City: Hangzhou
Region: Zhejiang
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '121.196.0.0 - 121.199.255.255'
% Abuse contact for '121.196.0.0 - 121.199.255.255' is 'didong.jc@alibaba-inc.com'
inetnum: 121.196.0.0 - 121.199.255.255
netname: ALISOFT
descr: Aliyun Computing Co., LTD
descr: 5F, Builing D, the West Lake International Plaza of S&T
descr: No.391 Wen'er Road, Hangzhou, Zhejiang, China, 310099
country: CN
admin-c: ZM1015-AP
tech-c: ZM877-AP
tech-c: ZM876-AP
tech-c: ZM875-AP
abuse-c: AC1601-AP
status: ALLOCATED PORTABLE
mnt-by: MAINT-CNNIC-AP
mnt-irt: IRT-ALISOFT-CN
last-modified: 2023-11-28T00:57:01Z
source: APNIC
irt: IRT-ALISOFT-CN
address: No.391 Wen'er Road, Hangzhou, Zhejiang, China, 310099
e-mail: didong.jc@alibaba-inc.com
abuse-mailbox: didong.jc@alibaba-inc.com
admin-c: ZM877-AP
tech-c: ZM877-AP
auth: # Filtered
mnt-by: MAINT-CNNIC-AP
last-modified: 2025-11-18T00:35:07Z
source: APNIC
role: ABUSE CNNICCN
country: ZZ
address: Beijing, China
phone: +000000000
e-mail: ipas@cnnic.cn
admin-c: IP50-AP
tech-c: IP50-AP
nic-hdl: AC1601-AP
remarks: Generated from irt object IRT-CNNIC-CN
remarks: ipas@cnnic.cn is invalid
abuse-mailbox: ipas@cnnic.cn
mnt-by: APNIC-ABUSE
last-modified: 2025-09-19T17:20:32Z
source: APNIC
person: Li Jia
address: NO.969 West Wen Yi Road, Yu Hang District, Hangzhou
country: CN
phone: +86-0571-85022088
e-mail: jiali.jl@alibaba-inc.com
nic-hdl: ZM1015-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2025-07-01T07:12:42Z
source: APNIC
person: Guoxin Gao
address: 5F, Builing D, the West Lake International Plaza of S&T
address: No.391 Wen'er Road, Hangzhou City
address: Zhejiang, China, 310099
country: CN
phone: +86-0571-85022600
fax-no: +86-0571-85022600
e-mail: anti-spam@list.alibaba-inc.com
nic-hdl: ZM875-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2014-07-30T01:56:01Z
source: APNIC
person: security trouble
e-mail: abuse@alibaba-inc.com
address: 5th,floor,Building D,the West Lake International Plaza of S&T,391#Wen??r Road
address: Hangzhou, Zhejiang, China
phone: +86-0571-85022600
country: CN
mnt-by: MAINT-CNNIC-AP
nic-hdl: ZM876-AP
last-modified: 2025-07-01T07:06:11Z
source: APNIC
person: Guowei Pan
address: 5F, Builing D, the West Lake International Plaza of S&T
address: No.391 Wen'er Road, Hangzhou City
address: Zhejiang, China, 310099
country: CN
phone: +86-0571-85022088-30763
fax-no: +86-0571-85022600
e-mail: abuse@alibaba-inc.com
nic-hdl: ZM877-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2025-07-01T07:05:46Z
source: APNIC
% Information related to '121.196.0.0/14AS37963'
route: 121.196.0.0/14
descr: Hangzhou Alibaba Advertising Co.,Ltd.
country: CN
origin: AS37963
mnt-by: MAINT-CNNIC-AP
last-modified: 2019-08-06T02:28:03Z
source: APNIC
% Information related to '121.196.0.0/14AS45102'
route: 121.196.0.0/14
descr: Alibaba (US) Technology Co., Ltd.
