城市(city): Mong Kok
省份(region): Yau Tsim Mong Kowloon
国家(country): Hong Kong
运营商(isp): Hong Kong Broadband Network Ltd
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '61.238.0.0 - 61.239.255.255'
% Abuse contact for '61.238.0.0 - 61.239.255.255' is 'abuse@hkbn.net'
inetnum: 61.238.0.0 - 61.239.255.255
netname: HKBN
descr: Hong Kong Broadband Network Ltd
country: HK
org: ORG-HKBN1-AP
admin-c: MH84-AP
tech-c: MH84-AP
abuse-c: AH1013-AP
status: ALLOCATED PORTABLE
remarks: This object can only be modified by APNIC hostmaster
remarks: If you wish to modify this object details please
remarks: send email to hostmaster@apnic.net with your organisation
remarks: account name in the subject line.
mnt-by: APNIC-HM
mnt-lower: MAINT-HK-HKBN
mnt-routes: MAINT-HK-HKBN
mnt-irt: IRT-HKBN-HK
last-modified: 2020-07-15T13:09:34Z
source: APNIC
irt: IRT-HKBN-HK
address: 15/F Trans Asia Centre
address: 18 Kin Hong Street, Kwai Chung
address: N.T.
e-mail: hostmaster@hkbn.com.hk
abuse-mailbox: abuse@hkbn.net
admin-c: HKBN-HK
tech-c: HKBN-HK
auth: # Filtered
remarks: abuse@hkbn.net was validated on 2025-10-29
remarks: hostmaster@hkbn.com.hk is invalid
mnt-by: MAINT-HK-HKBN
last-modified: 2026-01-28T13:07:16Z
source: APNIC
organisation: ORG-HKBN1-AP
org-name: Hong Kong Broadband Network Limited
org-type: LIR
country: HK
address: 15/F Trans Asia Centre
address: 18 Kin Hong Street
phone: +852-3999-3888
fax-no: +852-8167-7020
e-mail: nocsn@hkbn.com.hk
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2025-02-24T12:57:31Z
source: APNIC
role: ABUSE HKBNHK
country: ZZ
address: 15/F Trans Asia Centre
address: 18 Kin Hong Street, Kwai Chung
address: N.T.
phone: +000000000
e-mail: hostmaster@hkbn.com.hk
admin-c: HKBN-HK
tech-c: HKBN-HK
nic-hdl: AH1013-AP
remarks: Generated from irt object IRT-HKBN-HK
remarks: abuse@hkbn.net was validated on 2025-10-29
remarks: hostmaster@hkbn.com.hk is invalid
abuse-mailbox: abuse@hkbn.net
mnt-by: APNIC-ABUSE
last-modified: 2026-01-28T13:08:22Z
source: APNIC
person: Master Host
address: 15/F, 18 Kin Hong Street, Trans Asia Centre, Kwai Chung, Kln
country: HK
phone: +852-3999-3888
fax-no: +852-8167-7020
e-mail: hostmaster@hkbn.com.hk
nic-hdl: MH84-AP
mnt-by: MAINT-HK-HKBN
abuse-mailbox: abuse@hkbn.net
last-modified: 2014-11-11T08:51:41Z
source: APNIC
% Information related to '61.239.240.0/24AS10103'
route: 61.239.240.0/24
origin: AS10103
descr: Hong Kong Broadband Network Ltd
15/F Trans Asia Centre
18 Kin Hong Street
mnt-by: MAINT-HK-HKBN
last-modified: 2020-04-23T04:55:33Z
source: APNIC
% Information related to '61.239.240.0/24AS9269'
route: 61.239.240.0/24
origin: AS9269
descr: Hong Kong Broadband Network Ltd
15/F Trans Asia Centre
18 Kin Hong Street
mnt-by: MAINT-HK-HKBN
last-modified: 2020-04-23T04:55:16Z
source: APNIC
% Information related to '61.239.240.0/24AS9381'
route: 61.239.240.0/24
origin: AS9381
descr: Hong Kong Broadband Network Ltd
15/F Trans Asia Centre
18 Kin Hong Street
mnt-by: MAINT-HK-HKBN
last-modified: 2021-01-27T04:48:23Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.239.240.254
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47969
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;61.239.240.254. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026021802 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 19 13:19:40 CST 2026
;; MSG SIZE rcvd: 107
254.240.239.61.in-addr.arpa domain name pointer 061239240254.ctinets.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
254.240.239.61.in-addr.arpa name = 061239240254.ctinets.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 222.186.31.166 | attack | Automatic report BANNED IP |
2020-06-12 15:24:26 |
| 220.132.76.189 | attackbotsspam | port scan and connect, tcp 23 (telnet) |
2020-06-12 15:26:11 |
| 165.22.31.24 | attackspam | CMS (WordPress or Joomla) login attempt. |
