城市(city): Hong Kong
省份(region): unknown
国家(country): Hong Kong
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 8.208.0.0 - 8.223.255.255
CIDR: 8.208.0.0/12
NetName: APNIC
NetHandle: NET-8-208-0-0-1
Parent: NET8 (NET-8-0-0-0-0)
NetType: Early Registrations, Transferred to APNIC
OriginAS:
Organization: Asia Pacific Network Information Centre (APNIC)
RegDate: 2018-04-24
Updated: 2018-04-24
Ref: https://rdap.arin.net/registry/ip/8.208.0.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois://whois.apnic.net
OrgName: Asia Pacific Network Information Centre
OrgId: APNIC
Address: PO Box 3646
City: South Brisbane
StateProv: QLD
PostalCode: 4101
Country: AU
RegDate:
Updated: 2012-01-24
Ref: https://rdap.arin.net/registry/entity/APNIC
ReferralServer: whois://whois.apnic.net
ResourceLink: http://wq.apnic.net/whois-search/static/search.html
OrgTechHandle: AWC12-ARIN
OrgTechName: APNIC Whois Contact
OrgTechPhone: +61 7 3858 3188
OrgTechEmail: search-apnic-not-arin@apnic.net
OrgTechRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
OrgAbuseHandle: AWC12-ARIN
OrgAbuseName: APNIC Whois Contact
OrgAbusePhone: +61 7 3858 3188
OrgAbuseEmail: search-apnic-not-arin@apnic.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.apnic.net.
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '8.210.0.0 - 8.210.255.255'
% Abuse contact for '8.210.0.0 - 8.210.255.255' is 'abuse@alibaba-inc.com'
inetnum: 8.210.0.0 - 8.210.255.255
netname: AlibabaCloud_HK
descr: Aliyun Computing Co.LTD
country: HK
admin-c: ASEP1-AP
tech-c: ASEP1-AP
abuse-c: AA1926-AP
status: ALLOCATED NON-PORTABLE
mnt-by: MAINT-ASEPL-SG
mnt-irt: IRT-ASEPL-SG
last-modified: 2025-07-15T08:03:33Z
source: APNIC
irt: IRT-ASEPL-SG
address: 1 Raffles Place
e-mail: abuse@alibaba-inc.com
abuse-mailbox: abuse@alibaba-inc.com
admin-c: ASEP1-AP
tech-c: ASEP1-AP
auth: # Filtered
remarks: abuse@alibaba-inc.com was validated on 2025-12-09
mnt-by: MAINT-ASEPL-SG
last-modified: 2025-12-09T07:58:21Z
source: APNIC
role: ABUSE ASEPLSG
country: ZZ
address: 1 Raffles Place
phone: +000000000
e-mail: abuse@alibaba-inc.com
admin-c: ASEP1-AP
tech-c: ASEP1-AP
nic-hdl: AA1926-AP
remarks: Generated from irt object IRT-ASEPL-SG
remarks: abuse@alibaba-inc.com was validated on 2025-12-09
abuse-mailbox: abuse@alibaba-inc.com
mnt-by: APNIC-ABUSE
last-modified: 2025-12-09T07:58:36Z
source: APNIC
role: Alibabacom Singapore E-Commerce Private Limited a
address: 1 Raffles Place #59-00 One Raffles Place, Tower One Singapore, Singapore
country: SG
phone: +86-571-85022088
fax-no: +86-571-85022088
e-mail: abuse@alibaba-inc.com
admin-c: ASEP1-AP
tech-c: ASEP1-AP
nic-hdl: ASEP1-AP
mnt-by: MAINT-ASEPL-SG
last-modified: 2025-07-01T06:25:24Z
source: APNIC
% Information related to '8.210.202.0/24AS134963'
route: 8.210.202.0/24
origin: AS134963
descr: Alibaba.com Singapore E-Commerce Private Limited
8 Shenton Way, #45-01 AXA Tower, Singapore 068811
mnt-by: MAINT-ASEPL-SG
last-modified: 2020-01-20T07:43:44Z
source: APNIC
% Information related to '8.210.202.0/24AS45102'
route: 8.210.202.0/24
origin: AS45102
descr: Alibaba.com Singapore E-Commerce Private Limited
8 Shenton Way, #45-01 AXA Tower, Singapore 068811
mnt-by: MAINT-ASEPL-SG
last-modified: 2020-01-20T07:06:16Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 8.210.202.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27550
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;8.210.202.117. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042900 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 29 21:30:16 CST 2026
;; MSG SIZE rcvd: 106
Host 117.202.210.8.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 117.202.210.8.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 220.133.60.182 | attackspam | Port probing on unauthorized port 23 |
2020-08-08 08:17:06 |
| 106.13.37.164 | attackspam | Too many connections or unauthorized access detected from Arctic banned ip |
2020-08-08 08:10:20 |
| 139.59.22.2 | attackbotsspam | Web App Attack |
2020-08-08 07:51:29 |
