城市(city): unknown
省份(region): unknown
国家(country): Singapore
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '163.128.98.0 - 163.128.99.255'
% Abuse contact for '163.128.98.0 - 163.128.99.255' is 'abuse@mail.cyberjetservice.com'
inetnum: 163.128.98.0 - 163.128.99.255
netname: CYBERJETPTELTD-SG
descr: CYBERJET PTE LTD
country: SG
org: ORG-CPL93-AP
admin-c: CPLA69-AP
tech-c: CPLA69-AP
abuse-c: AC2922-AP
status: ALLOCATED PORTABLE
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-lower: MAINT-CYBERJETPTELTD-SG
mnt-routes: MAINT-CYBERJETPTELTD-SG
mnt-irt: IRT-CYBERJETPTELTD-SG
last-modified: 2026-03-23T22:35:16Z
source: APNIC
irt: IRT-CYBERJETPTELTD-SG
address: 73 Ayer Rajah Crescent, Singapore Singapore 139952
e-mail: abuse@mail.cyberjetservice.com
abuse-mailbox: abuse@mail.cyberjetservice.com
admin-c: CPLA69-AP
tech-c: CPLA69-AP
auth: # Filtered
mnt-by: MAINT-CYBERJETPTELTD-SG
last-modified: 2026-03-23T14:17:25Z
source: APNIC
organisation: ORG-CPL93-AP
org-name: CYBERJET PTE LTD
org-type: LIR
country: SG
address: 73 Ayer Rajah Crescent
phone: +65-6047-0237
e-mail: contact@mail.cyberjetservice.com
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2026-02-21T13:24:53Z
source: APNIC
role: ABUSE CYBERJETPTELTDSG
country: ZZ
address: 73 Ayer Rajah Crescent, Singapore Singapore 139952
phone: +000000000
e-mail: abuse@mail.cyberjetservice.com
admin-c: CPLA69-AP
tech-c: CPLA69-AP
nic-hdl: AC2922-AP
remarks: Generated from irt object IRT-CYBERJETPTELTD-SG
abuse-mailbox: abuse@mail.cyberjetservice.com
mnt-by: APNIC-ABUSE
last-modified: 2026-03-23T22:35:16Z
source: APNIC
role: CYBERJET PTE LTD administrator
address: 73 Ayer Rajah Crescent, Singapore Singapore 139952
country: SG
phone: +65-6047-0237
e-mail: abuse@mail.cyberjetservice.com
admin-c: CPLA69-AP
tech-c: CPLA69-AP
nic-hdl: CPLA69-AP
mnt-by: MAINT-CYBERJETPTELTD-SG
last-modified: 2026-03-23T14:17:16Z
source: APNIC
% Information related to '163.128.98.0/23AS154562'
route: 163.128.98.0/23
descr: Private Customer
origin: AS154562
mnt-by: MAINT-CYBERJETPTELTD-SG
last-modified: 2026-03-30T09:01:11Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.128.98.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59698
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;163.128.98.1. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041800 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 18 23:18:26 CST 2026
;; MSG SIZE rcvd: 105
Host 1.98.128.163.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 1.98.128.163.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 130.105.68.165 | attackbotsspam | Sep 6 05:47:39 lnxweb61 sshd[17113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.105.68.165 |
2019-09-06 20:55:04 |
| 1.24.226.226 | attackbots | SSH bruteforce (Triggered fail2ban) Sep 6 05:48:10 dev1 sshd[175436]: error: maximum authentication attempts exceeded for invalid user admin from 1.24.226.226 port 53494 ssh2 [preauth] Sep 6 05:48:10 dev1 sshd[175436]: Disconnecting invalid user admin 1.24.226.226 port 53494: Too many authentication failures [preauth] |
2019-09-06 20:38:14 |
| 49.88.112.71 | attackspam | Reported by AbuseIPDB proxy server. |
2019-09-06 20:59:11 |
| 95.179.146.162 | attackspam | 2019-09-06T07:02:18Z - RDP login failed multiple times. (95.179.146.162) |
2019-09-06 20:33:33 |
