城市(city): unknown
省份(region): unknown
国家(country): Singapore
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 8.208.0.0 - 8.223.255.255
CIDR: 8.208.0.0/12
NetName: APNIC
NetHandle: NET-8-208-0-0-1
Parent: NET8 (NET-8-0-0-0-0)
NetType: Early Registrations, Transferred to APNIC
OriginAS:
Organization: Asia Pacific Network Information Centre (APNIC)
RegDate: 2018-04-24
Updated: 2018-04-24
Ref: https://rdap.arin.net/registry/ip/8.208.0.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois://whois.apnic.net
OrgName: Asia Pacific Network Information Centre
OrgId: APNIC
Address: PO Box 3646
City: South Brisbane
StateProv: QLD
PostalCode: 4101
Country: AU
RegDate:
Updated: 2012-01-24
Ref: https://rdap.arin.net/registry/entity/APNIC
ReferralServer: whois://whois.apnic.net
ResourceLink: http://wq.apnic.net/whois-search/static/search.html
OrgTechHandle: AWC12-ARIN
OrgTechName: APNIC Whois Contact
OrgTechPhone: +61 7 3858 3188
OrgTechEmail: search-apnic-not-arin@apnic.net
OrgTechRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
OrgAbuseHandle: AWC12-ARIN
OrgAbuseName: APNIC Whois Contact
OrgAbusePhone: +61 7 3858 3188
OrgAbuseEmail: search-apnic-not-arin@apnic.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.apnic.net.
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '8.208.0.0 - 8.223.255.255'
% Abuse contact for '8.208.0.0 - 8.223.255.255' is 'abuse@alibaba-inc.com'
inetnum: 8.208.0.0 - 8.223.255.255
netname: ASEPL-SG
descr: Alibaba Cloud (Singapore) Private Limited
descr: 51 Bras Basah Road #03-06 Lazada One Singapore 189554, Singapore
country: SG
org: ORG-ASEP1-AP
admin-c: ASEP1-AP
tech-c: ASEP1-AP
abuse-c: AA1926-AP
status: ALLOCATED PORTABLE
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-lower: MAINT-ASEPL-SG
mnt-routes: MAINT-ASEPL-SG
mnt-irt: IRT-ASEPL-SG
last-modified: 2023-11-09T06:37:20Z
source: APNIC
irt: IRT-ASEPL-SG
address: 1 Raffles Place
e-mail: abuse@alibaba-inc.com
abuse-mailbox: abuse@alibaba-inc.com
admin-c: ASEP1-AP
tech-c: ASEP1-AP
auth: # Filtered
remarks: abuse@alibaba-inc.com was validated on 2025-12-09
mnt-by: MAINT-ASEPL-SG
last-modified: 2025-12-09T07:58:21Z
source: APNIC
organisation: ORG-ASEP1-AP
org-name: Alibaba Cloud (Singapore) Private Limited
org-type: LIR
country: SG
address: 51 Bras Basah Road # 03-06 Lazada One Singapore 189554
phone: +8657185022088-76449
e-mail: abuse@alibaba-inc.com
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2024-07-11T12:55:24Z
source: APNIC
role: ABUSE ASEPLSG
country: ZZ
address: 1 Raffles Place
phone: +000000000
e-mail: abuse@alibaba-inc.com
admin-c: ASEP1-AP
tech-c: ASEP1-AP
nic-hdl: AA1926-AP
remarks: Generated from irt object IRT-ASEPL-SG
remarks: abuse@alibaba-inc.com was validated on 2025-12-09
abuse-mailbox: abuse@alibaba-inc.com
mnt-by: APNIC-ABUSE
last-modified: 2025-12-09T07:58:36Z
source: APNIC
role: Alibabacom Singapore E-Commerce Private Limited a
address: 1 Raffles Place #59-00 One Raffles Place, Tower One Singapore, Singapore
country: SG
phone: +86-571-85022088
fax-no: +86-571-85022088
e-mail: abuse@alibaba-inc.com
admin-c: ASEP1-AP
tech-c: ASEP1-AP
nic-hdl: ASEP1-AP
mnt-by: MAINT-ASEPL-SG
last-modified: 2025-07-01T06:25:24Z
source: APNIC
% Information related to '8.219.191.0/24AS134963'
route: 8.219.191.0/24
origin: AS134963
descr: Alibaba.com Singapore E-Commerce Private Limited
8 Shenton Way, #45-01 AXA Tower, Singapore 068811
mnt-by: MAINT-ASEPL-SG
last-modified: 2020-01-20T07:58:10Z
source: APNIC
% Information related to '8.219.191.0/24AS45102'
route: 8.219.191.0/24
origin: AS45102
descr: Alibaba.com Singapore E-Commerce Private Limited
8 Shenton Way, #45-01 AXA Tower, Singapore 068811
mnt-by: MAINT-ASEPL-SG
last-modified: 2020-01-20T07:29:02Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 8.219.191.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4097
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;8.219.191.219. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042201 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 23 04:30:03 CST 2026