2020-06-12 15:29:19 |
| 49.232.5.172 | attackspambots | Jun 12 02:32:11 r.ca sshd[20949]: Failed password for invalid user elmar from 49.232.5.172 port 43088 ssh2 |
2020-06-12 14:52:35 |
| 174.138.64.163 | attackspambots | Invalid user kaiwei from 174.138.64.163 port 48696 |
2020-06-12 15:20:44 |
| 196.52.43.106 | attackspambots |
|
2020-06-12 15:23:01 |
| 222.186.175.217 | attackbotsspam | Jun 12 08:44:49 minden010 sshd[13201]: Failed password for root from 222.186.175.217 port 37694 ssh2 Jun 12 08:44:53 minden010 sshd[13201]: Failed password for root from 222.186.175.217 port 37694 ssh2 Jun 12 08:44:56 minden010 sshd[13201]: Failed password for root from 222.186.175.217 port 37694 ssh2 Jun 12 08:45:00 minden010 sshd[13201]: Failed password for root from 222.186.175.217 port 37694 ssh2 ... |
2020-06-12 15:04:03 |
| 159.65.163.234 | attackbotsspam | Port scan denied |
2020-06-12 15:25:49 |
| 122.116.33.54 | attackbots | Jun 12 13:55:24 web1 sshd[15205]: Invalid user admin from 122.116.33.54 port 57440 Jun 12 13:55:24 web1 sshd[15205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.33.54 Jun 12 13:55:24 web1 sshd[15205]: Invalid user admin from 122.116.33.54 port 57440 Jun 12 13:55:27 web1 sshd[15205]: Failed password for invalid user admin from 122.116.33.54 port 57440 ssh2 Jun 12 13:55:28 web1 sshd[15225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.33.54 user=root Jun 12 13:55:30 web1 sshd[15225]: Failed password for root from 122.116.33.54 port 57505 ssh2 Jun 12 13:55:31 web1 sshd[15238]: Invalid user admin from 122.116.33.54 port 57577 Jun 12 13:55:32 web1 sshd[15238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.33.54 Jun 12 13:55:31 web1 sshd[15238]: Invalid user admin from 122.116.33.54 port 57577 Jun 12 13:55:34 web1 sshd[15238]: Failed passwo ... |
2020-06-12 15:03:12 |
| 106.12.86.193 | attackspam | 2020-06-12T08:26:05.675687galaxy.wi.uni-potsdam.de sshd[31869]: Invalid user ec2-user from 106.12.86.193 port 39028 2020-06-12T08:26:05.680810galaxy.wi.uni-potsdam.de sshd[31869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.86.193 2020-06-12T08:26:05.675687galaxy.wi.uni-potsdam.de sshd[31869]: Invalid user ec2-user from 106.12.86.193 port 39028 2020-06-12T08:26:07.550871galaxy.wi.uni-potsdam.de sshd[31869]: Failed password for invalid user ec2-user from 106.12.86.193 port 39028 ssh2 2020-06-12T08:27:23.833311galaxy.wi.uni-potsdam.de sshd[32023]: Invalid user lgq from 106.12.86.193 port 53716 2020-06-12T08:27:23.838563galaxy.wi.uni-potsdam.de sshd[32023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.86.193 2020-06-12T08:27:23.833311galaxy.wi.uni-potsdam.de sshd[32023]: Invalid user lgq from 106.12.86.193 port 53716 2020-06-12T08:27:25.417648galaxy.wi.uni-potsdam.de sshd[32023]: Failed pa ... |
2020-06-12 14:55:00 |
| 123.21.151.71 | attack | Unauthorized IMAP connection attempt |
2020-06-12 15:13:13 |
| 202.137.20.58 | attackbots | Jun 12 08:54:40 vps687878 sshd\[565\]: Failed password for invalid user 123456 from 202.137.20.58 port 15051 ssh2 Jun 12 08:58:40 vps687878 sshd\[1082\]: Invalid user mwecur123SS from 202.137.20.58 port 34113 Jun 12 08:58:40 vps687878 sshd\[1082\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.137.20.58 Jun 12 08:58:42 vps687878 sshd\[1082\]: Failed password for invalid user mwecur123SS from 202.137.20.58 port 34113 ssh2 Jun 12 09:02:36 vps687878 sshd\[1556\]: Invalid user test from 202.137.20.58 port 53138 Jun 12 09:02:36 vps687878 sshd\[1556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.137.20.58 ... |
2020-06-12 15:03:48 |
| 185.234.219.113 | attackspam | smtpd Brute Force |
2020-06-12 15:31:20 |
| 202.163.126.134 | attackbotsspam | $f2bV_matches |
2020-06-12 15:26:35 |
| 184.105.139.116 | attack | srv02 Mass scanning activity detected Target: 123(ntp) .. |
2020-06-12 15:25:28 |