城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '59.82.0.0 - 59.82.255.255'
% Abuse contact for '59.82.0.0 - 59.82.255.255' is 'didong.jc@alibaba-inc.com'
inetnum: 59.82.0.0 - 59.82.255.255
netname: ALIBABA-CN-NET
descr: Hangzhou Alibaba Advertising Co.,Ltd.
descr: No.699, Wangshang RD., Hangzhou, China
country: CN
admin-c: ZM678-AP
tech-c: ZM877-AP
tech-c: ZM876-AP
abuse-c: AC1601-AP
status: ALLOCATED PORTABLE
mnt-by: MAINT-CNNIC-AP
mnt-irt: IRT-ALIBABA-CN-NET-CN
mnt-lower: MAINT-CNNIC-AP
mnt-routes: MAINT-CNNIC-AP
last-modified: 2023-11-28T00:58:21Z
source: APNIC
irt: IRT-ALIBABA-CN-NET-CN
address: No.699, Wangshang RD., Hangzhou, China
e-mail: didong.jc@alibaba-inc.com
abuse-mailbox: didong.jc@alibaba-inc.com
auth: # Filtered
admin-c: ZM678-AP
tech-c: ZM678-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2021-09-05T23:38:38Z
source: APNIC
role: ABUSE CNNICCN
country: ZZ
address: Beijing, China
phone: +000000000
e-mail: ipas@cnnic.cn
admin-c: IP50-AP
tech-c: IP50-AP
nic-hdl: AC1601-AP
remarks: Generated from irt object IRT-CNNIC-CN
remarks: ipas@cnnic.cn is invalid
abuse-mailbox: ipas@cnnic.cn
mnt-by: APNIC-ABUSE
last-modified: 2025-09-19T17:20:32Z
source: APNIC
person: Shuo Yu
address: 5F, Builing D, the West Lake International Plaza of S&T
address: No.391 Wen'er Road, Hangzhou City
address: Zhejiang, China, 310099
country: CN
phone: +86-0571-85022600
e-mail: anti-spam@list.alibaba-inc.com
nic-hdl: ZM678-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2021-04-13T23:21:57Z
source: APNIC
person: security trouble
e-mail: abuse@alibaba-inc.com
address: 5th,floor,Building D,the West Lake International Plaza of S&T,391#Wen??r Road
address: Hangzhou, Zhejiang, China
phone: +86-0571-85022600
country: CN
mnt-by: MAINT-CNNIC-AP
nic-hdl: ZM876-AP
last-modified: 2025-07-01T07:06:11Z
source: APNIC
person: Guowei Pan
address: 5F, Builing D, the West Lake International Plaza of S&T
address: No.391 Wen'er Road, Hangzhou City
address: Zhejiang, China, 310099
country: CN
phone: +86-0571-85022088-30763
fax-no: +86-0571-85022600
e-mail: abuse@alibaba-inc.com
nic-hdl: ZM877-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2025-07-01T07:05:46Z
source: APNIC
% Information related to '59.82.83.0/24AS37963'
route: 59.82.83.0/24
origin: AS37963
descr: China Internet Network Information Center
Floor1, Building No.1 C/-Chinese Academy of Sciences
4, South 4th Street
Haidian District,
mnt-by: MAINT-CNNIC-AP
last-modified: 2020-02-18T01:17:28Z
source: APNIC
% Information related to '59.82.83.0/24AS45102'
route: 59.82.83.0/24
origin: AS45102
descr: China Internet Network Information Center
Floor1, Building No.1 C/-Chinese Academy of Sciences
4, South 4th Street
Haidian District,
mnt-by: MAINT-CNNIC-AP
last-modified: 2020-02-18T01:19:20Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 59.82.83.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3717
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;59.82.83.22. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025102301 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 24 12:00:50 CST 2025
;; MSG SIZE rcvd: 104
Host 22.83.82.59.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 22.83.82.59.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 182.61.5.188 | attackbots | Dec 10 12:30:16 ahost sshd[5079]: Invalid user gil from 182.61.5.188 Dec 10 12:30:16 ahost sshd[5079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.5.188 Dec 10 12:30:18 ahost sshd[5079]: Failed password for invalid user gil from 182.61.5.188 port 49856 ssh2 Dec 10 12:30:18 ahost sshd[5079]: Received disconnect from 182.61.5.188: 11: Bye Bye [preauth] Dec 10 12:43:00 ahost sshd[9693]: Invalid user build from 182.61.5.188 Dec 10 12:43:00 ahost sshd[9693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.5.188 Dec 10 12:43:02 ahost sshd[9693]: Failed password for invalid user build from 182.61.5.188 port 40004 ssh2 Dec 10 12:43:02 ahost sshd[9693]: Received disconnect from 182.61.5.188: 11: Bye Bye [preauth] Dec 10 12:49:53 ahost sshd[11422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.5.188 user=r.r Dec 10 12:49:55 ahost ssh........ ------------------------------ |
