城市(city): unknown
省份(region): unknown
国家(country): Singapore
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
NetRange: 8.208.0.0 - 8.223.255.255
CIDR: 8.208.0.0/12
NetName: APNIC
NetHandle: NET-8-208-0-0-1
Parent: NET8 (NET-8-0-0-0-0)
NetType: Early Registrations, Transferred to APNIC
OriginAS:
Organization: Asia Pacific Network Information Centre (APNIC)
RegDate: 2018-04-24
Updated: 2018-04-24
Ref: https://rdap.arin.net/registry/ip/8.208.0.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois://whois.apnic.net
OrgName: Asia Pacific Network Information Centre
OrgId: APNIC
Address: PO Box 3646
City: South Brisbane
StateProv: QLD
PostalCode: 4101
Country: AU
RegDate:
Updated: 2012-01-24
Ref: https://rdap.arin.net/registry/entity/APNIC
ReferralServer: whois://whois.apnic.net
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
OrgTechHandle: AWC12-ARIN
OrgTechName: APNIC Whois Contact
OrgTechPhone: +61 7 3858 3188
OrgTechEmail: search-apnic-not-arin@apnic.net
OrgTechRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
OrgAbuseHandle: AWC12-ARIN
OrgAbuseName: APNIC Whois Contact
OrgAbusePhone: +61 7 3858 3188
OrgAbuseEmail: search-apnic-not-arin@apnic.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.apnic.net.
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '8.208.0.0 - 8.223.255.255'
% Abuse contact for '8.208.0.0 - 8.223.255.255' is 'abuse@alibaba-inc.com'
inetnum: 8.208.0.0 - 8.223.255.255
netname: ASEPL-SG
descr: Alibaba Cloud (Singapore) Private Limited
descr: 51 Bras Basah Road #03-06 Lazada One Singapore 189554, Singapore
country: SG
org: ORG-ASEP1-AP
admin-c: ASEP1-AP
tech-c: ASEP1-AP
abuse-c: AA1926-AP
status: ALLOCATED PORTABLE
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-lower: MAINT-ASEPL-SG
mnt-routes: MAINT-ASEPL-SG
mnt-irt: IRT-ASEPL-SG
last-modified: 2023-11-09T06:37:20Z
source: APNIC
irt: IRT-ASEPL-SG
address: 1 Raffles Place
e-mail: abuse@alibaba-inc.com
abuse-mailbox: abuse@alibaba-inc.com
admin-c: ASEP1-AP
tech-c: ASEP1-AP
auth: # Filtered
remarks: abuse@alibaba-inc.com was validated on 2025-04-14
mnt-by: MAINT-ASEPL-SG
last-modified: 2025-09-04T07:13:51Z
source: APNIC
organisation: ORG-ASEP1-AP
org-name: Alibaba Cloud (Singapore) Private Limited
org-type: LIR
country: SG
address: 51 Bras Basah Road # 03-06 Lazada One Singapore 189554
phone: +8657185022088-76449
e-mail: abuse@alibaba-inc.com
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2024-07-11T12:55:24Z
source: APNIC
role: ABUSE ASEPLSG
country: ZZ
address: 1 Raffles Place # 59-00 One Raffles Place, Tower One Singapore, Singapore
phone: +000000000
e-mail: abuse@alibaba-inc.com
admin-c: ASEP1-AP
tech-c: ASEP1-AP
nic-hdl: AA1926-AP
remarks: Generated from irt object IRT-ASEPL-SG
remarks: abuse@alibaba-inc.com was validated on 2025-04-14
abuse-mailbox: abuse@alibaba-inc.com
mnt-by: APNIC-ABUSE
last-modified: 2025-04-14T07:19:41Z
source: APNIC
role: Alibabacom Singapore E-Commerce Private Limited a
address: 1 Raffles Place #59-00 One Raffles Place, Tower One Singapore, Singapore
country: SG
phone: +86-571-85022088
fax-no: +86-571-85022088
e-mail: abuse@alibaba-inc.com
admin-c: ASEP1-AP
tech-c: ASEP1-AP
nic-hdl: ASEP1-AP
mnt-by: MAINT-ASEPL-SG
last-modified: 2025-07-01T06:25:24Z
source: APNIC
% Information related to '8.219.158.0/24AS134963'
route: 8.219.158.0/24
origin: AS134963
descr: Alibaba.com Singapore E-Commerce Private Limited
8 Shenton Way, #45-01 AXA Tower, Singapore 068811
mnt-by: MAINT-ASEPL-SG
last-modified: 2020-01-20T07:57:44Z
source: APNIC
% Information related to '8.219.158.0/24AS45102'
route: 8.219.158.0/24
origin: AS45102
descr: Alibaba.com Singapore E-Commerce Private Limited
8 Shenton Way, #45-01 AXA Tower, Singapore 068811
mnt-by: MAINT-ASEPL-SG
last-modified: 2020-01-20T07:28:24Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 8.219.158.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6873
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;8.219.158.22. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025101500 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 15 18:31:44 CST 2025
