城市(city): Hong Kong
省份(region): unknown
国家(country): Hong Kong
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
NetRange: 165.154.0.0 - 165.154.255.255
CIDR: 165.154.0.0/16
NetName: APNIC
NetHandle: NET-165-154-0-0-1
Parent: NET165 (NET-165-0-0-0-0)
NetType: Early Registrations, Transferred to APNIC
OriginAS:
Organization: Asia Pacific Network Information Centre (APNIC)
RegDate: 2021-02-16
Updated: 2021-02-16
Ref: https://rdap.arin.net/registry/ip/165.154.0.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois://whois.apnic.net
OrgName: Asia Pacific Network Information Centre
OrgId: APNIC
Address: PO Box 3646
City: South Brisbane
StateProv: QLD
PostalCode: 4101
Country: AU
RegDate:
Updated: 2012-01-24
Ref: https://rdap.arin.net/registry/entity/APNIC
ReferralServer: whois://whois.apnic.net
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
OrgTechHandle: AWC12-ARIN
OrgTechName: APNIC Whois Contact
OrgTechPhone: +61 7 3858 3188
OrgTechEmail: search-apnic-not-arin@apnic.net
OrgTechRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
OrgAbuseHandle: AWC12-ARIN
OrgAbuseName: APNIC Whois Contact
OrgAbusePhone: +61 7 3858 3188
OrgAbuseEmail: search-apnic-not-arin@apnic.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.apnic.net.
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '165.154.224.0 - 165.154.255.255'
% Abuse contact for '165.154.224.0 - 165.154.255.255' is 'enquiry@scloud.sg'
inetnum: 165.154.224.0 - 165.154.255.255
netname: SCLOUDPTELTD-SG
descr: Scloud Pte Ltd t/a Scloud Pte Ltd
country: SG
org: ORG-SPL64-AP
admin-c: SPLA52-AP
tech-c: SPLA52-AP
status: ALLOCATED PORTABLE
abuse-c: AS3102-AP
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-lower: MAINT-SCLOUDPTELTD-SG
mnt-routes: MAINT-SCLOUDPTELTD-SG
mnt-irt: IRT-SCLOUDPTELTD-SG
last-modified: 2021-09-14T05:37:01Z
source: APNIC
irt: IRT-SCLOUDPTELTD-SG
address: BLK71 Ayer Rajah Crescent
e-mail: enquiry@scloud.sg
abuse-mailbox: enquiry@scloud.sg
admin-c: SPLA52-AP
tech-c: SPLA52-AP
auth: # Filtered
remarks: enquiry@scloud.sg was validated on 2025-07-01
mnt-by: MAINT-SCLOUDPTELTD-SG
last-modified: 2025-09-04T07:47:47Z
source: APNIC
organisation: ORG-SPL64-AP
org-name: Scloud Pte Ltd
org-type: LIR
country: SG
address: 160 Robinson Rd, SBF Center, # 14-01
phone: +65 65920936
fax-no: +6562920937
e-mail: enquiry@scloud.sg
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:18:26Z
source: APNIC
role: ABUSE SCLOUDPTELTDSG
country: ZZ
address: BLK71 Ayer Rajah Crescent # 05-24/25/26
phone: +000000000
e-mail: enquiry@scloud.sg
admin-c: SPLA52-AP
tech-c: SPLA52-AP
nic-hdl: AS3102-AP
remarks: Generated from irt object IRT-SCLOUDPTELTD-SG
remarks: enquiry@scloud.sg was validated on 2025-07-01
abuse-mailbox: enquiry@scloud.sg
mnt-by: APNIC-ABUSE
last-modified: 2025-07-01T11:09:07Z
source: APNIC
role: Scloud Pte Ltd administrator
address: 160 Robinson Rd, SBF Center, #14-01, Singapore Singapore 068914
country: SG
phone: +65-65920936
e-mail: tech@scloud.sg
admin-c: SPLA52-AP
tech-c: SPLA52-AP
nic-hdl: SPLA52-AP
notify: tech@scloud.sg
mnt-by: MAINT-SCLOUDPTELTD-SG
last-modified: 2021-09-14T05:36:49Z
source: APNIC
% Information related to '165.154.245.0/24AS142002'
route: 165.154.245.0/24
origin: AS142002
descr: Scloud Pte Ltd
160 Robinson Rd, SBF Center, #14-01
mnt-by: MAINT-SCLOUDPTELTD-SG
last-modified: 2021-04-27T02:36:29Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 165.154.245.177
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42135
