城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '59.82.0.0 - 59.82.255.255'
% Abuse contact for '59.82.0.0 - 59.82.255.255' is 'didong.jc@alibaba-inc.com'
inetnum: 59.82.0.0 - 59.82.255.255
netname: ALIBABA-CN-NET
descr: Hangzhou Alibaba Advertising Co.,Ltd.
descr: No.699, Wangshang RD., Hangzhou, China
country: CN
admin-c: ZM678-AP
tech-c: ZM877-AP
tech-c: ZM876-AP
abuse-c: AC1601-AP
status: ALLOCATED PORTABLE
mnt-by: MAINT-CNNIC-AP
mnt-irt: IRT-ALIBABA-CN-NET-CN
mnt-lower: MAINT-CNNIC-AP
mnt-routes: MAINT-CNNIC-AP
last-modified: 2023-11-28T00:58:21Z
source: APNIC
irt: IRT-ALIBABA-CN-NET-CN
address: No.699, Wangshang RD., Hangzhou, China
e-mail: didong.jc@alibaba-inc.com
abuse-mailbox: didong.jc@alibaba-inc.com
auth: # Filtered
admin-c: ZM678-AP
tech-c: ZM678-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2021-09-05T23:38:38Z
source: APNIC
role: ABUSE CNNICCN
country: ZZ
address: Beijing, China
phone: +000000000
e-mail: ipas@cnnic.cn
admin-c: IP50-AP
tech-c: IP50-AP
nic-hdl: AC1601-AP
remarks: Generated from irt object IRT-CNNIC-CN
remarks: ipas@cnnic.cn is invalid
abuse-mailbox: ipas@cnnic.cn
mnt-by: APNIC-ABUSE
last-modified: 2025-09-19T17:20:32Z
source: APNIC
person: Shuo Yu
address: 5F, Builing D, the West Lake International Plaza of S&T
address: No.391 Wen'er Road, Hangzhou City
address: Zhejiang, China, 310099
country: CN
phone: +86-0571-85022600
e-mail: anti-spam@list.alibaba-inc.com
nic-hdl: ZM678-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2021-04-13T23:21:57Z
source: APNIC
person: security trouble
e-mail: abuse@alibaba-inc.com
address: 5th,floor,Building D,the West Lake International Plaza of S&T,391#Wen??r Road
address: Hangzhou, Zhejiang, China
phone: +86-0571-85022600
country: CN
mnt-by: MAINT-CNNIC-AP
nic-hdl: ZM876-AP
last-modified: 2025-07-01T07:06:11Z
source: APNIC
person: Guowei Pan
address: 5F, Builing D, the West Lake International Plaza of S&T
address: No.391 Wen'er Road, Hangzhou City
address: Zhejiang, China, 310099
country: CN
phone: +86-0571-85022088-30763
fax-no: +86-0571-85022600
e-mail: abuse@alibaba-inc.com
nic-hdl: ZM877-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2025-07-01T07:05:46Z
source: APNIC
% Information related to '59.82.83.0/24AS37963'
route: 59.82.83.0/24
origin: AS37963
descr: China Internet Network Information Center
Floor1, Building No.1 C/-Chinese Academy of Sciences
4, South 4th Street
Haidian District,
mnt-by: MAINT-CNNIC-AP
last-modified: 2020-02-18T01:17:28Z
source: APNIC
% Information related to '59.82.83.0/24AS45102'
route: 59.82.83.0/24
origin: AS45102
descr: China Internet Network Information Center
Floor1, Building No.1 C/-Chinese Academy of Sciences
4, South 4th Street
Haidian District,
mnt-by: MAINT-CNNIC-AP
last-modified: 2020-02-18T01:19:20Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 59.82.83.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24096
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;59.82.83.74. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025101601 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 17 07:00:26 CST 2025
;; MSG SIZE rcvd: 104
Host 74.83.82.59.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 74.83.82.59.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
206.189.183.0 | attack | 206.189.183.0 - - [01/Oct/2020:18:02:05 +0100] "POST /wp-login.php HTTP/1.1" 200 2828 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 206.189.183.0 - - [01/Oct/2020:18:02:12 +0100] "POST /wp-login.php HTTP/1.1" 200 2770 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 206.189.183.0 - - [01/Oct/2020:18:02:19 +0100] "POST /wp-login.php HTTP/1.1" 200 2844 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-10-02 06:43:49 |
157.230.230.152 | attackspambots | Oct 1 11:21:27 propaganda sshd[17196]: Connection from 157.230.230.152 port 58848 on 10.0.0.161 port 22 rdomain "" Oct 1 11:21:27 propaganda sshd[17196]: Connection closed by 157.230.230.152 port 58848 [preauth] |
2020-10-02 06:39:17 |