| 59.152.237.118 | attackbotsspam | Aug 7 20:19:53 localhost sshd\[21469\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.152.237.118 user=root Aug 7 20:19:55 localhost sshd\[21469\]: Failed password for root from 59.152.237.118 port 57444 ssh2 Aug 7 20:23:28 localhost sshd\[21517\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.152.237.118 user=root ... |
2020-08-08 08:24:13 |
| 60.16.228.252 | attackbots | Aug 6 15:50:25 ovpn sshd[15013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.16.228.252 user=r.r Aug 6 15:50:27 ovpn sshd[15013]: Failed password for r.r from 60.16.228.252 port 48680 ssh2 Aug 6 15:50:27 ovpn sshd[15013]: Received disconnect from 60.16.228.252 port 48680:11: Bye Bye [preauth] Aug 6 15:50:27 ovpn sshd[15013]: Disconnected from 60.16.228.252 port 48680 [preauth] Aug 6 16:01:02 ovpn sshd[22594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.16.228.252 user=r.r Aug 6 16:01:04 ovpn sshd[22594]: Failed password for r.r from 60.16.228.252 port 50014 ssh2 Aug 6 16:01:05 ovpn sshd[22594]: Received disconnect from 60.16.228.252 port 50014:11: Bye Bye [preauth] Aug 6 16:01:05 ovpn sshd[22594]: Disconnected from 60.16.228.252 port 50014 [preauth] Aug 6 16:14:46 ovpn sshd[29523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost........ ------------------------------ |
2020-08-08 08:23:50 |
| 94.232.136.126 | attackbots | 2020-08-07T07:50:37.383474correo.[domain] sshd[11859]: Failed password for root from 94.232.136.126 port 1195 ssh2 2020-08-07T07:54:34.074219correo.[domain] sshd[12440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.232.136.126 user=root 2020-08-07T07:54:36.396001correo.[domain] sshd[12440]: Failed password for root from 94.232.136.126 port 65289 ssh2 ... |
2020-08-08 08:03:39 |
| 182.61.40.227 | attackspam | Brute-force attempt banned |
2020-08-08 07:50:25 |
| 68.183.19.26 | attack | *Port Scan* detected from 68.183.19.26 (US/United States/New Jersey/North Bergen/kaltim.bawaslu.go.id). 4 hits in the last 75 seconds |
2020-08-08 07:55:30 |
| 82.65.23.62 | attackspambots | 2020-08-08T01:18:09.358036amanda2.illicoweb.com sshd\[3960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82-65-23-62.subs.proxad.net user=root 2020-08-08T01:18:11.295172amanda2.illicoweb.com sshd\[3960\]: Failed password for root from 82.65.23.62 port 34080 ssh2 2020-08-08T01:20:59.154779amanda2.illicoweb.com sshd\[4292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82-65-23-62.subs.proxad.net user=root 2020-08-08T01:21:01.097111amanda2.illicoweb.com sshd\[4292\]: Failed password for root from 82.65.23.62 port 33172 ssh2 2020-08-08T01:23:43.577064amanda2.illicoweb.com sshd\[4629\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82-65-23-62.subs.proxad.net user=root ... |
2020-08-08 08:24:53 |
| 139.162.115.221 | attackspam | " " |
2020-08-08 08:13:22 |
| 192.144.210.27 | attackbots | frenzy |
2020-08-08 08:09:12 |
| 200.68.20.10 | attack | SMB Server BruteForce Attack |
2020-08-08 07:49:56 |
| 212.237.57.252 | attackspambots | Aug 8 01:05:41 piServer sshd[13284]: Failed password for root from 212.237.57.252 port 43106 ssh2 Aug 8 01:09:12 piServer sshd[13708]: Failed password for root from 212.237.57.252 port 34130 ssh2 ... |
2020-08-08 07:56:19 |
| 172.81.227.243 | attack | Lines containing failures of 172.81.227.243 Aug 5 04:52:07 penfold sshd[8488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.81.227.243 user=r.r Aug 5 04:52:08 penfold sshd[8488]: Failed password for r.r from 172.81.227.243 port 41078 ssh2 Aug 5 04:52:09 penfold sshd[8488]: Received disconnect from 172.81.227.243 port 41078:11: Bye Bye [preauth] Aug 5 04:52:09 penfold sshd[8488]: Disconnected from authenticating user r.r 172.81.227.243 port 41078 [preauth] Aug 5 05:05:53 penfold sshd[9322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.81.227.243 user=r.r Aug 5 05:05:55 penfold sshd[9322]: Failed password for r.r from 172.81.227.243 port 43928 ssh2 Aug 5 05:05:55 penfold sshd[9322]: Received disconnect from 172.81.227.243 port 43928:11: Bye Bye [preauth] Aug 5 05:05:55 penfold sshd[9322]: Disconnected from authenticating user r.r 172.81.227.243 port 43928 [preauth] Aug ........ ------------------------------ |
2020-08-08 07:56:49 |
| 220.130.10.13 | attackbotsspam | $f2bV_matches |
2020-08-08 08:12:27 |