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;165.154.245.177. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025110700 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 07 16:12:16 CST 2025
;; MSG SIZE rcvd: 108
b'Host 177.245.154.165.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 165.154.245.177.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 191.102.120.69 | attackbots | 1580014310 - 01/26/2020 05:51:50 Host: 191.102.120.69/191.102.120.69 Port: 445 TCP Blocked |
2020-01-26 15:02:02 |
| 34.87.68.50 | attack | Unauthorized connection attempt detected from IP address 34.87.68.50 to port 2220 [J] |
2020-01-26 15:15:18 |
| 80.211.59.160 | attack | Unauthorized connection attempt detected from IP address 80.211.59.160 to port 2220 [J] |
2020-01-26 15:27:59 |
| 190.62.210.233 | attackspambots | Email rejected due to spam filtering |
2020-01-26 15:33:39 |
| 82.149.13.45 | attackspam | Jan 26 05:51:35 host sshd[51453]: Invalid user user from 82.149.13.45 port 33922 ... |
2020-01-26 15:10:52 |
| 167.114.36.165 | attackbotsspam | Jan 26 05:47:57 SilenceServices sshd[19125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.36.165 Jan 26 05:47:58 SilenceServices sshd[19125]: Failed password for invalid user wilfried from 167.114.36.165 port 58504 ssh2 Jan 26 05:50:44 SilenceServices sshd[21615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.36.165 |
2020-01-26 15:35:07 |
| 124.235.206.130 | attackspambots | Invalid user melk from 124.235.206.130 port 39055 |
2020-01-26 15:23:28 |
| 182.61.105.127 | attack | Automatic report - SSH Brute-Force Attack |
2020-01-26 15:34:00 |
| 123.231.44.71 | attackbotsspam | Unauthorized connection attempt detected from IP address 123.231.44.71 to port 2220 [J] |
2020-01-26 15:24:18 |
| 3.12.79.30 | attack | Jan 26 07:53:28 vps691689 sshd[28903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.12.79.30 Jan 26 07:53:30 vps691689 sshd[28903]: Failed password for invalid user ftpuser from 3.12.79.30 port 51784 ssh2 ... |
2020-01-26 15:03:45 |
| 158.69.70.163 | attackbots | Jan 26 07:29:10 MK-Soft-VM8 sshd[5776]: Failed password for root from 158.69.70.163 port 57414 ssh2 ... |
2020-01-26 15:08:02 |
| 49.149.105.107 | attackspambots | 1580014307 - 01/26/2020 05:51:47 Host: 49.149.105.107/49.149.105.107 Port: 445 TCP Blocked |
2020-01-26 15:04:18 |
| 94.177.240.4 | attackspam | Jan 25 20:59:57 eddieflores sshd\[4533\]: Invalid user mar from 94.177.240.4 Jan 25 20:59:57 eddieflores sshd\[4533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.240.4 Jan 25 20:59:59 eddieflores sshd\[4533\]: Failed password for invalid user mar from 94.177.240.4 port 34706 ssh2 Jan 25 21:03:16 eddieflores sshd\[4890\]: Invalid user infoweb from 94.177.240.4 Jan 25 21:03:16 eddieflores sshd\[4890\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.240.4 |
2020-01-26 15:16:55 |
| 218.92.0.138 | attackspam | Jan 26 08:14:43 legacy sshd[32205]: Failed password for root from 218.92.0.138 port 36127 ssh2 Jan 26 08:14:55 legacy sshd[32205]: error: maximum authentication attempts exceeded for root from 218.92.0.138 port 36127 ssh2 [preauth] Jan 26 08:15:01 legacy sshd[32217]: Failed password for root from 218.92.0.138 port 64341 ssh2 ... |
2020-01-26 15:15:55 |
| 142.93.211.52 | attack | Jan 26 07:52:14 MK-Soft-Root2 sshd[30865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.211.52 Jan 26 07:52:17 MK-Soft-Root2 sshd[30865]: Failed password for invalid user system from 142.93.211.52 port 52342 ssh2 ... |
2020-01-26 14:59:46 |