attackbotsspam | Mar 29 10:22:36 ns381471 sshd[2654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.224.69 Mar 29 10:22:38 ns381471 sshd[2654]: Failed password for invalid user nmf from 104.236.224.69 port 55331 ssh2 |
2020-03-29 16:37:43 |
| 143.0.68.15 | attack | SSH login attempts. |
2020-03-29 16:12:02 |
| 186.215.202.11 | attackbotsspam | SSH Brute-Forcing (server2) |
2020-03-29 16:43:24 |
| 217.72.192.67 | attackspam | SSH login attempts. |
2020-03-29 16:48:39 |
| 35.188.242.129 | attackbotsspam | SSH login attempts. |
2020-03-29 16:16:01 |
| 111.22.179.114 | attackbots | CN China - Failures: 20 ftpd |
2020-03-29 16:19:51 |
| 175.21.159.11 | attack | Unauthorised access (Mar 29) SRC=175.21.159.11 LEN=40 TTL=49 ID=38031 TCP DPT=8080 WINDOW=19554 SYN Unauthorised access (Mar 28) SRC=175.21.159.11 LEN=40 TTL=49 ID=65468 TCP DPT=8080 WINDOW=34899 SYN Unauthorised access (Mar 28) SRC=175.21.159.11 LEN=40 TTL=49 ID=22916 TCP DPT=8080 WINDOW=34899 SYN Unauthorised access (Mar 27) SRC=175.21.159.11 LEN=40 TTL=49 ID=26939 TCP DPT=8080 WINDOW=19554 SYN Unauthorised access (Mar 27) SRC=175.21.159.11 LEN=40 TTL=49 ID=40110 TCP DPT=8080 WINDOW=34899 SYN Unauthorised access (Mar 27) SRC=175.21.159.11 LEN=40 TTL=49 ID=60271 TCP DPT=8080 WINDOW=19554 SYN |
2020-03-29 16:13:57 |
| 187.202.60.152 | attackspam | Invalid user suv from 187.202.60.152 port 18606 |
2020-03-29 16:17:48 |
| 96.114.71.147 | attackspambots | Mar 29 08:54:49 vps sshd[18486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.114.71.147 Mar 29 08:54:50 vps sshd[18486]: Failed password for invalid user jose from 96.114.71.147 port 47820 ssh2 Mar 29 08:59:28 vps sshd[18709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.114.71.147 ... |
2020-03-29 16:13:17 |
| 167.71.177.106 | attack | Mar 29 08:42:58 internal-server-tf sshd\[31652\]: Invalid user admin from 167.71.177.106Mar 29 08:44:45 internal-server-tf sshd\[31707\]: Invalid user cacti from 167.71.177.106 ... |
2020-03-29 16:47:24 |
| 106.12.45.214 | attackspambots | [ssh] SSH attack |
2020-03-29 16:38:51 |
| 36.92.69.26 | attackspam | Mar 29 06:02:30 ncomp sshd[29657]: Invalid user wangqiang from 36.92.69.26 Mar 29 06:02:30 ncomp sshd[29657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.69.26 Mar 29 06:02:30 ncomp sshd[29657]: Invalid user wangqiang from 36.92.69.26 Mar 29 06:02:32 ncomp sshd[29657]: Failed password for invalid user wangqiang from 36.92.69.26 port 34024 ssh2 |
2020-03-29 16:28:01 |