城市(city): Makati City
省份(region): National Capital Region
国家(country): Philippines
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '122.53.218.224 - 122.53.218.255'
% Abuse contact for '122.53.218.224 - 122.53.218.255' is 'abuse@pldt.net'
inetnum: 122.53.218.224 - 122.53.218.255
netname: I-Gate
descr: 1-15I1QXE_ENTERPRISE Client
descr: This space has been assigned as STATIC
country: PH
admin-c: NA185-AP
tech-c: NOC36-AP
abuse-c: AP713-AP
status: ASSIGNED NON-PORTABLE
remarks: assigned 20180727
mnt-by: PHIX-NOC-AP
mnt-irt: IRT-PLDT-PH
last-modified: 2024-08-07T02:39:43Z
source: APNIC
irt: IRT-PLDT-PH
address: Philippine Long Distance Telephone Company
address: G/F PLDT Smart Integrated Center (IOC)
address: Nicanor Garcia St, Makati City
address: Philippines
e-mail: abuse@pldt.net
abuse-mailbox: abuse@pldt.net
admin-c: NOC36-AP
tech-c: NOC36-AP
auth: # Filtered
remarks: abuse@pldt.net was validated on 2025-08-18
mnt-by: PHIX-NOC-AP
last-modified: 2025-10-09T08:32:49Z
source: APNIC
role: ABUSE PLDTPH
country: ZZ
address: Philippine Long Distance Telephone Company
address: G/F PLDT Smart Integrated Center (IOC)
address: Nicanor Garcia St, Makati City
address: Philippines
phone: +000000000
e-mail: abuse@pldt.net
admin-c: NOC36-AP
tech-c: NOC36-AP
nic-hdl: AP713-AP
remarks: Generated from irt object IRT-PLDT-PH
remarks: abuse@pldt.net was validated on 2025-08-18
abuse-mailbox: abuse@pldt.net
mnt-by: APNIC-ABUSE
last-modified: 2025-10-09T08:33:15Z
source: APNIC
person: Nilo Agir
nic-hdl: NA185-AP
e-mail: ncagir@pldt.com.ph
address: 6/F Innolab Building, Boni Avenue, Mandaluyong City
phone: +632-584-1045
country: PH
mnt-by: PHIX-NOC-AP
last-modified: 2011-04-27T01:43:18Z
source: APNIC
person: PLDT APNIC NOC
nic-hdl: NOC36-AP
e-mail: Noc_pldt@pldt.com.ph
address: NFCSM-PLDT, 6/F Innolab Bldg, Boni Ave, Mandaluyong City, MM, Philippnes 1550
phone: +632-584-0201
country: PH
mnt-by: PHIX-NOC-AP
last-modified: 2017-02-01T02:28:01Z
source: APNIC
% Information related to '122.53.218.0/24AS9299'
route: 122.53.218.0/24
origin: AS9299
descr: Philippine Long Distance Telephone Co.
14/F Ramon Cojuangco Building
Makati Avenue
mnt-by: PHIX-NOC-AP
last-modified: 2023-10-25T04:13:54Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.53.218.236
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17640
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;122.53.218.236. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025110500 1800 900 604800 86400
;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Nov 05 19:13:03 CST 2025
;; MSG SIZE rcvd: 107
236.218.53.122.in-addr.arpa domain name pointer 122.53.218.236.static.pldt.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
236.218.53.122.in-addr.arpa name = 122.53.218.236.static.pldt.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 111.229.53.186 | attackbotsspam | Jun 21 05:47:34 vps sshd[119234]: Failed password for invalid user delete from 111.229.53.186 port 60072 ssh2 Jun 21 05:51:30 vps sshd[139725]: Invalid user webmail from 111.229.53.186 port 58348 Jun 21 05:51:30 vps sshd[139725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.53.186 Jun 21 05:51:32 vps sshd[139725]: Failed password for invalid user webmail from 111.229.53.186 port 58348 ssh2 Jun 21 05:55:22 vps sshd[159583]: Invalid user obama from 111.229.53.186 port 56624 ... |
2020-06-21 15:14:09 |
| 118.25.27.67 | attack | 2020-06-21T08:44:31.994730struts4.enskede.local sshd\[14659\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.27.67 user=root 2020-06-21T08:44:34.957863struts4.enskede.local sshd\[14659\]: Failed password for root from 118.25.27.67 port 45224 ssh2 2020-06-21T08:47:12.037598struts4.enskede.local sshd\[14664\]: Invalid user ivan from 118.25.27.67 port 45576 2020-06-21T08:47:12.048560struts4.enskede.local sshd\[14664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.27.67 2020-06-21T08:47:15.666393struts4.enskede.local sshd\[14664\]: Failed password for invalid user ivan from 118.25.27.67 port 45576 ssh2 ... |
2020-06-21 14:55:40 |
| 36.67.248.206 | attackbots | 2020-06-21T00:14:36.792194devel sshd[31464]: Invalid user tigrou from 36.67.248.206 port 43682 2020-06-21T00:14:38.919195devel sshd[31464]: Failed password for invalid user tigrou from 36.67.248.206 port 43682 ssh2 2020-06-21T00:24:57.778593devel sshd[32142]: Invalid user jose from 36.67.248.206 port 36324 |
2020-06-21 14:35:12 |
| 192.81.208.44 | attack | $f2bV_matches |
2020-06-21 15:11:39 |
| 94.25.181.15 | attackbots | T: f2b postfix aggressive 3x |
2020-06-21 14:43:53 |
| 78.29.75.229 | attackspam | Last visit 2020-06-20 05:47:27 |
2020-06-21 15:15:01 |
| 84.79.182.1 | attackbots | ES_YACOM-NET-MNT_<177>1592711748 [1:2403454:58145] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 78 [Classification: Misc Attack] [Priority: 2]: |
2020-06-21 14:56:09 |
| 61.174.160.50 | attack | CN bad_bot |
2020-06-21 14:52:21 |
| 222.140.6.20 | attackspambots | Jun 21 06:47:00 eventyay sshd[28551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.140.6.20 Jun 21 06:47:03 eventyay sshd[28551]: Failed password for invalid user ole from 222.140.6.20 port 35158 ssh2 Jun 21 06:49:07 eventyay sshd[28668]: Failed password for root from 222.140.6.20 port 34134 ssh2 ... |
2020-06-21 15:10:39 |
| 162.247.74.7 | attackspambots | srv02 SSH BruteForce Attacks 22 .. |
2020-06-21 14:48:26 |
| 124.158.14.39 | attackbots | Hit honeypot r. |
2020-06-21 15:05:02 |
| 50.116.87.90 | attackbotsspam | US bad_bot |
2020-06-21 15:03:58 |
| 43.226.144.66 | attackbots | Jun 21 05:55:37 lnxmail61 sshd[13862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.144.66 |
2020-06-21 15:05:24 |
| 194.55.12.116 | attackbotsspam | Jun 21 02:00:29 firewall sshd[15703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.55.12.116 Jun 21 02:00:29 firewall sshd[15703]: Invalid user steam from 194.55.12.116 Jun 21 02:00:31 firewall sshd[15703]: Failed password for invalid user steam from 194.55.12.116 port 54866 ssh2 ... |
2020-06-21 14:49:14 |
| 190.14.156.56 | attackbots | Unauthorized IMAP connection attempt |
2020-06-21 15:04:23 |