城市(city): Tsuen Wan
省份(region): Tsuen Wan New Territories
国家(country): Hong Kong
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 50.7.0.0 - 50.7.255.255
CIDR: 50.7.0.0/16
NetName: FDCSERVERS
NetHandle: NET-50-7-0-0-1
Parent: NET50 (NET-50-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: FDCservers.net (FDCSE)
RegDate: 2010-10-18
Updated: 2018-10-12
Ref: https://rdap.arin.net/registry/ip/50.7.0.0
OrgName: FDCservers.net
OrgId: FDCSE
Address: 175 Main St. #1363
City: Destin
StateProv: FL
PostalCode: 32540
Country: US
RegDate: 2003-05-20
Updated: 2025-08-08
Ref: https://rdap.arin.net/registry/entity/FDCSE
ReferralServer: rwhois://rwhois.fdcservers.net:4321
OrgNOCHandle: NETWO10401-ARIN
OrgNOCName: Network Department
OrgNOCPhone: +1-312-423-6675
OrgNOCEmail: network@fdcservers.net
OrgNOCRef: https://rdap.arin.net/registry/entity/NETWO10401-ARIN
OrgTechHandle: NETWO10401-ARIN
OrgTechName: Network Department
OrgTechPhone: +1-312-423-6675
OrgTechEmail: network@fdcservers.net
OrgTechRef: https://rdap.arin.net/registry/entity/NETWO10401-ARIN
OrgRoutingHandle: NETWO10401-ARIN
OrgRoutingName: Network Department
OrgRoutingPhone: +1-312-423-6675
OrgRoutingEmail: network@fdcservers.net
OrgRoutingRef: https://rdap.arin.net/registry/entity/NETWO10401-ARIN
OrgAbuseHandle: ABUSE438-ARIN
OrgAbuseName: ABUSE department
OrgAbusePhone: +1-312-423-6675
OrgAbuseEmail: abuse@fdcservers.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE438-ARIN
# end
# start
NetRange: 50.7.250.0 - 50.7.251.255
CIDR: 50.7.250.0/23
NetName: FDCSERVERS-HONGKONG
NetHandle: NET-50-7-250-0-1
Parent: FDCSERVERS (NET-50-7-0-0-1)
NetType: Reallocated
OriginAS:
Organization: FDCservers.net (FDCSE-28)
RegDate: 2019-10-14
Updated: 2021-11-19
Ref: https://rdap.arin.net/registry/ip/50.7.250.0
OrgName: FDCservers.net
OrgId: FDCSE-28
Address: 3 Shing Yiu Street
City: Tsuen Wan
StateProv: KWAI CHUNG
PostalCode: 999077
Country: HK
RegDate: 2019-10-14
Updated: 2025-08-08
Ref: https://rdap.arin.net/registry/entity/FDCSE-28
OrgTechHandle: NETWO10401-ARIN
OrgTechName: Network Department
OrgTechPhone: +1-312-423-6675
OrgTechEmail: network@fdcservers.net
OrgTechRef: https://rdap.arin.net/registry/entity/NETWO10401-ARIN
OrgNOCHandle: NETWO10401-ARIN
OrgNOCName: Network Department
OrgNOCPhone: +1-312-423-6675
OrgNOCEmail: network@fdcservers.net
OrgNOCRef: https://rdap.arin.net/registry/entity/NETWO10401-ARIN
OrgAbuseHandle: ABUSE438-ARIN
OrgAbuseName: ABUSE department
OrgAbusePhone: +1-312-423-6675
OrgAbuseEmail: abuse@fdcservers.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE438-ARIN
OrgRoutingHandle: NETWO10401-ARIN
OrgRoutingName: Network Department
OrgRoutingPhone: +1-312-423-6675
OrgRoutingEmail: network@fdcservers.net
OrgRoutingRef: https://rdap.arin.net/registry/entity/NETWO10401-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
Found a referral to rwhois.fdcservers.net:4321.