;; MSG SIZE rcvd: 106
Host 219.191.219.8.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 219.191.219.8.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 95.70.111.106 | attackbots | port scan and connect, tcp 25 (smtp) |
2019-06-22 18:56:26 |
| 189.7.217.23 | attackspam | Jun 22 10:11:12 amit sshd\[21309\]: Invalid user zabbix from 189.7.217.23 Jun 22 10:11:12 amit sshd\[21309\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.7.217.23 Jun 22 10:11:14 amit sshd\[21309\]: Failed password for invalid user zabbix from 189.7.217.23 port 59623 ssh2 ... |
2019-06-22 18:54:42 |
| 159.65.99.227 | attack | WP Authentication failure |
2019-06-22 19:36:22 |
| 185.85.239.195 | attack | Attempted WordPress login: "GET /wp-login.php" |
2019-06-22 19:01:50 |
| 80.67.172.162 | attackbots | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.67.172.162 user=root Failed password for root from 80.67.172.162 port 33178 ssh2 Failed password for root from 80.67.172.162 port 33178 ssh2 Failed password for root from 80.67.172.162 port 33178 ssh2 Failed password for root from 80.67.172.162 port 33178 ssh2 |
2019-06-22 18:57:33 |
| 45.227.253.210 | attackspam | Jun 22 12:36:39 mail postfix/smtpd\[369\]: warning: unknown\[45.227.253.210\]: SASL PLAIN authentication failed: \ Jun 22 12:36:48 mail postfix/smtpd\[369\]: warning: unknown\[45.227.253.210\]: SASL PLAIN authentication failed: \ Jun 22 12:40:03 mail postfix/smtpd\[411\]: warning: unknown\[45.227.253.210\]: SASL PLAIN authentication failed: \ Jun 22 13:26:22 mail postfix/smtpd\[1203\]: warning: unknown\[45.227.253.210\]: SASL PLAIN authentication failed: \ |
2019-06-22 19:25:32 |
| 190.203.86.241 | attackbots | TCP port 445 (SMB) attempt blocked by firewall. [2019-06-22 06:22:54] |
2019-06-22 19:11:11 |
| 49.206.244.42 | attackbotsspam | Jun 21 19:47:31 vayu sshd[601651]: Bad protocol version identification '' from 49.206.244.42 Jun 21 19:47:47 vayu sshd[601661]: reveeclipse mapping checking getaddrinfo for broadband.actcorp.in [49.206.244.42] failed - POSSIBLE BREAK-IN ATTEMPT! Jun 21 19:47:47 vayu sshd[601661]: Invalid user support from 49.206.244.42 Jun 21 19:47:49 vayu sshd[601661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.206.244.42 Jun 21 19:47:51 vayu sshd[601661]: Failed password for invalid user support from 49.206.244.42 port 39952 ssh2 Jun 21 19:47:52 vayu sshd[601661]: Connection closed by 49.206.244.42 [preauth] Jun 21 19:48:08 vayu sshd[601771]: reveeclipse mapping checking getaddrinfo for broadband.actcorp.in [49.206.244.42] failed - POSSIBLE BREAK-IN ATTEMPT! Jun 21 19:48:08 vayu sshd[601771]: Invalid user ubnt from 49.206.244.42 Jun 21 19:48:10 vayu sshd[601771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh........ ------------------------------- |
2019-06-22 19:13:52 |
| 90.55.188.68 | attack | Automatic report - SSH Brute-Force Attack |
2019-06-22 19:23:31 |
| 36.68.4.236 | attackbotsspam | Jun 22 13:40:08 nginx sshd[24923]: Invalid user user1 from 36.68.4.236 Jun 22 13:40:08 nginx sshd[24923]: Received disconnect from 36.68.4.236 port 25837:11: Bye Bye [preauth] |
2019-06-22 19:40:19 |
| 103.247.9.62 | attackbotsspam | 103.247.9.62 - - [22/Jun/2019:00:23:43 -0400] "GET /?page=category&categoryID=95999999.1%20union%20select%20unhex(hex(version()))%20--%20and%201%3D1 HTTP/1.1" 200 75565 "-" "-" ... |
2019-06-22 19:05:01 |
| 54.38.47.28 | attack | leo_www |
2019-06-22 19:13:15 |
| 2.152.192.52 | attackbotsspam | Jun 22 10:46:40 work-partkepr sshd\[5186\]: Invalid user admin from 2.152.192.52 port 36179 Jun 22 10:46:40 work-partkepr sshd\[5186\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.152.192.52 ... |
2019-06-22 19:07:04 |
| 88.149.181.240 | attack | 19/6/22@00:21:23: FAIL: IoT-SSH address from=88.149.181.240 ... |
2019-06-22 19:45:20 |
| 187.120.131.144 | attackbots | SMTP-sasl brute force ... |
2019-06-22 19:14:40 |