City: Hong Kong
Region: unknown
Country: Hong Kong
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 107.148.130.47 | attackbotsspam | Portscan or hack attempt detected by psad/fwsnort |
2020-07-26 00:15:03 |
| 107.148.130.164 | attackbotsspam | May 23 22:14:15 debian-2gb-nbg1-2 kernel: \[12523666.093397\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=107.148.130.164 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=237 ID=62088 PROTO=TCP SPT=57072 DPT=1433 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-05-24 06:03:05 |
b'#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 107.148.0.0 - 107.149.255.255
CIDR: 107.148.0.0/15
NetName: PT-82-10
NetHandle: NET-107-148-0-0-1
Parent: NET107 (NET-107-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: PEG TECH INC (PT-82)
RegDate: 2013-11-08
Updated: 2024-07-17
Comment: Geofeed https://www.raksmart.com/ip2location.csv
Ref: https://rdap.arin.net/registry/ip/107.148.0.0
OrgName: PEG TECH INC
OrgId: PT-82
Address: 2805 Mission College Blvd
City: Santa Clara
StateProv: CA
PostalCode: 95054
Country: US
RegDate: 2012-03-27
Updated: 2024-11-25
Ref: https://rdap.arin.net/registry/entity/PT-82
OrgTechHandle: NOC12550-ARIN
OrgTechName: NOC
OrgTechPhone: +1-408-692-5581
OrgTechEmail: noc@petaexpress.com
OrgTechRef: https://rdap.arin.net/registry/entity/NOC12550-ARIN
OrgNOCHandle: NOC12550-ARIN
OrgNOCName: NOC
OrgNOCPhone: +1-408-692-5581
OrgNOCEmail: noc@petaexpress.com
OrgNOCRef: https://rdap.arin.net/registry/entity/NOC12550-ARIN
OrgAbuseHandle: ABUSE3497-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-408-692-5581
OrgAbuseEmail: abuse@petaexpress.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3497-ARIN
# end
# start
NetRange: 107.148.128.0 - 107.148.131.255
CIDR: 107.148.128.0/22
NetName: PEG-HK-202505
NetHandle: NET-107-148-128-0-1
Parent: PT-82-10 (NET-107-148-0-0-1)
NetType: Reassigned
OriginAS:
Customer: PEG-HK (C10854284)
RegDate: 2024-05-24
Updated: 2024-05-24
Ref: https://rdap.arin.net/registry/ip/107.148.128.0
CustName: PEG-HK
Address: 2 Dai Hei St, Tai Po Industrial Estate
City: HONG KONG
StateProv:
PostalCode:
Country: CN
RegDate: 2024-05-24
Updated: 2024-05-24
Ref: https://rdap.arin.net/registry/entity/C10854284
OrgTechHandle: NOC12550-ARIN
OrgTechName: NOC
OrgTechPhone: +1-408-692-5581
OrgTechEmail: noc@petaexpress.com
OrgTechRef: https://rdap.arin.net/registry/entity/NOC12550-ARIN
OrgNOCHandle: NOC12550-ARIN
OrgNOCName: NOC
OrgNOCPhone: +1-408-692-5581
OrgNOCEmail: noc@petaexpress.com
OrgNOCRef: https://rdap.arin.net/registry/entity/NOC12550-ARIN
OrgAbuseHandle: ABUSE3497-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-408-692-5581
OrgAbuseEmail: abuse@petaexpress.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3497-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#'
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.148.130.233
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56016
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;107.148.130.233. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026050300 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 03 22:00:36 CST 2026
;; MSG SIZE rcvd: 108
b'Host 233.130.148.107.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 107.148.130.233.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 153.153.66.81 | attack | RUSSIAN SCAMMERS ! |
2020-02-28 06:27:54 |
| 81.198.9.150 | attackspam | Port 23 (Telnet) access denied |
2020-02-28 06:30:31 |
| 138.197.89.212 | attack | suspicious action Thu, 27 Feb 2020 11:18:22 -0300 |
2020-02-28 06:27:00 |
| 121.229.49.68 | attackbotsspam | Feb 27 21:53:17 marvibiene sshd[7975]: Invalid user zhangkun from 121.229.49.68 port 50026 Feb 27 21:53:17 marvibiene sshd[7975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.229.49.68 Feb 27 21:53:17 marvibiene sshd[7975]: Invalid user zhangkun from 121.229.49.68 port 50026 Feb 27 21:53:18 marvibiene sshd[7975]: Failed password for invalid user zhangkun from 121.229.49.68 port 50026 ssh2 ... |
2020-02-28 06:50:24 |
| 104.155.117.36 | attackspam | trying to access non-authorized port |
2020-02-28 06:54:42 |
| 121.61.7.219 | attackspambots | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-02-28 06:23:58 |
| 222.186.180.223 | attackspam | Feb 27 23:57:32 server sshd[2872146]: Failed password for root from 222.186.180.223 port 20966 ssh2 Feb 27 23:57:36 server sshd[2872146]: Failed password for root from 222.186.180.223 port 20966 ssh2 Feb 27 23:57:40 server sshd[2872146]: Failed password for root from 222.186.180.223 port 20966 ssh2 |
2020-02-28 06:59:08 |
| 49.235.251.7 | attackspambots | Feb 27 23:48:12 dedicated sshd[3616]: Invalid user fred from 49.235.251.7 port 39208 |
2020-02-28 06:56:58 |
| 59.10.5.156 | attack | Invalid user bing from 59.10.5.156 port 36058 |
2020-02-28 06:50:48 |
| 121.158.110.65 | attackbotsspam | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-02-28 06:46:36 |
| 153.126.196.211 | attackbotsspam | Feb 27 17:06:22 master sshd[746]: Failed password for invalid user glt from 153.126.196.211 port 60012 ssh2 |
2020-02-28 06:43:57 |
| 45.134.179.57 | attackbots | Feb 27 23:38:23 debian-2gb-nbg1-2 kernel: \[5102296.457200\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.134.179.57 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=18408 PROTO=TCP SPT=48822 DPT=33951 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-02-28 06:47:00 |
| 218.92.0.175 | attack | Feb 28 00:01:22 ns381471 sshd[8666]: Failed password for root from 218.92.0.175 port 61044 ssh2 Feb 28 00:01:34 ns381471 sshd[8666]: error: maximum authentication attempts exceeded for root from 218.92.0.175 port 61044 ssh2 [preauth] |
2020-02-28 07:02:40 |
| 181.60.8.3 | attack | Brute force attempt |
2020-02-28 06:43:38 |
| 182.61.176.45 | attackbotsspam | Feb 27 23:10:51 server sshd[39154]: Failed password for invalid user chris from 182.61.176.45 port 34288 ssh2 Feb 27 23:17:14 server sshd[40524]: Failed password for root from 182.61.176.45 port 48242 ssh2 Feb 27 23:25:29 server sshd[42232]: Failed password for invalid user couchdb from 182.61.176.45 port 33994 ssh2 |
2020-02-28 06:31:28 |