城市(city): Hong Kong
省份(region): unknown
国家(country): Hong Kong
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 118.193.34.233 | attack | May 14 00:47:47 vps639187 sshd\[416\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.193.34.233 user=root May 14 00:47:49 vps639187 sshd\[416\]: Failed password for root from 118.193.34.233 port 53764 ssh2 May 14 00:52:30 vps639187 sshd\[506\]: Invalid user nathan from 118.193.34.233 port 46694 May 14 00:52:30 vps639187 sshd\[506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.193.34.233 ... |
2020-05-14 08:13:10 |
| 118.193.34.233 | attackbots | May 12 02:04:07 web1 sshd\[26746\]: Invalid user prueba from 118.193.34.233 May 12 02:04:07 web1 sshd\[26746\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.193.34.233 May 12 02:04:09 web1 sshd\[26746\]: Failed password for invalid user prueba from 118.193.34.233 port 49516 ssh2 May 12 02:10:37 web1 sshd\[27429\]: Invalid user ec2-user from 118.193.34.233 May 12 02:10:37 web1 sshd\[27429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.193.34.233 |
2020-05-12 20:45:14 |
| 118.193.34.233 | attackspam | SSH Invalid Login |
2020-05-09 12:49:31 |
| 118.193.34.233 | attack | $f2bV_matches |
2020-05-03 12:39:52 |
| 118.193.34.233 | attackspambots | SSH Brute-Force. Ports scanning. |
2020-04-27 22:10:46 |
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '118.193.34.0 - 118.193.34.255'
% Abuse contact for '118.193.34.0 - 118.193.34.255' is 'hegui@ucloud.cn'
inetnum: 118.193.34.0 - 118.193.34.255
netname: UCLOUD-HK
descr: UCLOUD INFORMATION TECHNOLOGY (HK) LIMITED
country: HK
admin-c: UITH2-AP
tech-c: UITH2-AP
abuse-c: AU164-AP
status: ALLOCATED NON-PORTABLE
mnt-by: MAINT-UCLOUD-HK
mnt-irt: IRT-UCLOUD-HK
last-modified: 2024-08-26T12:43:42Z
source: APNIC
irt: IRT-UCLOUD-HK
address: FLAT/RM 603 6/F, LAWS COMMERCIAL PLAZA, 788 CHEUNG SHA WAN ROAD, KL,, Hong Kong
e-mail: pn-wan@ucloud.cn
abuse-mailbox: hegui@ucloud.cn
admin-c: UITH2-AP
tech-c: UITH2-AP
auth: # Filtered
remarks: pn-wan@ucloud.cn was validated on 2026-02-27
remarks: hegui@ucloud.cn was validated on 2026-02-27
mnt-by: MAINT-UCLOUD-HK
last-modified: 2026-02-27T02:07:48Z
source: APNIC
role: ABUSE UCLOUDHK
country: ZZ
address: FLAT/RM 603 6/F, LAWS COMMERCIAL PLAZA, 788 CHEUNG SHA WAN ROAD, KL,, Hong Kong
phone: +000000000
e-mail: pn-wan@ucloud.cn
admin-c: UITH2-AP
tech-c: UITH2-AP
nic-hdl: AU164-AP
remarks: Generated from irt object IRT-UCLOUD-HK
remarks: pn-wan@ucloud.cn was validated on 2026-02-27
remarks: hegui@ucloud.cn was validated on 2026-02-27
abuse-mailbox: hegui@ucloud.cn
mnt-by: APNIC-ABUSE
last-modified: 2026-02-27T02:08:22Z
source: APNIC
role: UCLOUD INFORMATION TECHNOLOGY HK LIMITED
address: FLAT/RM 603 6/F, LAWS COMMERCIAL PLAZA, 788 CHEUNG SHA WAN ROAD, KL,, Hong Kong
country: HK
phone: +000000000
e-mail: u-ipnic@ucloud.cn
admin-c: UITH2-AP
tech-c: UITH2-AP
nic-hdl: UITH2-AP
notify: hegui@ucloud.cn
mnt-by: MAINT-UCLOUD-HK
last-modified: 2022-05-16T03:54:14Z
source: APNIC
% Information related to '118.193.34.0/24AS135377'
route: 118.193.34.0/24
origin: AS135377
descr: UCLOUD INFORMATION TECHNOLOGY (HK) LIMITED
FLAT/RM 603 6/F
LAWS COMMERCIAL PLAZA
788 CHEUNG SHA WAN ROAD, KL,
mnt-by: MAINT-UCLOUD-HK
last-modified: 2020-11-26T07:25:43Z
source: APNIC
% Information related to '118.193.34.0/24AS62610'
route: 118.193.34.0/24
