城市(city): Yangon
省份(region): Yangon
国家(country): Myanmar
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '150.228.148.0 - 150.228.149.255'
% Abuse contact for '150.228.148.0 - 150.228.149.255' is 'starlink-admin@spacex.com'
inetnum: 150.228.148.0 - 150.228.149.255
netname: STARLINK_SNGESGP1_MM
descr: Starlink IPv4 Customer Space
country: MM
geofeed: https://geoip.starlinkisp.net/
admin-c: SSIA2-AP
tech-c: AS2380-AP
abuse-c: AS2380-AP
status: ALLOCATED NON-PORTABLE
mnt-by: MAINT-SPACEX-AP
mnt-irt: IRT-SPACEX-AP
last-modified: 2026-03-27T19:31:20Z
source: APNIC
irt: IRT-SPACEX-AP
address: 1 Rocket Rd, Hawthorne CA 90250
e-mail: starlink-admin@spacex.com
abuse-mailbox: starlink-admin@spacex.com
admin-c: SSIA2-AP
tech-c: SSIA2-AP
auth: # Filtered
remarks: starlink-admin@spacex.com was validated on 2026-03-27
mnt-by: MAINT-SPACEX-AP
last-modified: 2026-03-27T23:03:32Z
source: APNIC
role: ABUSE SPACEXAP
country: ZZ
address: 1 Rocket Rd, Hawthorne CA 90250
phone: +000000000
e-mail: starlink-admin@spacex.com
admin-c: SSIA2-AP
tech-c: SSIA2-AP
nic-hdl: AS2380-AP
remarks: Generated from irt object IRT-SPACEX-AP
remarks: starlink-admin@spacex.com was validated on 2026-03-27
abuse-mailbox: starlink-admin@spacex.com
mnt-by: APNIC-ABUSE
last-modified: 2026-03-27T23:04:07Z
source: APNIC
role: SpaceX Services Inc administrator
address: 1 Rocket Rd, Hawthorne CA 90250
country: US
phone: +1-310-363-6000
e-mail: starlink-admin@spacex.com
admin-c: SSIA2-AP
tech-c: SSIN3-AP
nic-hdl: SSIA2-AP
mnt-by: MAINT-SPACEX-AP
last-modified: 2021-09-06T17:22:13Z
source: APNIC
% Information related to '150.228.149.0/24AS14593'
route: 150.228.149.0/24
origin: AS14593
descr: SpaceX Services, Inc.
1 Rocket Rd
mnt-by: MAINT-SPACEX-AP
last-modified: 2026-02-13T18:14:56Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.228.149.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11743
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;150.228.149.164. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026050300 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 03 18:35:49 CST 2026
;; MSG SIZE rcvd: 108
164.149.228.150.in-addr.arpa domain name pointer customer.sngesgp1.isp.starlink.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
164.149.228.150.in-addr.arpa name = customer.sngesgp1.isp.starlink.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 196.196.235.113 | attackspambots | NAME : "" "" CIDR : | STATUS : 403 {Looking for resource vulnerabilities} DDoS Attack - block certain countries :) IP: 196.196.235.113 Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN - data recovery https://help-dysk.pl |
2019-08-21 06:54:12 |
| 142.93.222.197 | attack | Aug 20 12:51:44 vps200512 sshd\[13871\]: Invalid user it from 142.93.222.197 Aug 20 12:51:44 vps200512 sshd\[13871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.197 Aug 20 12:51:47 vps200512 sshd\[13871\]: Failed password for invalid user it from 142.93.222.197 port 46844 ssh2 Aug 20 12:56:50 vps200512 sshd\[13981\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.197 user=root Aug 20 12:56:53 vps200512 sshd\[13981\]: Failed password for root from 142.93.222.197 port 37024 ssh2 |
2019-08-21 06:56:35 |
