City: unknown
Region: unknown
Country: Hong Kong
Internet Service Provider: CSL Limited
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '111.68.6.0 - 111.68.6.255'
% Abuse contact for '111.68.6.0 - 111.68.6.255' is 'network@apacserver.hk'
inetnum: 111.68.6.0 - 111.68.6.255
netname: Netsec
descr: Netsec
country: HK
admin-c: NN541-AP
tech-c: NN541-AP
abuse-c: AA2052-AP
status: ALLOCATED NON-PORTABLE
mnt-by: MAINT-APACSERVER-HK
mnt-irt: IRT-APACSERVER-HK
last-modified: 2025-05-16T19:08:05Z
source: APNIC
irt: IRT-APACSERVER-HK
address: Unit 2607-08, 26/F, Billion Plaza, 8 Cheung Yue Street, Cheung Sha Wan, KLN, H.K.
e-mail: network@apacserver.hk
abuse-mailbox: network@apacserver.hk
admin-c: APSC1-AP
tech-c: APSC1-AP
auth: # Filtered
remarks: network@apacserver.hk
remarks: network@apacserver.hk was validated on 2025-04-17
mnt-by: MAINT-APACSERVER-HK
last-modified: 2025-09-04T05:36:12Z
source: APNIC
role: ABUSE APACSERVERHK
country: ZZ
address: Unit 2607-08, 26/F, Billion Plaza, 8 Cheung Yue Street, Cheung Sha Wan, KLN, H.K.
phone: +000000000
e-mail: network@apacserver.hk
admin-c: APSC1-AP
tech-c: APSC1-AP
nic-hdl: AA2052-AP
remarks: Generated from irt object IRT-APACSERVER-HK
remarks: network@apacserver.hk was validated on 2025-04-17
abuse-mailbox: network@apacserver.hk
mnt-by: APNIC-ABUSE
last-modified: 2025-04-17T02:17:59Z
source: APNIC
role: NETSEC NOC
address: Suite 1007, 10/F, The Bay Hub, 17 Kai Cheung Rd, Kowloon Bay
country: HK
phone: +85227511100
e-mail: noc@netsec.com
admin-c: NN541-AP
tech-c: NN541-AP
nic-hdl: NN541-AP
mnt-by: MAINT-NETSEC-HK
last-modified: 2025-03-14T05:55:40Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 111.68.6.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40328
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;111.68.6.82. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025101800 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 18 18:01:46 CST 2025
;; MSG SIZE rcvd: 104
b'Host 82.6.68.111.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 111.68.6.82.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
138.197.166.110 | attack | Sep 26 15:38:27 areeb-Workstation sshd[21266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.166.110 Sep 26 15:38:29 areeb-Workstation sshd[21266]: Failed password for invalid user henrietta from 138.197.166.110 port 33718 ssh2 ... |
2019-09-26 18:18:25 |
132.148.18.178 | attackbots | WordPress login Brute force / Web App Attack on client site. |
2019-09-26 18:11:43 |
196.251.5.80 | attackspam | Automatic report - Port Scan Attack |
2019-09-26 18:41:53 |
193.29.13.24 | attack | 20 attempts against mh_ha-misbehave-ban on oak.magehost.pro |
2019-09-26 18:23:03 |
218.72.76.143 | attack | Sep 24 12:01:41 xb3 sshd[4051]: reveeclipse mapping checking getaddrinfo for 143.76.72.218.broad.hz.zj.dynamic.163data.com.cn [218.72.76.143] failed - POSSIBLE BREAK-IN ATTEMPT! Sep 24 12:01:43 xb3 sshd[4051]: Failed password for invalid user qazwsxedc from 218.72.76.143 port 50078 ssh2 Sep 24 12:01:44 xb3 sshd[4051]: Received disconnect from 218.72.76.143: 11: Bye Bye [preauth] Sep 24 12:05:26 xb3 sshd[817]: reveeclipse mapping checking getaddrinfo for 143.76.72.218.broad.hz.zj.dynamic.163data.com.cn [218.72.76.143] failed - POSSIBLE BREAK-IN ATTEMPT! Sep 24 12:05:28 xb3 sshd[817]: Failed password for invalid user p4$$w0rd from 218.72.76.143 port 55356 ssh2 Sep 24 12:05:28 xb3 sshd[817]: Received disconnect from 218.72.76.143: 11: Bye Bye [preauth] Sep 24 12:08:56 xb3 sshd[11925]: reveeclipse mapping checking getaddrinfo for 143.76.72.218.broad.hz.zj.dynamic.163data.com.cn [218.72.76.143] failed - POSSIBLE BREAK-IN ATTEMPT! Sep 24 12:08:57 xb3 sshd[11925]: Failed passw........ ------------------------------- |
