城市(city): Singapore
省份(region): unknown
国家(country): Singapore
运营商(isp): StarHub
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '202.156.0.0 - 202.156.255.255'
% Abuse contact for '202.156.0.0 - 202.156.255.255' is 'abuse@starhub.com'
inetnum: 202.156.0.0 - 202.156.255.255
netname: SGCABLEVISION-SG
descr: StarHub Cable Vision Ltd
descr: Singapore Broadband Access Provider
country: SG
org: ORG-SCVL1-AP
admin-c: ACS7-AP
tech-c: ACS7-AP
abuse-c: AS2737-AP
status: ALLOCATED PORTABLE
mnt-by: APNIC-HM
mnt-lower: MAINT-SG-SCV
mnt-routes: MAINT-SG-SCV
mnt-irt: IRT-SGCABLEVISION-SG
last-modified: 2020-08-26T13:01:23Z
source: APNIC
irt: IRT-SGCABLEVISION-SG
address: StarHub Ltd 67 Ubi Avenue 1 Singapore 408942
e-mail: cmts-ops@starhub.com
abuse-mailbox: abuse@starhub.com
admin-c: ACS7-AP
tech-c: ACS7-AP
auth: # Filtered
remarks: abuse@starhub.com was validated on 2025-10-01
remarks: cmts-ops@starhub.com is invalid
mnt-by: MAINT-SG-SCV
last-modified: 2026-02-04T13:08:45Z
source: APNIC
organisation: ORG-SCVL1-AP
org-name: StarHub Cable Vision Ltd
org-type: LIR
country: SG
address: 67 Ubi Avenue 1
address: # 05-01
address: StarHub Green
phone: +65-68255000
fax-no: +65-68206008
e-mail: apnic-scv@starhub.com
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:14:44Z
source: APNIC
role: APNIC Contact - SCV
address: StarHub Ltd
67 Ubi Avenue 1
Singapore 408942
country: SG
phone: +65-6825-0000
e-mail: apnic-scv@starhub.com
admin-c: ACS7-AP
tech-c: ACS7-AP
nic-hdl: ACS7-AP
remarks: For any abuse matter, pls report to abuse@starhub.com.
abuse-mailbox: abuse@starhub.com
mnt-by: MAINT-SG-SCV
last-modified: 2019-04-30T00:15:01Z
source: APNIC
role: ABUSE SGCABLEVISIONSG
country: ZZ
address: StarHub Ltd 67 Ubi Avenue 1 Singapore 408942
phone: +000000000
e-mail: cmts-ops@starhub.com
admin-c: ACS7-AP
tech-c: ACS7-AP
nic-hdl: AS2737-AP
remarks: Generated from irt object IRT-SGCABLEVISION-SG
remarks: abuse@starhub.com was validated on 2025-10-01
remarks: cmts-ops@starhub.com is invalid
abuse-mailbox: abuse@starhub.com
mnt-by: APNIC-ABUSE
last-modified: 2026-02-04T13:09:35Z
source: APNIC
% Information related to '202.156.27.0/24AS4657'
route: 202.156.27.0/24
origin: AS4657
descr: StarHub Cable Vision Ltd
67 Ubi Avenue 1
#05-01
StarHub Green
mnt-by: MAINT-SG-SCV
last-modified: 2021-07-22T05:32:41Z
source: APNIC
% Information related to '202.156.27.0/24AS55430'
route: 202.156.27.0/24
origin: AS55430
descr: StarHub Cable Vision Ltd
67 Ubi Avenue 1
#05-01
StarHub Green
mnt-by: MAINT-SG-SCV
last-modified: 2018-12-13T17:56:53Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.156.27.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58389
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;202.156.27.103. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026022801 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 28 22:41:47 CST 2026
;; MSG SIZE rcvd: 107
103.27.156.202.in-addr.arpa domain name pointer 103.27.156.202.starhub.net.sg.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
103.27.156.202.in-addr.arpa name = 103.27.156.202.starhub.net.sg.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 111.231.112.36 | attackspam | Jul 10 22:02:20 meumeu sshd[8651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.112.36 Jul 10 22:02:21 meumeu sshd[8651]: Failed password for invalid user sinusbot from 111.231.112.36 port 45366 ssh2 Jul 10 22:05:30 meumeu sshd[9324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.112.36 Jul 10 22:05:32 meumeu sshd[9324]: Failed password for invalid user sophie from 111.231.112.36 port 48692 ssh2 ... |
2019-07-11 07:27:35 |
| 14.167.62.190 | attackbotsspam | Unauthorized connection attempt from IP address 14.167.62.190 on Port 445(SMB) |