| 46.105.137.251 | attackspambots | $f2bV_matches |
2019-08-21 07:12:25 |
| 187.120.129.55 | attackspambots | $f2bV_matches |
2019-08-21 07:14:28 |
| 46.101.235.214 | attack | Aug 20 22:35:39 ns315508 sshd[5321]: Invalid user clamav1 from 46.101.235.214 port 48188 Aug 20 22:35:39 ns315508 sshd[5321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.235.214 Aug 20 22:35:39 ns315508 sshd[5321]: Invalid user clamav1 from 46.101.235.214 port 48188 Aug 20 22:35:41 ns315508 sshd[5321]: Failed password for invalid user clamav1 from 46.101.235.214 port 48188 ssh2 Aug 20 22:38:32 ns315508 sshd[5343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.235.214 user=root Aug 20 22:38:34 ns315508 sshd[5343]: Failed password for root from 46.101.235.214 port 51724 ssh2 ... |
2019-08-21 07:04:56 |
| 49.50.87.77 | attack | [ssh] SSH attack |
2019-08-21 07:04:32 |
| 179.124.21.10 | attackbotsspam | 2019-08-20 09:46:37 H=(livingwellness.it) [179.124.21.10]:43707 I=[192.147.25.65]:25 F= |
2019-08-21 06:45:31 |
| 36.152.65.206 | attackspambots | Automatic report - Port Scan Attack |
2019-08-21 06:57:14 |
| 23.97.180.45 | attackbots | Aug 20 21:54:19 server sshd[58064]: Failed password for invalid user raju from 23.97.180.45 port 38126 ssh2 Aug 20 22:03:40 server sshd[58971]: Failed password for invalid user lucas from 23.97.180.45 port 53505 ssh2 Aug 20 22:08:36 server sshd[59392]: Failed password for invalid user jenny from 23.97.180.45 port 48653 ssh2 |
2019-08-21 06:52:34 |
| 51.38.230.62 | attackbots | Aug 20 20:25:02 web8 sshd\[10275\]: Invalid user laura from 51.38.230.62 Aug 20 20:25:02 web8 sshd\[10275\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.230.62 Aug 20 20:25:04 web8 sshd\[10275\]: Failed password for invalid user laura from 51.38.230.62 port 41040 ssh2 Aug 20 20:28:56 web8 sshd\[12121\]: Invalid user admin from 51.38.230.62 Aug 20 20:28:56 web8 sshd\[12121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.230.62 |
2019-08-21 06:48:40 |
| 93.97.227.54 | attackbots | Aug 20 21:37:52 bouncer sshd\[1734\]: Invalid user network1 from 93.97.227.54 port 58389 Aug 20 21:37:52 bouncer sshd\[1734\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.97.227.54 Aug 20 21:37:54 bouncer sshd\[1734\]: Failed password for invalid user network1 from 93.97.227.54 port 58389 ssh2 ... |
2019-08-21 06:33:35 |
| 95.110.235.17 | attackspam | Aug 20 04:59:49 tdfoods sshd\[9566\]: Invalid user test from 95.110.235.17 Aug 20 04:59:49 tdfoods sshd\[9566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.110.235.17 Aug 20 04:59:51 tdfoods sshd\[9566\]: Failed password for invalid user test from 95.110.235.17 port 56337 ssh2 Aug 20 05:04:19 tdfoods sshd\[10062\]: Invalid user caja from 95.110.235.17 Aug 20 05:04:19 tdfoods sshd\[10062\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.110.235.17 |
2019-08-21 06:31:58 |
| 178.128.158.113 | attack | Invalid user user from 178.128.158.113 port 41418 |
2019-08-21 06:42:29 |
| 106.12.30.229 | attackspambots | Invalid user fe from 106.12.30.229 port 54236 |
2019-08-21 07:03:56 |
| 130.61.83.71 | attack | Aug 21 00:43:13 srv206 sshd[8371]: Invalid user emil from 130.61.83.71 ... |
2019-08-21 07:03:26 |