City: Shanghai
Region: Shanghai
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '106.14.0.0 - 106.15.255.255'
% Abuse contact for '106.14.0.0 - 106.15.255.255' is 'didong.jc@alibaba-inc.com'
inetnum: 106.14.0.0 - 106.15.255.255
netname: ALISOFT
descr: Aliyun Computing Co., LTD
descr: 5F, Builing D, the West Lake International Plaza of S&T
descr: No.391 Wen'er Road, Hangzhou, Zhejiang, China, 310099
country: CN
admin-c: ZM1015-AP
tech-c: ZM877-AP
tech-c: ZM876-AP
tech-c: ZM875-AP
abuse-c: AC1601-AP
status: ALLOCATED PORTABLE
mnt-by: MAINT-CNNIC-AP
mnt-irt: IRT-ALISOFT-CN
last-modified: 2023-11-28T00:56:50Z
source: APNIC
irt: IRT-ALISOFT-CN
address: No.391 Wen'er Road, Hangzhou, Zhejiang, China, 310099
e-mail: didong.jc@alibaba-inc.com
abuse-mailbox: didong.jc@alibaba-inc.com
auth: # Filtered
admin-c: ZM877-AP
tech-c: ZM877-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2021-09-05T23:38:36Z
source: APNIC
role: ABUSE CNNICCN
country: ZZ
address: Beijing, China
phone: +000000000
e-mail: ipas@cnnic.cn
admin-c: IP50-AP
tech-c: IP50-AP
nic-hdl: AC1601-AP
remarks: Generated from irt object IRT-CNNIC-CN
remarks: ipas@cnnic.cn is invalid
abuse-mailbox: ipas@cnnic.cn
mnt-by: APNIC-ABUSE
last-modified: 2025-09-19T17:20:32Z
source: APNIC
person: Li Jia
address: NO.969 West Wen Yi Road, Yu Hang District, Hangzhou
country: CN
phone: +86-0571-85022088
e-mail: jiali.jl@alibaba-inc.com
nic-hdl: ZM1015-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2025-07-01T07:12:42Z
source: APNIC
person: Guoxin Gao
address: 5F, Builing D, the West Lake International Plaza of S&T
address: No.391 Wen'er Road, Hangzhou City
address: Zhejiang, China, 310099
country: CN
phone: +86-0571-85022600
fax-no: +86-0571-85022600
e-mail: anti-spam@list.alibaba-inc.com
nic-hdl: ZM875-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2014-07-30T01:56:01Z
source: APNIC
person: security trouble
e-mail: abuse@alibaba-inc.com
address: 5th,floor,Building D,the West Lake International Plaza of S&T,391#Wen??r Road
address: Hangzhou, Zhejiang, China
phone: +86-0571-85022600
country: CN
mnt-by: MAINT-CNNIC-AP
nic-hdl: ZM876-AP
last-modified: 2025-07-01T07:06:11Z
source: APNIC
person: Guowei Pan
address: 5F, Builing D, the West Lake International Plaza of S&T
address: No.391 Wen'er Road, Hangzhou City
address: Zhejiang, China, 310099
country: CN
phone: +86-0571-85022088-30763
fax-no: +86-0571-85022600
e-mail: abuse@alibaba-inc.com
nic-hdl: ZM877-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2025-07-01T07:05:46Z
source: APNIC
% Information related to '106.14.169.0/24AS37963'
route: 106.14.169.0/24
descr: Alibaba (US) Technology Co., Ltd.
origin: AS37963
mnt-by: MAINT-CNNIC-AP
last-modified: 2020-06-28T00:07:27Z
source: APNIC
% Information related to '106.14.169.0/24AS45102'
route: 106.14.169.0/24
descr: Alibaba (US) Technology Co., Ltd.