2019-07-11 07:09:54 |
| 37.114.139.195 | attackspam | Jul 10 22:04:09 srv-4 sshd\[13051\]: Invalid user admin from 37.114.139.195 Jul 10 22:04:09 srv-4 sshd\[13051\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.114.139.195 Jul 10 22:04:11 srv-4 sshd\[13051\]: Failed password for invalid user admin from 37.114.139.195 port 49088 ssh2 ... |
2019-07-11 07:28:21 |
| 174.138.13.170 | attackspambots | Jul 10 19:16:40 MK-Soft-VM5 sshd\[12343\]: Invalid user admin from 174.138.13.170 port 33294 Jul 10 19:16:40 MK-Soft-VM5 sshd\[12343\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.13.170 Jul 10 19:16:43 MK-Soft-VM5 sshd\[12343\]: Failed password for invalid user admin from 174.138.13.170 port 33294 ssh2 ... |
2019-07-11 07:32:47 |
| 198.199.122.234 | attackspambots | Jul 10 22:31:10 MainVPS sshd[30321]: Invalid user bill from 198.199.122.234 port 42487 Jul 10 22:31:10 MainVPS sshd[30321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.122.234 Jul 10 22:31:10 MainVPS sshd[30321]: Invalid user bill from 198.199.122.234 port 42487 Jul 10 22:31:12 MainVPS sshd[30321]: Failed password for invalid user bill from 198.199.122.234 port 42487 ssh2 Jul 10 22:32:42 MainVPS sshd[30419]: Invalid user tcpdump from 198.199.122.234 port 51174 ... |
2019-07-11 06:49:48 |
| 193.112.4.36 | attack | Jul 10 20:20:19 debian sshd\[9490\]: Invalid user itadmin from 193.112.4.36 port 44462 Jul 10 20:20:19 debian sshd\[9490\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.4.36 ... |
2019-07-11 07:25:46 |
| 193.201.224.59 | attackbotsspam | lorsewill@outlook.com 193.201.224.59 report on conditions of Durango stylish household goods |
2019-07-11 07:21:01 |
| 159.89.96.203 | attack | Jul 10 21:04:42 core01 sshd\[32661\]: Invalid user userftp from 159.89.96.203 port 42340 Jul 10 21:04:42 core01 sshd\[32661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.96.203 ... |
2019-07-11 06:48:14 |
| 178.128.241.99 | attackspam | Jul 10 21:45:08 mail sshd[23023]: Invalid user admin from 178.128.241.99 Jul 10 21:45:08 mail sshd[23023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.241.99 Jul 10 21:45:08 mail sshd[23023]: Invalid user admin from 178.128.241.99 Jul 10 21:45:10 mail sshd[23023]: Failed password for invalid user admin from 178.128.241.99 port 38736 ssh2 Jul 10 21:48:12 mail sshd[25056]: Invalid user admin from 178.128.241.99 ... |
2019-07-11 07:13:51 |
| 193.169.252.174 | attackbotsspam | Brute force attack stopped by firewall |
2019-07-11 07:18:44 |
| 68.64.61.11 | attack | Jul 10 18:55:37 plusreed sshd[27427]: Invalid user edu from 68.64.61.11 Jul 10 18:55:37 plusreed sshd[27427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.64.61.11 Jul 10 18:55:37 plusreed sshd[27427]: Invalid user edu from 68.64.61.11 Jul 10 18:55:39 plusreed sshd[27427]: Failed password for invalid user edu from 68.64.61.11 port 51873 ssh2 Jul 10 18:57:29 plusreed sshd[28297]: Invalid user csc from 68.64.61.11 ... |
2019-07-11 07:05:22 |
| 218.4.196.178 | attackspambots | Jul 10 21:04:43 dev sshd\[22573\]: Invalid user openfire from 218.4.196.178 port 33208 Jul 10 21:04:43 dev sshd\[22573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.4.196.178 ... |
2019-07-11 06:47:30 |
| 157.55.39.110 | attackspam | Automatic report - Web App Attack |
2019-07-11 06:53:50 |
| 151.80.60.151 | attackspambots | Jul 10 19:04:20 unicornsoft sshd\[26276\]: Invalid user novo from 151.80.60.151 Jul 10 19:04:21 unicornsoft sshd\[26276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.60.151 Jul 10 19:04:22 unicornsoft sshd\[26276\]: Failed password for invalid user novo from 151.80.60.151 port 46666 ssh2 |
2019-07-11 07:12:13 |
| 92.63.194.70 | attackspambots | RDP brute forcing (d) |
2019-07-11 07:05:03 |