城市(city): unknown
省份(region): unknown
国家(country): Hong Kong
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '203.175.12.0 - 203.175.15.255'
% Abuse contact for '203.175.12.0 - 203.175.15.255' is 'abuse@goalnowtech.com'
inetnum: 203.175.12.0 - 203.175.15.255
netname: GAOFENG-HK
descr: GAOFENG NETWORK LIMITED
country: HK
org: ORG-GNL1-AP
admin-c: GNTL2-AP
tech-c: GNTL2-AP
abuse-c: AG835-AP
status: ASSIGNED PORTABLE
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-routes: MAINT-GAOFENG-HK
mnt-irt: IRT-GAOFENG-HK
last-modified: 2024-01-19T11:13:06Z
source: APNIC
irt: IRT-GAOFENG-HK
address: Room A, 3/F., Ying Wai Building, No. 166-170 Apliu Street, Hong Kong Hong Kong 999077
e-mail: abuse@goalnowtech.com
abuse-mailbox: abuse@goalnowtech.com
admin-c: GNTL2-AP
tech-c: GNTL2-AP
auth: # Filtered
remarks: abuse@goalnowtech.com was validated on 2026-03-13
mnt-by: MAINT-GAOFENG-HK
last-modified: 2026-03-13T03:57:19Z
source: APNIC
organisation: ORG-GNL1-AP
org-name: GAOFENG NETWORK LIMITED
org-type: LIR
country: HK
address: Room A, 3/F., Ying Wai Building, No. 166-170 Apliu Street
address: Apliu Street
phone: +852-9888-9995
e-mail: noc@goalnowtech.com
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2024-02-19T12:47:57Z
source: APNIC
role: ABUSE GAOFENGHK
country: ZZ
address: Room A, 3/F., Ying Wai Building, No. 166-170 Apliu Street, Hong Kong Hong Kong 999077
phone: +000000000
e-mail: abuse@goalnowtech.com
admin-c: GNTL2-AP
tech-c: GNTL2-AP
nic-hdl: AG835-AP
remarks: Generated from irt object IRT-GAOFENG-HK
remarks: abuse@goalnowtech.com was validated on 2026-03-13
abuse-mailbox: abuse@goalnowtech.com
mnt-by: APNIC-ABUSE
last-modified: 2026-03-13T03:57:41Z
source: APNIC
role: GOALNOW NETWORK TECHNOLOGY LIMITED ADMINISTRATOR
address: Room A, 3/F., Ying Wai Building, No. 166-170 Apliu Street, Hong Kong Hong Kong 999077
country: HK
phone: +000000000
e-mail: admin@goalnowtech.com
admin-c: GNTL2-AP
tech-c: GNTL2-AP
nic-hdl: GNTL2-AP
notify: admin@goalnowtech.com
mnt-by: MAINT-GAOFENG-HK
last-modified: 2025-01-28T03:02:51Z
source: APNIC
% Information related to '203.175.14.0/24AS152320'
route: 203.175.14.0/24
origin: AS152320
descr: GAOFENG NETWORK LIMITED
A01, 3/F, CHEUNG LUNG, INDUSTRIAL BUILDING
CHEUNG YI STREET
LAI CHI KOK
mnt-by: MAINT-GAOFENG-HK
last-modified: 2024-01-20T15:59:54Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 203.175.14.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43582
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;203.175.14.91. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026051501 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 16 10:58:47 CST 2026
;; MSG SIZE rcvd: 106
Host 91.14.175.203.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 91.14.175.203.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 213.227.70.83 | attack | Jan 7 12:57:07 XXX sshd[19621]: Invalid user test from 213.227.70.83 port 58140 |
2020-01-08 01:29:02 |
| 209.17.96.42 | attackbotsspam | The IP has triggered Cloudflare WAF. CF-Ray: 55145a6c2e81c887 | WAF_Rule_ID: ipr24 | WAF_Kind: firewall | CF_Action: challenge | Country: US | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: notes.skk.moe | User-Agent: Mozilla/5.0 (compatible; Nimbostratus-Bot/v1.3.2; http://cloudsystemnetworks.com) | CF_DC: MIA. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB). |
2020-01-08 01:13:45 |
| 195.238.75.254 | attackspam | Time: Tue Jan 7 09:58:20 2020 -0300 IP: 195.238.75.254 (NL/Netherlands/server.2unboss.today) Failures: 20 (WordPressBruteForcePOST) Interval: 3600 seconds Blocked: Permanent Block |
2020-01-08 01:22:36 |
| 49.233.137.247 | attackbotsspam | Unauthorized connection attempt detected from IP address 49.233.137.247 to port 8088 [J] |
2020-01-08 01:40:10 |
| 35.240.18.171 | attack | Jan 7 16:32:03 solowordpress sshd[13752]: Invalid user zabbix from 35.240.18.171 port 32980 ... |
2020-01-08 01:02:05 |
| 51.75.133.250 | attackbots | Unauthorized connection attempt detected from IP address 51.75.133.250 to port 2220 [J] |
2020-01-08 01:05:13 |
| 178.33.216.187 | attack | Unauthorized connection attempt detected from IP address 178.33.216.187 to port 2220 [J] |
2020-01-08 01:38:22 |
| 78.148.128.25 | attackbotsspam | Unauthorized connection attempt detected from IP address 78.148.128.25 to port 22 [J] |
2020-01-08 01:15:01 |
| 49.206.215.195 | attack | 1578402014 - 01/07/2020 14:00:14 Host: 49.206.215.195/49.206.215.195 Port: 445 TCP Blocked |
2020-01-08 01:10:54 |
| 223.71.167.163 | attackspambots | Unauthorized connection attempt detected from IP address 223.71.167.163 to port 3333 [T] |
2020-01-08 01:10:25 |
| 3.234.2.192 | attack | ... |
2020-01-08 01:05:41 |
| 111.200.52.85 | attackbots | Unauthorized connection attempt detected from IP address 111.200.52.85 to port 22 [T] |
2020-01-08 01:41:37 |
| 218.255.148.182 | attack | Unauthorized connection attempt from IP address 218.255.148.182 on Port 445(SMB) |
2020-01-08 01:17:28 |
| 112.84.61.212 | attackbots | Jan 7 14:00:01 icecube postfix/smtpd[25587]: NOQUEUE: reject: RCPT from unknown[112.84.61.212]: 554 5.7.1 Service unavailable; Client host [112.84.61.212] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/112.84.61.212 / https://www.spamhaus.org/sbl/query/SBLCSS; from= |
2020-01-08 01:34:21 |
| 182.151.196.66 | attackspambots | Unauthorized connection attempt detected from IP address 182.151.196.66 to port 445 [T] |
2020-01-08 01:36:58 |