%rwhois V-1.5:003fff:00 rwhois.fdcservers.net (by Network Solutions, Inc. V-1.5.9.6)
network:Auth-Area:50.7.0.0/16
network:Class-Name:network
network:OrgName:FDCservers.net
network:OrgID;I:FDCSE
network:Address:141 W Jackson Blvd. #1135
network:City:Chicago
network:StateProv:IL
network:PostalCode:60604
network:Country:US
network:NetRange:50.7.0.0 - 50.7.255.255
network:CIDR:50.7.0.0/16
network:NetName:FDCSERVERS
network:OrgAbuseHandle:ABUSE438-ARIN
network:OrgAbuseName:Abuse Department
network:OrgAbusePhone:+1-312-423-6675
network:OrgAbuseEmail:abuse@fdcservers.net
network:OrgNOCHandle:ABUSE438-ARIN
network:OrgNOCName:Tech Support
network:OrgNOCPhone:+1-312-423-6675
network:OrgNOCEmail:abuse@fdcservers.net
network:OrgTechHandle:ABUSE438-ARIN
network:OrgTechName:Tech Support
network:OrgTechPhone:+1-312-423-6675
network:OrgTechEmail:abuse@fdcservers.net
%ok
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.7.250.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1506
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;50.7.250.164. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025110300 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Nov 03 22:19:17 CST 2025
;; MSG SIZE rcvd: 105
Host 164.250.7.50.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 164.250.7.50.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 41.249.250.209 | attack | Jan 29 15:29:46 eddieflores sshd\[14997\]: Invalid user qw from 41.249.250.209 Jan 29 15:29:46 eddieflores sshd\[14997\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.249.250.209 Jan 29 15:29:47 eddieflores sshd\[14997\]: Failed password for invalid user qw from 41.249.250.209 port 44712 ssh2 Jan 29 15:32:40 eddieflores sshd\[15378\]: Invalid user duke from 41.249.250.209 Jan 29 15:32:40 eddieflores sshd\[15378\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.249.250.209 |
2020-01-30 09:47:03 |
| 74.82.47.10 | attackspam | Scanning random ports - tries to find possible vulnerable services |
2020-01-30 09:35:36 |
| 111.206.222.34 | attackbotsspam | The IP has triggered Cloudflare WAF. CF-Ray: 558ec365dd30992f | WAF_Rule_ID: 100204 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: whitelist | Protocol: HTTP/1.1 | Method: GET | Host: img.skk.moe | User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13B143 Safari/601.1 (compatible; Baiduspider-render/2.0; +http://www.baidu.com/search/spider.html) | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB). |
2020-01-30 09:32:49 |
| 37.49.227.109 | attack | Unauthorized connection attempt detected from IP address 37.49.227.109 to port 81 [J] |
2020-01-30 09:14:46 |
| 218.110.195.2 | attackspam | TCP Port Scanning |
2020-01-30 09:47:58 |
| 182.87.29.241 | attackbotsspam | Unauthorized connection attempt detected from IP address 182.87.29.241 to port 6656 [T] |
2020-01-30 08:59:46 |
| 123.156.180.109 | attackbotsspam | Unauthorized connection attempt detected from IP address 123.156.180.109 to port 6656 [T] |
2020-01-30 09:03:35 |
| 14.230.138.156 | attackspambots | Unauthorized connection attempt from IP address 14.230.138.156 on Port 445(SMB) |
2020-01-30 09:42:52 |
| 117.66.87.16 | attackspam | Unauthorized connection attempt detected from IP address 117.66.87.16 to port 6656 [T] |
2020-01-30 09:06:38 |
| 68.183.31.138 | attackbots | 11300/tcp [2020-01-29]1pkt |
2020-01-30 09:40:10 |
| 32.220.54.46 | attackspam | Jan 30 00:53:00 game-panel sshd[30819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=32.220.54.46 Jan 30 00:53:02 game-panel sshd[30819]: Failed password for invalid user punya from 32.220.54.46 port 45701 ssh2 Jan 30 00:57:44 game-panel sshd[31072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=32.220.54.46 |
2020-01-30 09:30:47 |
| 49.86.176.103 | attackbots | Unauthorized connection attempt detected from IP address 49.86.176.103 to port 6656 [T] |
2020-01-30 09:12:58 |
| 222.186.31.135 | attack | Jan 30 01:43:54 * sshd[18110]: Failed password for root from 222.186.31.135 port 37670 ssh2 Jan 30 01:43:56 * sshd[18110]: Failed password for root from 222.186.31.135 port 37670 ssh2 |
2020-01-30 08:56:53 |
| 171.34.179.95 | attack | Unauthorized connection attempt detected from IP address 171.34.179.95 to port 5269 [T] |
2020-01-30 09:00:06 |
| 49.67.108.205 | attack | Unauthorized connection attempt detected from IP address 49.67.108.205 to port 6656 [T] |
2020-01-30 09:13:35 |