110.49.70.248 | attackspambots | Oct 1 22:38:14 roki-contabo sshd\[16978\]: Invalid user brian from 110.49.70.248 Oct 1 22:38:14 roki-contabo sshd\[16978\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.70.248 Oct 1 22:38:16 roki-contabo sshd\[16978\]: Failed password for invalid user brian from 110.49.70.248 port 51964 ssh2 Oct 1 23:54:59 roki-contabo sshd\[18949\]: Invalid user j from 110.49.70.248 Oct 1 23:54:59 roki-contabo sshd\[18949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.70.248 ... |
2020-10-02 06:23:22 |
106.55.169.74 | attack | 2020-10-01T23:52:50.697689ollin.zadara.org sshd[1791911]: User root from 106.55.169.74 not allowed because not listed in AllowUsers 2020-10-01T23:52:52.883338ollin.zadara.org sshd[1791911]: Failed password for invalid user root from 106.55.169.74 port 57162 ssh2 ... |
2020-10-02 06:10:31 |
5.196.72.11 | attackbots | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-10-01T21:37:23Z and 2020-10-01T21:49:44Z |
2020-10-02 06:24:40 |
106.53.125.253 | attackbots | Oct 1 22:51:14 s2 sshd[28980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.125.253 Oct 1 22:51:15 s2 sshd[28980]: Failed password for invalid user brainy from 106.53.125.253 port 42052 ssh2 Oct 1 23:03:28 s2 sshd[29639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.125.253 |
2020-10-02 06:14:22 |
49.76.211.178 | attackspambots | " " |
2020-10-02 06:33:41 |
146.185.163.81 | attackspambots | 146.185.163.81 - - [01/Oct/2020:23:18:33 +0100] "POST /wp-login.php HTTP/1.1" 200 2238 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 146.185.163.81 - - [01/Oct/2020:23:18:34 +0100] "POST /wp-login.php HTTP/1.1" 200 2282 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 146.185.163.81 - - [01/Oct/2020:23:18:34 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-10-02 06:39:36 |
188.131.154.81 | attack | Oct 1 23:48:32 nextcloud sshd\[2769\]: Invalid user vncuser from 188.131.154.81 Oct 1 23:48:32 nextcloud sshd\[2769\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.154.81 Oct 1 23:48:34 nextcloud sshd\[2769\]: Failed password for invalid user vncuser from 188.131.154.81 port 46232 ssh2 |
2020-10-02 06:41:22 |
120.32.75.219 | attackbots | "Unauthorized connection attempt on SSHD detected" |
2020-10-02 06:20:17 |
212.70.149.20 | attackbots | Oct 2 00:22:09 cho postfix/smtpd[4029585]: warning: unknown[212.70.149.20]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 2 00:22:34 cho postfix/smtpd[4029665]: warning: unknown[212.70.149.20]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 2 00:22:58 cho postfix/smtpd[4029665]: warning: unknown[212.70.149.20]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 2 00:23:23 cho postfix/smtpd[4029665]: warning: unknown[212.70.149.20]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 2 00:23:47 cho postfix/smtpd[4029665]: warning: unknown[212.70.149.20]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-10-02 06:25:42 |
49.88.112.114 | attack | Oct 1 23:03:20 server sshd[47730]: Failed password for root from 49.88.112.114 port 47313 ssh2 Oct 2 00:05:13 server sshd[13310]: Failed password for root from 49.88.112.114 port 58762 ssh2 Oct 2 00:05:18 server sshd[13310]: Failed password for root from 49.88.112.114 port 58762 ssh2 |
2020-10-02 06:24:27 |
170.210.221.48 | attack | Banned for a week because repeated abuses, for example SSH, but not only |
2020-10-02 06:32:00 |
117.28.25.50 | attackbotsspam | Oct 2 01:12:42 pkdns2 sshd\[52390\]: Invalid user user from 117.28.25.50Oct 2 01:12:43 pkdns2 sshd\[52390\]: Failed password for invalid user user from 117.28.25.50 port 8686 ssh2Oct 2 01:16:58 pkdns2 sshd\[52604\]: Invalid user bitbucket from 117.28.25.50Oct 2 01:17:00 pkdns2 sshd\[52604\]: Failed password for invalid user bitbucket from 117.28.25.50 port 8707 ssh2Oct 2 01:20:59 pkdns2 sshd\[52786\]: Invalid user scan from 117.28.25.50Oct 2 01:21:01 pkdns2 sshd\[52786\]: Failed password for invalid user scan from 117.28.25.50 port 8721 ssh2 ... |
2020-10-02 06:33:22 |
167.71.140.30 | attackspambots | 167.71.140.30 - - [01/Oct/2020:13:17:52 +0200] "GET /wp-login.php HTTP/1.1" 200 8558 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 167.71.140.30 - - [01/Oct/2020:13:17:52 +0200] "POST /wp-login.php HTTP/1.1" 200 8875 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 167.71.140.30 - - [01/Oct/2020:13:17:53 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-10-02 06:28:19 |