2019-12-11 16:29:49 |
| 139.199.164.21 | attackspambots | Dec 11 08:44:36 sso sshd[4407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.164.21 Dec 11 08:44:37 sso sshd[4407]: Failed password for invalid user guest from 139.199.164.21 port 59554 ssh2 ... |
2019-12-11 16:42:20 |
| 222.186.175.181 | attack | Dec 11 05:27:18 firewall sshd[13204]: Failed password for root from 222.186.175.181 port 64566 ssh2 Dec 11 05:27:22 firewall sshd[13204]: Failed password for root from 222.186.175.181 port 64566 ssh2 Dec 11 05:27:25 firewall sshd[13204]: Failed password for root from 222.186.175.181 port 64566 ssh2 ... |
2019-12-11 16:29:29 |
| 183.82.121.34 | attackbots | detected by Fail2Ban |
2019-12-11 16:45:35 |
| 101.231.124.6 | attackspambots | 2019-12-11T09:40:22.062338scmdmz1 sshd\[14979\]: Invalid user ar from 101.231.124.6 port 29966 2019-12-11T09:40:22.065158scmdmz1 sshd\[14979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.231.124.6 2019-12-11T09:40:24.758542scmdmz1 sshd\[14979\]: Failed password for invalid user ar from 101.231.124.6 port 29966 ssh2 ... |
2019-12-11 16:54:17 |
| 218.92.0.165 | attack | 2019-12-11T08:20:44.429601abusebot-7.cloudsearch.cf sshd\[2241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.165 user=root |
2019-12-11 16:22:09 |
| 106.13.170.159 | attackbots | Host Scan |
2019-12-11 16:47:04 |
| 68.183.204.162 | attackspambots | Dec 10 22:12:39 hpm sshd\[15906\]: Invalid user rpm from 68.183.204.162 Dec 10 22:12:39 hpm sshd\[15906\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.204.162 Dec 10 22:12:41 hpm sshd\[15906\]: Failed password for invalid user rpm from 68.183.204.162 port 42896 ssh2 Dec 10 22:18:22 hpm sshd\[16505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.204.162 user=root Dec 10 22:18:24 hpm sshd\[16505\]: Failed password for root from 68.183.204.162 port 51718 ssh2 |
2019-12-11 16:31:56 |
| 182.61.32.8 | attack | Dec 10 22:26:37 hanapaa sshd\[16738\]: Invalid user damin from 182.61.32.8 Dec 10 22:26:37 hanapaa sshd\[16738\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.32.8 Dec 10 22:26:40 hanapaa sshd\[16738\]: Failed password for invalid user damin from 182.61.32.8 port 47872 ssh2 Dec 10 22:33:33 hanapaa sshd\[17363\]: Invalid user yolandam from 182.61.32.8 Dec 10 22:33:33 hanapaa sshd\[17363\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.32.8 |
2019-12-11 16:44:16 |
| 52.36.131.219 | attackbots | 12/11/2019-08:59:02.241474 52.36.131.219 Protocol: 6 SURICATA TLS invalid record/traffic |
2019-12-11 16:26:28 |
| 172.126.155.149 | attackspam | Unauthorised access (Dec 11) SRC=172.126.155.149 LEN=40 TTL=241 ID=31647 DF TCP DPT=23 WINDOW=14600 SYN |
2019-12-11 16:49:34 |
| 165.231.253.74 | attack | Dec 11 14:12:03 areeb-Workstation sshd[14689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.231.253.74 Dec 11 14:12:05 areeb-Workstation sshd[14689]: Failed password for invalid user baldelomar from 165.231.253.74 port 34634 ssh2 ... |
2019-12-11 16:56:49 |
| 93.91.172.78 | attackbots | Unauthorized connection attempt detected from IP address 93.91.172.78 to port 445 |
2019-12-11 16:53:27 |
| 103.111.86.241 | attackbotsspam | 2019-12-11T02:47:46.161003ns547587 sshd\[29401\]: Invalid user victor from 103.111.86.241 port 50211 2019-12-11T02:47:46.166653ns547587 sshd\[29401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.111.86.241 2019-12-11T02:47:47.596060ns547587 sshd\[29401\]: Failed password for invalid user victor from 103.111.86.241 port 50211 ssh2 2019-12-11T02:54:17.485761ns547587 sshd\[7696\]: Invalid user turba from 103.111.86.241 port 54485 ... |
2019-12-11 16:18:42 |
| 185.200.118.74 | attack | 1194/udp 3389/tcp 1080/tcp... [2019-10-15/12-11]39pkt,4pt.(tcp),1pt.(udp) |
2019-12-11 16:34:03 |