城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '59.111.0.0 - 59.111.79.255'
% Abuse contact for '59.111.0.0 - 59.111.79.255' is 'sa@corp.netease.com'
inetnum: 59.111.0.0 - 59.111.79.255
netname: Netease-Network
descr: Guangzhou NetEase Computer System Co., Ltd
country: CN
admin-c: ZX3316-AP
tech-c: ZX3316-AP
abuse-c: AC1601-AP
status: ALLOCATED PORTABLE
mnt-by: MAINT-CNNIC-AP
mnt-lower: MAINT-CNNIC-AP
mnt-routes: MAINT-CNNIC-AP
mnt-irt: IRT-Netease-Network-CN
last-modified: 2022-02-17T07:55:35Z
source: APNIC
irt: IRT-Netease-Network-CN
address: NetEase Building No.16 Ke Yun Road,
address: Tianhe Avenue,Guangzhou,Guangdong,China.
e-mail: sa@corp.netease.com
abuse-mailbox: sa@corp.netease.com
auth: # Filtered
admin-c: ZX3316-AP
tech-c: ZX3316-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2021-11-03T07:34:16Z
source: APNIC
role: ABUSE CNNICCN
country: ZZ
address: Beijing, China
phone: +000000000
e-mail: ipas@cnnic.cn
admin-c: IP50-AP
tech-c: IP50-AP
nic-hdl: AC1601-AP
remarks: Generated from irt object IRT-CNNIC-CN
remarks: ipas@cnnic.cn is invalid
abuse-mailbox: ipas@cnnic.cn
mnt-by: APNIC-ABUSE
last-modified: 2025-09-19T17:20:32Z
source: APNIC
person: Zongyi Xu
address: No.5 Siyun Road, Tianhe District, Guangzhou, China
country: CN
phone: +86-20-85105555
e-mail: sa@corp.netease.com
nic-hdl: ZX3316-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2022-08-01T03:00:14Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 59.111.5.225
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36120
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;59.111.5.225. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025100801 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 09 03:10:13 CST 2025
;; MSG SIZE rcvd: 105
Host 225.5.111.59.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 225.5.111.59.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
167.71.201.123 | attackspambots | Aug 3 02:18:59 localhost sshd\[109822\]: Invalid user serv_pv from 167.71.201.123 port 50490 Aug 3 02:18:59 localhost sshd\[109822\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.201.123 Aug 3 02:19:01 localhost sshd\[109822\]: Failed password for invalid user serv_pv from 167.71.201.123 port 50490 ssh2 Aug 3 02:26:17 localhost sshd\[110025\]: Invalid user backupadmin from 167.71.201.123 port 59788 Aug 3 02:26:17 localhost sshd\[110025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.201.123 ... |
2019-08-03 10:38:06 |
200.117.153.38 | attackbots | Brute force attempt |
2019-08-03 10:18:47 |
196.52.43.122 | attack | firewall-block, port(s): 5289/tcp |
2019-08-03 10:07:35 |
193.32.163.123 | attackbots | Aug 2 22:47:16 debian sshd\[1682\]: Invalid user admin from 193.32.163.123 port 56921 Aug 2 22:47:16 debian sshd\[1682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.32.163.123 ... |
2019-08-03 09:55:09 |
5.56.133.132 | attack | 445/tcp 445/tcp [2019-08-02]2pkt |
2019-08-03 10:13:30 |
112.85.42.195 | attack | Aug 3 09:37:49 webhost01 sshd[878]: Failed password for root from 112.85.42.195 port 38332 ssh2 Aug 3 09:37:51 webhost01 sshd[878]: Failed password for root from 112.85.42.195 port 38332 ssh2 ... |
2019-08-03 10:47:02 |
117.41.229.71 | attack | SMB Server BruteForce Attack |
2019-08-03 10:19:17 |
106.52.26.30 | attackspambots | $f2bV_matches_ltvn |
2019-08-03 10:26:56 |
160.16.221.118 | attackbots | Automatic report - SSH Brute-Force Attack |
2019-08-03 09:55:53 |
216.41.63.2 | attack | 445/tcp [2019-08-02]1pkt |
2019-08-03 10:47:46 |
209.97.170.94 | attackbots | Aug 3 05:10:00 server sshd\[13155\]: Invalid user imre from 209.97.170.94 port 53568 Aug 3 05:10:00 server sshd\[13155\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.170.94 Aug 3 05:10:02 server sshd\[13155\]: Failed password for invalid user imre from 209.97.170.94 port 53568 ssh2 Aug 3 05:16:30 server sshd\[11868\]: User root from 209.97.170.94 not allowed because listed in DenyUsers Aug 3 05:16:30 server sshd\[11868\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.170.94 user=root |
2019-08-03 10:21:36 |
77.247.108.152 | attack | 08/02/2019-22:09:41.897239 77.247.108.152 Protocol: 17 ET SCAN Sipvicious User-Agent Detected (friendly-scanner) |
2019-08-03 10:32:48 |
167.114.153.77 | attackbots | frenzy |
2019-08-03 10:42:08 |
148.102.72.66 | attackspam | Invalid user lrioland from 148.102.72.66 port 43116 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.102.72.66 Failed password for invalid user lrioland from 148.102.72.66 port 43116 ssh2 Invalid user test from 148.102.72.66 port 38554 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.102.72.66 |
2019-08-03 10:20:35 |
223.10.167.223 | attackbots | Port Scan: TCP/23 |
2019-08-03 10:48:48 |