| 213.202.211.200 | attackspam | Sep 6 14:34:01 localhost sshd\[15291\]: Invalid user gitolite from 213.202.211.200 port 55350 Sep 6 14:34:01 localhost sshd\[15291\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.202.211.200 Sep 6 14:34:04 localhost sshd\[15291\]: Failed password for invalid user gitolite from 213.202.211.200 port 55350 ssh2 |
2019-09-06 20:41:42 |
| 191.235.91.156 | attack | Sep 6 08:58:01 Tower sshd[1794]: Connection from 191.235.91.156 port 46146 on 192.168.10.220 port 22 Sep 6 08:58:09 Tower sshd[1794]: Invalid user odoo from 191.235.91.156 port 46146 Sep 6 08:58:09 Tower sshd[1794]: error: Could not get shadow information for NOUSER Sep 6 08:58:09 Tower sshd[1794]: Failed password for invalid user odoo from 191.235.91.156 port 46146 ssh2 Sep 6 08:58:09 Tower sshd[1794]: Received disconnect from 191.235.91.156 port 46146:11: Bye Bye [preauth] Sep 6 08:58:09 Tower sshd[1794]: Disconnected from invalid user odoo 191.235.91.156 port 46146 [preauth] |
2019-09-06 20:59:48 |
| 201.39.233.40 | attackbots | Sep 6 14:17:27 plex sshd[20848]: Invalid user nagios from 201.39.233.40 port 48667 |
2019-09-06 20:34:28 |
| 157.230.132.73 | attackspambots | 2019-09-06T08:41:12.479056abusebot-3.cloudsearch.cf sshd\[24961\]: Invalid user jenkins from 157.230.132.73 port 40726 |
2019-09-06 20:33:54 |
| 104.248.175.232 | attack | Sep 6 07:06:02 www2 sshd\[39486\]: Invalid user webster from 104.248.175.232Sep 6 07:06:04 www2 sshd\[39486\]: Failed password for invalid user webster from 104.248.175.232 port 36026 ssh2Sep 6 07:10:44 www2 sshd\[40008\]: Invalid user user from 104.248.175.232 ... |
2019-09-06 21:04:30 |
| 165.22.218.93 | attack | 2019-09-06T13:07:25.087833abusebot-5.cloudsearch.cf sshd\[8919\]: Invalid user gpadmin from 165.22.218.93 port 45661 |
2019-09-06 21:13:54 |
| 37.193.120.109 | attackbotsspam | ssh failed login |
2019-09-06 20:49:38 |
| 60.12.8.241 | attackspambots | Sep 6 13:42:12 srv206 sshd[21656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.12.8.241 user=root Sep 6 13:42:14 srv206 sshd[21656]: Failed password for root from 60.12.8.241 port 8452 ssh2 Sep 6 13:46:04 srv206 sshd[21714]: Invalid user git from 60.12.8.241 ... |
2019-09-06 20:43:17 |
| 132.232.4.33 | attack | Sep 6 01:23:13 eddieflores sshd\[1696\]: Invalid user teste from 132.232.4.33 Sep 6 01:23:13 eddieflores sshd\[1696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.4.33 Sep 6 01:23:16 eddieflores sshd\[1696\]: Failed password for invalid user teste from 132.232.4.33 port 50028 ssh2 Sep 6 01:29:11 eddieflores sshd\[2202\]: Invalid user postgres from 132.232.4.33 Sep 6 01:29:11 eddieflores sshd\[2202\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.4.33 |
2019-09-06 20:58:12 |
| 61.69.78.78 | attackspam | Sep 6 14:15:45 localhost sshd\[13509\]: Invalid user ftpuser from 61.69.78.78 port 42528 Sep 6 14:15:45 localhost sshd\[13509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.69.78.78 Sep 6 14:15:47 localhost sshd\[13509\]: Failed password for invalid user ftpuser from 61.69.78.78 port 42528 ssh2 |
2019-09-06 20:28:41 |
| 165.22.6.195 | attackspambots | Sep 6 02:30:57 php1 sshd\[26980\]: Invalid user steam from 165.22.6.195 Sep 6 02:30:57 php1 sshd\[26980\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.6.195 Sep 6 02:30:59 php1 sshd\[26980\]: Failed password for invalid user steam from 165.22.6.195 port 38310 ssh2 Sep 6 02:35:15 php1 sshd\[27321\]: Invalid user user22 from 165.22.6.195 Sep 6 02:35:15 php1 sshd\[27321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.6.195 |
2019-09-06 20:44:25 |