2019-09-26 18:06:50 |
111.207.105.199 | attackbots | $f2bV_matches |
2019-09-26 18:15:38 |
5.188.210.47 | attackspambots | ft-1848-basketball.de 5.188.210.47 \[26/Sep/2019:05:45:20 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 578 "-" "Mozilla/5.0 \(Windows NT 10.0\; Win64\; x64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/74.0.3729.169 Safari/537.36" ft-1848-basketball.de 5.188.210.47 \[26/Sep/2019:05:45:20 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 578 "-" "Mozilla/5.0 \(Windows NT 10.0\; Win64\; x64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/74.0.3729.169 Safari/537.36" |
2019-09-26 17:54:24 |
148.70.62.12 | attackspam | Automatic report - Banned IP Access |
2019-09-26 18:10:57 |
176.31.162.82 | attackspam | Sep 26 09:47:10 sshgateway sshd\[16786\]: Invalid user 123456 from 176.31.162.82 Sep 26 09:47:10 sshgateway sshd\[16786\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.162.82 Sep 26 09:47:12 sshgateway sshd\[16786\]: Failed password for invalid user 123456 from 176.31.162.82 port 56936 ssh2 |
2019-09-26 18:01:27 |
185.234.217.48 | attack | Sep 26 06:14:40 mail postfix/smtpd\[32270\]: warning: unknown\[185.234.217.48\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Sep 26 06:29:35 mail postfix/smtpd\[31965\]: warning: unknown\[185.234.217.48\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Sep 26 06:44:32 mail postfix/smtpd\[644\]: warning: unknown\[185.234.217.48\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Sep 26 07:29:44 mail postfix/smtpd\[1639\]: warning: unknown\[185.234.217.48\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ |
2019-09-26 18:22:46 |
169.239.79.227 | attack | Port scan: Attack repeated for 24 hours |
2019-09-26 18:16:41 |
23.129.64.201 | attackspam | Sep 26 09:16:16 thevastnessof sshd[1169]: error: maximum authentication attempts exceeded for root from 23.129.64.201 port 36252 ssh2 [preauth] ... |
2019-09-26 18:05:58 |
120.224.121.10 | attackbotsspam | 19/9/25@23:44:02: FAIL: IoT-Telnet address from=120.224.121.10 ... |
2019-09-26 18:24:48 |
129.204.201.9 | attackbots | Sep 26 09:30:28 mail sshd\[2810\]: Invalid user sabine from 129.204.201.9 Sep 26 09:30:28 mail sshd\[2810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.201.9 Sep 26 09:30:30 mail sshd\[2810\]: Failed password for invalid user sabine from 129.204.201.9 port 54342 ssh2 ... |
2019-09-26 18:12:14 |
221.228.111.131 | attack | Sep 25 23:06:09 hpm sshd\[5070\]: Invalid user rtorrent from 221.228.111.131 Sep 25 23:06:09 hpm sshd\[5070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.228.111.131 Sep 25 23:06:11 hpm sshd\[5070\]: Failed password for invalid user rtorrent from 221.228.111.131 port 51992 ssh2 Sep 25 23:14:50 hpm sshd\[5849\]: Invalid user mcadmin from 221.228.111.131 Sep 25 23:14:50 hpm sshd\[5849\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.228.111.131 |
2019-09-26 18:04:13 |