origin: AS45102
mnt-by: MAINT-CNNIC-AP
last-modified: 2020-06-28T00:06:57Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.14.169.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13822
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;106.14.169.168. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025092401 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 25 01:09:22 CST 2025
;; MSG SIZE rcvd: 107
Host 168.169.14.106.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 168.169.14.106.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
1.1.193.159 | attackspam | Nov 26 06:51:10 giraffe sshd[22158]: Invalid user windolf from 1.1.193.159 Nov 26 06:51:10 giraffe sshd[22158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.1.193.159 Nov 26 06:51:12 giraffe sshd[22158]: Failed password for invalid user windolf from 1.1.193.159 port 56110 ssh2 Nov 26 06:51:12 giraffe sshd[22158]: Received disconnect from 1.1.193.159 port 56110:11: Bye Bye [preauth] Nov 26 06:51:12 giraffe sshd[22158]: Disconnected from 1.1.193.159 port 56110 [preauth] Nov 26 06:55:40 giraffe sshd[22246]: Invalid user gilbertine from 1.1.193.159 Nov 26 06:55:40 giraffe sshd[22246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.1.193.159 Nov 26 06:55:42 giraffe sshd[22246]: Failed password for invalid user gilbertine from 1.1.193.159 port 58234 ssh2 Nov 26 06:55:42 giraffe sshd[22246]: Received disconnect from 1.1.193.159 port 58234:11: Bye Bye [preauth] Nov 26 06:55:42 giraffe sshd[2........ ------------------------------- |
2019-11-26 19:20:46 |
112.85.42.182 | attack | Nov 26 08:14:08 firewall sshd[15752]: Failed password for root from 112.85.42.182 port 50469 ssh2 Nov 26 08:14:11 firewall sshd[15752]: Failed password for root from 112.85.42.182 port 50469 ssh2 Nov 26 08:14:15 firewall sshd[15752]: Failed password for root from 112.85.42.182 port 50469 ssh2 ... |
2019-11-26 19:21:21 |
222.89.236.175 | attackbotsspam | Helo |
2019-11-26 19:47:53 |
112.85.42.171 | attackspambots | SSH Brute Force, server-1 sshd[7509]: Failed password for root from 112.85.42.171 port 59606 ssh2 |
2019-11-26 19:39:30 |
168.243.91.19 | attack | Nov 26 07:37:32 markkoudstaal sshd[17413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.243.91.19 Nov 26 07:37:34 markkoudstaal sshd[17413]: Failed password for invalid user lewison from 168.243.91.19 port 37583 ssh2 Nov 26 07:44:40 markkoudstaal sshd[18172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.243.91.19 |
2019-11-26 19:45:22 |
211.103.31.226 | attack | 2019-11-26T07:01:48.688446abusebot-2.cloudsearch.cf sshd\[26008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.103.31.226 user=root |
2019-11-26 19:13:28 |
209.97.171.21 | attack | Nov 26 01:08:54 tdfoods sshd\[20449\]: Invalid user vcsa from 209.97.171.21 Nov 26 01:08:54 tdfoods sshd\[20449\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.171.21 Nov 26 01:08:56 tdfoods sshd\[20449\]: Failed password for invalid user vcsa from 209.97.171.21 port 51482 ssh2 Nov 26 01:16:27 tdfoods sshd\[21167\]: Invalid user cattyboy from 209.97.171.21 Nov 26 01:16:27 tdfoods sshd\[21167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.171.21 |
2019-11-26 19:26:33 |
2a03:b0c0:1:e0::36a:6001 | attackbots | Nov 26 07:23:18 srv01 sshd[26469]: Unable to negotiate with 2a03:b0c0:1:e0::36a:6001 port 52288: no matching host key type found. Their offer: ssh-dss [preauth] ... |
2019-11-26 19:49:46 |
121.54.175.217 | attackspam | 11/26/2019-07:23:30.758572 121.54.175.217 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2019-11-26 19:42:19 |
45.55.184.78 | attackspam | Nov 25 09:33:26 server sshd\[13015\]: Failed password for invalid user iccha from 45.55.184.78 port 55456 ssh2 Nov 26 09:02:19 server sshd\[19045\]: Invalid user reyaud from 45.55.184.78 Nov 26 09:02:19 server sshd\[19045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.184.78 Nov 26 09:02:21 server sshd\[19045\]: Failed password for invalid user reyaud from 45.55.184.78 port 36116 ssh2 Nov 26 09:23:47 server sshd\[24768\]: Invalid user tatiana from 45.55.184.78 Nov 26 09:23:47 server sshd\[24768\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.184.78 ... |
2019-11-26 19:33:35 |
68.183.48.172 | attack | 2019-11-26T10:24:57.454958abusebot-2.cloudsearch.cf sshd\[26464\]: Invalid user charles from 68.183.48.172 port 51064 |
2019-11-26 19:19:59 |
52.213.4.229 | attack | xmlrpc attack |
2019-11-26 19:16:14 |
130.61.88.249 | attackspambots | Nov 26 09:07:50 sauna sshd[1342]: Failed password for root from 130.61.88.249 port 61160 ssh2 Nov 26 09:14:04 sauna sshd[1515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.88.249 ... |
2019-11-26 19:48:20 |
181.49.117.166 | attackbotsspam | SSH bruteforce (Triggered fail2ban) |
2019-11-26 19:13:54 |
137.63.246.39 | attackspambots | Nov 26 07:41:04 vps647732 sshd[4714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.63.246.39 Nov 26 07:41:06 vps647732 sshd[4714]: Failed password for invalid user testaspnet from 137.63.246.39 port 39044 ssh2 ... |
2019-11-26 19:09:44 |