City: Hong Kong
Region: unknown
Country: Hong Kong
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '119.13.80.0 - 119.13.87.255'
% Abuse contact for '119.13.80.0 - 119.13.87.255' is 'hwssecurity@huaweicloud.com'
inetnum: 119.13.80.0 - 119.13.87.255
netname: Huawei-Cloud-HongKong
descr: Huawei Cloud HongKong Region
country: HK
admin-c: HIPL7-AP
tech-c: HIPL7-AP
abuse-c: AH905-AP
status: ASSIGNED NON-PORTABLE
mnt-by: MAINT-HIPL-SG
mnt-irt: IRT-HIPL-SG
last-modified: 2024-08-08T09:00:28Z
geofeed: https://res-static.hc-cdn.cn/cloudbu-site/china/zh-cn/IP-location/google-geo-feed.csv
source: APNIC
irt: IRT-HIPL-SG
address: 15A Changi Business Park Central 1 Eightrium
e-mail: hwssecurity@huaweicloud.com
abuse-mailbox: hwssecurity@huaweicloud.com
admin-c: HIPL4-AP
tech-c: HIPL4-AP
auth: # Filtered
remarks: hwssecurity@huaweicloud.com
remarks: hwssecurity@huaweicloud.com was validated on 2025-06-30
mnt-by: MAINT-HIPL-SG
last-modified: 2025-09-04T07:18:22Z
source: APNIC
role: ABUSE HIPLSG
country: ZZ
address: 15A Changi Business Park Central 1 Eightrium # 03-03/04, Singapore 486035
phone: +000000000
e-mail: hwssecurity@huaweicloud.com
admin-c: HIPL4-AP
tech-c: HIPL4-AP
nic-hdl: AH905-AP
remarks: Generated from irt object IRT-HIPL-SG
remarks: hwssecurity@huaweicloud.com was validated on 2025-06-30
abuse-mailbox: hwssecurity@huaweicloud.com
mnt-by: APNIC-ABUSE
last-modified: 2025-06-30T08:15:08Z
source: APNIC
role: HUAWEI INTERNATIONAL PTE LTD administrator
address: 15A Changi Business Park Central 1 Eightrium #03-03/04, Singapore 486035
country: SG
phone: +8618730601505
e-mail: wanggang222@huawei.com
admin-c: HIPL7-AP
tech-c: HIPL7-AP
nic-hdl: HIPL7-AP
notify: wanggang222@huawei.com
mnt-by: MAINT-HIPL-SG
last-modified: 2021-06-04T07:42:42Z
source: APNIC
% Information related to '119.13.80.0/24AS136907'
route: 119.13.80.0/24
country: HK
origin: AS136907
descr: HUAWEI INTERNATIONAL PTE. LTD.
15A Changi Business Park Central 1 Eightrium #03-03/04
mnt-by: MAINT-HIPL-SG
last-modified: 2025-01-15T09:32:06Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.13.80.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21477
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;119.13.80.168. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025100700 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 07 15:20:03 CST 2025
;; MSG SIZE rcvd: 106
168.80.13.119.in-addr.arpa domain name pointer ecs-119-13-80-168.compute.hwclouds-dns.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
168.80.13.119.in-addr.arpa name = ecs-119-13-80-168.compute.hwclouds-dns.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
132.232.23.12 | attack | FTP Brute-Force reported by Fail2Ban |
2019-08-11 17:10:46 |
14.186.46.202 | attack | ssh failed login |
2019-08-11 16:54:00 |
188.187.189.90 | attackspambots | [portscan] Port scan |
2019-08-11 17:14:53 |
94.102.51.117 | attack | Trying ports that it shouldn't be. |
2019-08-11 17:17:07 |
116.196.81.5 | attackbots | SSH Brute-Force reported by Fail2Ban |
2019-08-11 17:05:49 |
103.74.123.83 | attack | Aug 11 11:20:59 microserver sshd[51354]: Invalid user arma from 103.74.123.83 port 58846 Aug 11 11:20:59 microserver sshd[51354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.74.123.83 Aug 11 11:21:01 microserver sshd[51354]: Failed password for invalid user arma from 103.74.123.83 port 58846 ssh2 Aug 11 11:26:17 microserver sshd[52039]: Invalid user john from 103.74.123.83 port 48730 Aug 11 11:26:17 microserver sshd[52039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.74.123.83 Aug 11 11:36:33 microserver sshd[53381]: Invalid user bow from 103.74.123.83 port 56906 Aug 11 11:36:33 microserver sshd[53381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.74.123.83 Aug 11 11:36:35 microserver sshd[53381]: Failed password for invalid user bow from 103.74.123.83 port 56906 ssh2 Aug 11 11:41:48 microserver sshd[54052]: Invalid user bs from 103.74.123.83 port 46850 Aug 11 11:41:48 |
2019-08-11 17:26:39 |
92.124.138.118 | attackspam | blacklist |
2019-08-11 16:49:07 |
36.255.135.202 | attackspambots | DATE:2019-08-11 09:52:37, IP:36.255.135.202, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc-bis) |
2019-08-11 16:56:07 |
14.63.167.192 | attack | $f2bV_matches_ltvn |
2019-08-11 17:07:05 |
37.139.4.138 | attack | Aug 11 10:31:55 yesfletchmain sshd\[28535\]: Invalid user sasi from 37.139.4.138 port 45986 Aug 11 10:31:55 yesfletchmain sshd\[28535\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.4.138 Aug 11 10:31:57 yesfletchmain sshd\[28535\]: Failed password for invalid user sasi from 37.139.4.138 port 45986 ssh2 Aug 11 10:36:25 yesfletchmain sshd\[28546\]: Invalid user lixu from 37.139.4.138 port 42575 Aug 11 10:36:25 yesfletchmain sshd\[28546\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.4.138 ... |
2019-08-11 17:42:18 |
50.239.140.1 | attackspam | Aug 11 10:50:44 dedicated sshd[19169]: Invalid user lyle from 50.239.140.1 port 60052 |
2019-08-11 17:03:01 |
188.77.244.101 | attackspambots | Automatic report - Port Scan Attack |
2019-08-11 16:55:30 |
104.248.33.229 | attack | Aug 11 09:58:22 [host] sshd[1092]: Invalid user teamspeak from 104.248.33.229 Aug 11 09:58:22 [host] sshd[1092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.33.229 Aug 11 09:58:25 [host] sshd[1092]: Failed password for invalid user teamspeak from 104.248.33.229 port 33012 ssh2 |
2019-08-11 16:50:21 |
118.25.177.241 | attack | Aug 11 02:55:02 dallas01 sshd[904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.177.241 Aug 11 02:55:04 dallas01 sshd[904]: Failed password for invalid user fhem from 118.25.177.241 port 46702 ssh2 Aug 11 02:58:20 dallas01 sshd[1548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.177.241 |
2019-08-11 16:47:13 |
111.204.160.118 | attackspam | Aug 11 09:33:19 mail sshd\[24162\]: Failed password for invalid user kmysclub from 111.204.160.118 port 46570 ssh2 Aug 11 09:55:40 mail sshd\[24526\]: Invalid user mwang from 111.204.160.118 port 22535 ... |
2019-08-11 17:08:59 |