origin: AS62610
descr: UCLOUD INFORMATION TECHNOLOGY (HK) LIMITED
FLAT/RM 603 6/F
LAWS COMMERCIAL PLAZA
788 CHEUNG SHA WAN ROAD, KL,
mnt-by: MAINT-UCLOUD-HK
last-modified: 2025-07-27T09:58:51Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.193.34.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37947
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;118.193.34.19. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031900 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 19 16:37:34 CST 2026
;; MSG SIZE rcvd: 106
19.34.193.118.in-addr.arpa domain name pointer zmvkscw.cn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
19.34.193.118.in-addr.arpa name = zmvkscw.cn.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 150.109.147.145 | attack | Invalid user ts3bot from 150.109.147.145 port 40198 |
2020-07-25 08:12:01 |
| 120.92.139.2 | attackspambots | SSH invalid-user multiple login try |
2020-07-25 08:15:00 |
| 111.67.194.59 | attackspam | Invalid user oracle from 111.67.194.59 port 59986 |
2020-07-25 08:16:55 |
| 221.229.196.55 | attackspambots | Invalid user mitra from 221.229.196.55 port 59034 |
2020-07-25 08:23:56 |
| 119.29.227.108 | attackspam | Invalid user ips from 119.29.227.108 port 38126 |
2020-07-25 08:15:47 |
| 200.122.249.203 | attackspambots | Invalid user lwy from 200.122.249.203 port 36985 |
2020-07-25 08:05:49 |
| 106.12.98.182 | attackspam | Jul 25 00:22:41 ns382633 sshd\[32485\]: Invalid user dev from 106.12.98.182 port 47994 Jul 25 00:22:41 ns382633 sshd\[32485\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.98.182 Jul 25 00:22:44 ns382633 sshd\[32485\]: Failed password for invalid user dev from 106.12.98.182 port 47994 ssh2 Jul 25 00:38:30 ns382633 sshd\[2790\]: Invalid user rosa from 106.12.98.182 port 53580 Jul 25 00:38:30 ns382633 sshd\[2790\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.98.182 |
2020-07-25 07:57:55 |
| 141.98.10.208 | attackbots | Jul 25 01:42:04 srv01 postfix/smtpd\[18674\]: warning: unknown\[141.98.10.208\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 25 01:44:59 srv01 postfix/smtpd\[19717\]: warning: unknown\[141.98.10.208\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 25 01:45:09 srv01 postfix/smtpd\[20169\]: warning: unknown\[141.98.10.208\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 25 01:46:32 srv01 postfix/smtpd\[18673\]: warning: unknown\[141.98.10.208\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 25 01:47:56 srv01 postfix/smtpd\[18658\]: warning: unknown\[141.98.10.208\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-07-25 07:50:44 |
| 219.85.183.196 | attack | Port Scan detected! ... |
2020-07-25 07:52:24 |
| 110.83.165.150 | attack | SSH / Telnet Brute Force Attempts on Honeypot |
2020-07-25 08:17:23 |
| 38.130.113.160 | attackspam | Unauthorized connection attempt from IP address 38.130.113.160 on Port 445(SMB) |
2020-07-25 07:56:11 |
| 49.245.109.70 | attackbots | Invalid user user from 49.245.109.70 port 42032 |
2020-07-25 08:22:23 |
| 165.22.69.147 | attackbots | $f2bV_matches |
2020-07-25 08:10:41 |
| 202.101.216.254 | attackspambots | Unauthorized connection attempt from IP address 202.101.216.254 on Port 445(SMB) |
2020-07-25 07:56:59 |
| 195.70.59.121 | attackspambots | Jul 24 02:16:28 XXX sshd[24203]: Invalid user chenpq from 195.70.59.121 port 34150 |
2020-07-25 08:27:59 |