country: CN
origin: AS45102
mnt-by: MAINT-CNNIC-AP
last-modified: 2019-08-06T02:28:04Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.199.173.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59043
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;121.199.173.234. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026030101 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 02 02:00:02 CST 2026
;; MSG SIZE rcvd: 108
Host 234.173.199.121.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 234.173.199.121.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 119.254.155.187 | attackspam | Jun 10 14:15:58 PorscheCustomer sshd[9574]: Failed password for root from 119.254.155.187 port 1487 ssh2 Jun 10 14:19:35 PorscheCustomer sshd[9655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.254.155.187 Jun 10 14:19:37 PorscheCustomer sshd[9655]: Failed password for invalid user aguko from 119.254.155.187 port 55375 ssh2 ... |
2020-06-10 21:14:55 |
| 157.230.150.140 | attackbotsspam | scans 2 times in preceeding hours on the ports (in chronological order) 18082 18082 |
2020-06-10 21:10:41 |
| 115.78.1.102 | attackbotsspam | Unauthorized connection attempt from IP address 115.78.1.102 on Port 445(SMB) |
2020-06-10 21:03:10 |
| 78.85.18.163 | attackspam | Jun 10 14:01:34 debian kernel: [689449.200918] [UFW BLOCK] IN=eth0 OUT= MAC=52:54:00:be:e4:65:08:e8:4f:6e:48:0c:08:00 SRC=78.85.18.163 DST=89.252.131.35 LEN=44 TOS=0x00 PREC=0x00 TTL=244 ID=58849 DF PROTO=TCP SPT=44053 DPT=23 WINDOW=14600 RES=0x00 SYN URGP=0 |
2020-06-10 21:17:52 |
| 41.205.77.58 | attackspambots | Unauthorized connection attempt from IP address 41.205.77.58 on Port 445(SMB) |
2020-06-10 21:32:58 |
| 49.233.17.42 | attack | 5x Failed Password |
2020-06-10 21:12:14 |
| 122.160.10.125 | attack | Unauthorized connection attempt from IP address 122.160.10.125 on Port 445(SMB) |
2020-06-10 20:56:41 |
| 139.59.12.65 | attack | SSH bruteforce |
2020-06-10 20:56:10 |
| 61.252.141.83 | attackbots | Jun 10 09:08:39 firewall sshd[30276]: Invalid user sherlock from 61.252.141.83 Jun 10 09:08:41 firewall sshd[30276]: Failed password for invalid user sherlock from 61.252.141.83 port 50101 ssh2 Jun 10 09:12:28 firewall sshd[30365]: Invalid user gnf from 61.252.141.83 ... |
2020-06-10 21:00:03 |
| 45.8.227.175 | attackspam | Automatic report - XMLRPC Attack |
2020-06-10 20:55:16 |
| 60.190.226.189 | attack | Jun 10 12:59:46 vps339862 kernel: \[11005701.512614\] \[iptables\] PORT DENIED: IN=eth0 OUT= MAC=fa:16:3e:65:a1:f6:06:39:8f:aa:3b:a2:08:00 SRC=60.190.226.189 DST=51.254.206.43 LEN=88 TOS=0x00 PREC=0x00 TTL=109 ID=1080 DF PROTO=UDP SPT=37975 DPT=3128 LEN=68 Jun 10 13:00:25 vps339862 kernel: \[11005740.560670\] \[iptables\] PORT DENIED: IN=eth0 OUT= MAC=fa:16:3e:65:a1:f6:06:39:8f:aa:3b:a2:08:00 SRC=60.190.226.189 DST=51.254.206.43 LEN=88 TOS=0x00 PREC=0x00 TTL=109 ID=2452 DF PROTO=UDP SPT=4679 DPT=3260 LEN=68 Jun 10 13:01:04 vps339862 kernel: \[11005779.807216\] \[iptables\] PORT DENIED: IN=eth0 OUT= MAC=fa:16:3e:65:a1:f6:06:39:8f:aa:3b:a2:08:00 SRC=60.190.226.189 DST=51.254.206.43 LEN=88 TOS=0x00 PREC=0x00 TTL=109 ID=1064 DF PROTO=UDP SPT=37655 DPT=3306 LEN=68 Jun 10 13:01:43 vps339862 kernel: \[11005818.893525\] \[iptables\] PORT DENIED: IN=eth0 OUT= MAC=fa:16:3e:65:a1:f6:06:39:8f:aa:3b:a2:08:00 SRC=60.190.226.189 DST=51.254.206.43 LEN=88 TOS=0x00 PREC=0x00 TTL=109 ID=1885 DF PROTO= ... |
2020-06-10 21:06:38 |
| 212.64.59.227 | attackspam | Tried sshing with brute force. |
2020-06-10 21:12:40 |
| 190.128.175.6 | attackbots | k+ssh-bruteforce |
2020-06-10 21:05:14 |
| 92.63.196.8 | attackspam | Port-scan: detected 204 distinct ports within a 24-hour window. |
2020-06-10 20:55:02 |
| 80.211.84.100 | attackspambots | DK_ARUBA-MNT_<177>1591786879 [1:2403450:57905] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 76 [Classification: Misc Attack] [Priority: 2]: |
2020-06-10 21:36:13 |