;; MSG SIZE rcvd: 105
Host 22.158.219.8.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 22.158.219.8.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
106.12.141.11 | attack | Apr 6 00:02:16 h2829583 sshd[20018]: Failed password for root from 106.12.141.11 port 39298 ssh2 |
2020-04-06 08:06:40 |
34.80.135.20 | attackbots | $f2bV_matches |
2020-04-06 07:44:56 |
222.186.180.9 | attackbotsspam | Apr 6 07:33:47 bacztwo sshd[27012]: error: PAM: Authentication failure for root from 222.186.180.9 Apr 6 07:33:38 bacztwo sshd[27012]: error: PAM: Authentication failure for root from 222.186.180.9 Apr 6 07:33:41 bacztwo sshd[27012]: error: PAM: Authentication failure for root from 222.186.180.9 Apr 6 07:33:44 bacztwo sshd[27012]: error: PAM: Authentication failure for root from 222.186.180.9 Apr 6 07:33:47 bacztwo sshd[27012]: error: PAM: Authentication failure for root from 222.186.180.9 Apr 6 07:33:47 bacztwo sshd[27012]: Failed keyboard-interactive/pam for root from 222.186.180.9 port 60538 ssh2 Apr 6 07:33:38 bacztwo sshd[27012]: error: PAM: Authentication failure for root from 222.186.180.9 Apr 6 07:33:41 bacztwo sshd[27012]: error: PAM: Authentication failure for root from 222.186.180.9 Apr 6 07:33:44 bacztwo sshd[27012]: error: PAM: Authentication failure for root from 222.186.180.9 Apr 6 07:33:47 bacztwo sshd[27012]: error: PAM: Authentication failure for root from 2 ... |
2020-04-06 07:39:59 |
45.114.85.58 | attackspambots | [AUTOMATIC REPORT] - 57 tries in total - SSH BRUTE FORCE - IP banned |
2020-04-06 08:04:46 |
51.38.37.89 | attackspam | Apr 5 20:43:01 ws12vmsma01 sshd[49714]: Failed password for root from 51.38.37.89 port 43448 ssh2 Apr 5 20:46:45 ws12vmsma01 sshd[50321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=gg-int.org user=root Apr 5 20:46:48 ws12vmsma01 sshd[50321]: Failed password for root from 51.38.37.89 port 55032 ssh2 ... |
2020-04-06 07:54:33 |
140.143.226.19 | attack | $f2bV_matches |
2020-04-06 07:47:16 |
47.151.246.31 | attack | IP blocked |
2020-04-06 08:00:03 |
171.249.37.121 | attack | port scan and connect, tcp 23 (telnet) |
2020-04-06 07:38:00 |
120.132.120.7 | attackspambots | Apr 5 14:53:10 mockhub sshd[19807]: Failed password for root from 120.132.120.7 port 34444 ssh2 ... |
2020-04-06 07:46:38 |
39.46.71.222 | attackbots | Automatic report - Port Scan Attack |
2020-04-06 07:56:17 |
104.236.246.16 | attackbotsspam | SSH brute-force attempt |
2020-04-06 07:46:50 |
189.199.252.187 | attack | Apr 6 00:37:03 ift sshd\[53617\]: Failed password for root from 189.199.252.187 port 46671 ssh2Apr 6 00:37:08 ift sshd\[53619\]: Failed password for root from 189.199.252.187 port 47254 ssh2Apr 6 00:37:10 ift sshd\[53623\]: Invalid user ubuntu from 189.199.252.187Apr 6 00:37:13 ift sshd\[53623\]: Failed password for invalid user ubuntu from 189.199.252.187 port 47871 ssh2Apr 6 00:37:18 ift sshd\[53625\]: Failed password for root from 189.199.252.187 port 48368 ssh2 ... |
2020-04-06 07:59:09 |
184.75.211.131 | attack | (From hope.coningham@msn.com) Looking for fresh buyers? Receive hundreds of people who are ready to buy sent directly to your website. Boost your profits super fast. Start seeing results in as little as 48 hours. For additional information Check out: http://www.trafficmasters.xyz |
2020-04-06 07:59:36 |
222.106.61.152 | attackspambots | 2020-04-05T21:37:15.501065randservbullet-proofcloud-66.localdomain sshd[23319]: Invalid user pi from 222.106.61.152 port 33290 2020-04-05T21:37:15.751555randservbullet-proofcloud-66.localdomain sshd[23318]: Invalid user pi from 222.106.61.152 port 33288 ... |
2020-04-06 07:56:41 |
188.137.85.215 | attack | Apr 5 23:37:22 mout sshd[21562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.137.85.215 user=pi Apr 5 23:37:24 mout sshd[21562]: Failed password for pi from 188.137.85.215 port 41518 ssh2 Apr 5 23:37:25 mout sshd[21562]: Connection closed by 188.137.85.215 port 41518 [preauth] |
2020-04-06 07:54:11 |