城市(city): Singapore
省份(region): unknown
国家(country): Singapore
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
NetRange: 8.208.0.0 - 8.223.255.255
CIDR: 8.208.0.0/12
NetName: APNIC
NetHandle: NET-8-208-0-0-1
Parent: NET8 (NET-8-0-0-0-0)
NetType: Early Registrations, Transferred to APNIC
OriginAS:
Organization: Asia Pacific Network Information Centre (APNIC)
RegDate: 2018-04-24
Updated: 2018-04-24
Ref: https://rdap.arin.net/registry/ip/8.208.0.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois://whois.apnic.net
OrgName: Asia Pacific Network Information Centre
OrgId: APNIC
Address: PO Box 3646
City: South Brisbane
StateProv: QLD
PostalCode: 4101
Country: AU
RegDate:
Updated: 2012-01-24
Ref: https://rdap.arin.net/registry/entity/APNIC
ReferralServer: whois://whois.apnic.net
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
OrgAbuseHandle: AWC12-ARIN
OrgAbuseName: APNIC Whois Contact
OrgAbusePhone: +61 7 3858 3188
OrgAbuseEmail: search-apnic-not-arin@apnic.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
OrgTechHandle: AWC12-ARIN
OrgTechName: APNIC Whois Contact
OrgTechPhone: +61 7 3858 3188
OrgTechEmail: search-apnic-not-arin@apnic.net
OrgTechRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.apnic.net.
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '8.208.0.0 - 8.223.255.255'
% Abuse contact for '8.208.0.0 - 8.223.255.255' is 'abuse@alibaba-inc.com'
inetnum: 8.208.0.0 - 8.223.255.255
netname: ASEPL-SG
descr: Alibaba Cloud (Singapore) Private Limited
descr: 51 Bras Basah Road #03-06 Lazada One Singapore 189554, Singapore
country: SG
org: ORG-ASEP1-AP
admin-c: ASEP1-AP
tech-c: ASEP1-AP
abuse-c: AA1926-AP
status: ALLOCATED PORTABLE
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-lower: MAINT-ASEPL-SG
mnt-routes: MAINT-ASEPL-SG
mnt-irt: IRT-ASEPL-SG
last-modified: 2023-11-09T06:37:20Z
source: APNIC
irt: IRT-ASEPL-SG
address: 1 Raffles Place
e-mail: abuse@alibaba-inc.com
abuse-mailbox: abuse@alibaba-inc.com
admin-c: ASEP1-AP
tech-c: ASEP1-AP
auth: # Filtered
remarks: abuse@alibaba-inc.com was validated on 2025-04-14
mnt-by: MAINT-ASEPL-SG
last-modified: 2025-09-04T07:13:51Z
source: APNIC
organisation: ORG-ASEP1-AP
org-name: Alibaba Cloud (Singapore) Private Limited
org-type: LIR
country: SG
address: 51 Bras Basah Road # 03-06 Lazada One Singapore 189554
phone: +8657185022088-76449
e-mail: abuse@alibaba-inc.com
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2024-07-11T12:55:24Z
source: APNIC
role: ABUSE ASEPLSG
country: ZZ
address: 1 Raffles Place # 59-00 One Raffles Place, Tower One Singapore, Singapore
phone: +000000000
e-mail: abuse@alibaba-inc.com
admin-c: ASEP1-AP
tech-c: ASEP1-AP
nic-hdl: AA1926-AP
remarks: Generated from irt object IRT-ASEPL-SG
remarks: abuse@alibaba-inc.com was validated on 2025-04-14
abuse-mailbox: abuse@alibaba-inc.com
mnt-by: APNIC-ABUSE
last-modified: 2025-04-14T07:19:41Z
source: APNIC
role: Alibabacom Singapore E-Commerce Private Limited a
address: 1 Raffles Place #59-00 One Raffles Place, Tower One Singapore, Singapore
country: SG
phone: +86-571-85022088
fax-no: +86-571-85022088
e-mail: abuse@alibaba-inc.com
admin-c: ASEP1-AP
tech-c: ASEP1-AP
nic-hdl: ASEP1-AP
mnt-by: MAINT-ASEPL-SG
last-modified: 2025-07-01T06:25:24Z
source: APNIC
% Information related to '8.219.58.0/24AS134963'
route: 8.219.58.0/24
origin: AS134963
descr: Alibaba.com Singapore E-Commerce Private Limited
8 Shenton Way, #45-01 AXA Tower, Singapore 068811
mnt-by: MAINT-ASEPL-SG
last-modified: 2020-01-20T07:56:21Z
source: APNIC
% Information related to '8.219.58.0/24AS45102'
route: 8.219.58.0/24
origin: AS45102
descr: Alibaba.com Singapore E-Commerce Private Limited
8 Shenton Way, #45-01 AXA Tower, Singapore 068811
mnt-by: MAINT-ASEPL-SG
last-modified: 2020-01-20T07:26:19Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 8.219.58.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33751
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;8.219.58.117. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025101500 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 15 15:00:16 CST 2025
;; MSG SIZE rcvd: 105
Host 117.58.219.8.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 117.58.219.8.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
54.38.36.210 | attackbotsspam | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-09-26T21:05:27Z and 2020-09-26T21:12:53Z |
2020-09-27 06:24:31 |
1.1.192.221 | attackbotsspam | 2020-09-14T21:17:26.139038suse-nuc sshd[19525]: Invalid user admin1 from 1.1.192.221 port 49686 ... |
2020-09-27 05:59:57 |
186.251.180.236 | attackbots | Automatic report - Port Scan Attack |
2020-09-27 06:20:55 |
54.37.19.185 | attackbots | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-09-27 06:02:08 |
111.229.194.130 | attackbots | 2020-09-26 16:43:18.304566-0500 localhost sshd[78148]: Failed password for root from 111.229.194.130 port 39214 ssh2 |
2020-09-27 06:13:38 |
195.130.247.18 | attackspam | Honeypot attack, port: 445, PTR: host-247-18.citrs.com. |
2020-09-27 06:06:54 |
49.235.212.7 | attackspambots | 2020-09-27T00:54:27.701952hostname sshd[18893]: Invalid user cam from 49.235.212.7 port 31256 2020-09-27T00:54:29.785316hostname sshd[18893]: Failed password for invalid user cam from 49.235.212.7 port 31256 ssh2 2020-09-27T00:59:24.126052hostname sshd[20832]: Invalid user testuser from 49.235.212.7 port 26725 ... |
2020-09-27 05:55:07 |
104.211.245.131 | attackspambots | SSH Invalid Login |
2020-09-27 06:15:32 |
167.248.133.33 | attack | Sep 14 06:05:33 *hidden* postfix/postscreen[42581]: DNSBL rank 3 for [167.248.133.33]:40148 |
2020-09-27 06:26:11 |
175.123.253.220 | attack | SSH Invalid Login |
2020-09-27 06:03:10 |
222.186.169.194 | attackspam | Sep 26 22:06:39 localhost sshd[16237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.194 user=root Sep 26 22:06:41 localhost sshd[16237]: Failed password for root from 222.186.169.194 port 4796 ssh2 Sep 26 22:06:44 localhost sshd[16237]: Failed password for root from 222.186.169.194 port 4796 ssh2 Sep 26 22:06:39 localhost sshd[16237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.194 user=root Sep 26 22:06:41 localhost sshd[16237]: Failed password for root from 222.186.169.194 port 4796 ssh2 Sep 26 22:06:44 localhost sshd[16237]: Failed password for root from 222.186.169.194 port 4796 ssh2 Sep 26 22:06:39 localhost sshd[16237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.194 user=root Sep 26 22:06:41 localhost sshd[16237]: Failed password for root from 222.186.169.194 port 4796 ssh2 Sep 26 22:06:44 localhost sshd[16237]: ... |
2020-09-27 06:10:42 |
80.82.77.227 | attackbotsspam | Port Scan ... |
2020-09-27 06:01:52 |
46.37.188.139 | attackbotsspam | Invalid user tf2server from 46.37.188.139 port 47252 |
2020-09-27 06:02:28 |
160.153.234.236 | attackspam | Sep 26 19:38:03 h1745522 sshd[4719]: Invalid user gmodserver from 160.153.234.236 port 51144 Sep 26 19:38:03 h1745522 sshd[4719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.153.234.236 Sep 26 19:38:03 h1745522 sshd[4719]: Invalid user gmodserver from 160.153.234.236 port 51144 Sep 26 19:38:05 h1745522 sshd[4719]: Failed password for invalid user gmodserver from 160.153.234.236 port 51144 ssh2 Sep 26 19:41:37 h1745522 sshd[5004]: Invalid user wialon from 160.153.234.236 port 58796 Sep 26 19:41:37 h1745522 sshd[5004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.153.234.236 Sep 26 19:41:37 h1745522 sshd[5004]: Invalid user wialon from 160.153.234.236 port 58796 Sep 26 19:41:39 h1745522 sshd[5004]: Failed password for invalid user wialon from 160.153.234.236 port 58796 ssh2 Sep 26 19:45:11 h1745522 sshd[5172]: Invalid user lakshmi from 160.153.234.236 port 38210 ... |
2020-09-27 06:19:36 |
41.39.105.69 | attack | Listed on abuseat.org plus zen-spamhaus / proto=6 . srcport=54156 . dstport=1433 . (3551) |
2020-09-27 06:28:40 |