City: Hangzhou
Region: Zhejiang
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '121.40.0.0 - 121.43.255.255'
% Abuse contact for '121.40.0.0 - 121.43.255.255' is 'didong.jc@alibaba-inc.com'
inetnum: 121.40.0.0 - 121.43.255.255
netname: ALISOFT
descr: Aliyun Computing Co., LTD
descr: 5F, Builing D, the West Lake International Plaza of S&T
descr: No.391 Wen'er Road, Hangzhou, Zhejiang, China, 310099
country: CN
admin-c: ZM1015-AP
tech-c: ZM877-AP
tech-c: ZM876-AP
tech-c: ZM875-AP
abuse-c: AC1601-AP
status: ALLOCATED PORTABLE
mnt-by: MAINT-CNNIC-AP
mnt-irt: IRT-ALISOFT-CN
last-modified: 2023-11-28T00:57:01Z
source: APNIC
irt: IRT-ALISOFT-CN
address: No.391 Wen'er Road, Hangzhou, Zhejiang, China, 310099
e-mail: didong.jc@alibaba-inc.com
abuse-mailbox: didong.jc@alibaba-inc.com
admin-c: ZM877-AP
tech-c: ZM877-AP
auth: # Filtered
mnt-by: MAINT-CNNIC-AP
last-modified: 2025-11-18T00:35:07Z
source: APNIC
role: ABUSE CNNICCN
country: ZZ
address: Beijing, China
phone: +000000000
e-mail: ipas@cnnic.cn
admin-c: IP50-AP
tech-c: IP50-AP
nic-hdl: AC1601-AP
remarks: Generated from irt object IRT-CNNIC-CN
remarks: ipas@cnnic.cn is invalid
abuse-mailbox: ipas@cnnic.cn
mnt-by: APNIC-ABUSE
last-modified: 2025-09-19T17:20:32Z
source: APNIC
person: Li Jia
address: NO.969 West Wen Yi Road, Yu Hang District, Hangzhou
country: CN
phone: +86-0571-85022088
e-mail: jiali.jl@alibaba-inc.com
nic-hdl: ZM1015-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2025-07-01T07:12:42Z
source: APNIC
person: Guoxin Gao
address: 5F, Builing D, the West Lake International Plaza of S&T
address: No.391 Wen'er Road, Hangzhou City
address: Zhejiang, China, 310099
country: CN
phone: +86-0571-85022600
fax-no: +86-0571-85022600
e-mail: anti-spam@list.alibaba-inc.com
nic-hdl: ZM875-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2014-07-30T01:56:01Z
source: APNIC
person: security trouble
e-mail: abuse@alibaba-inc.com
address: 5th,floor,Building D,the West Lake International Plaza of S&T,391#Wen??r Road
address: Hangzhou, Zhejiang, China
phone: +86-0571-85022600
country: CN
mnt-by: MAINT-CNNIC-AP
nic-hdl: ZM876-AP
last-modified: 2025-07-01T07:06:11Z
source: APNIC
person: Guowei Pan
address: 5F, Builing D, the West Lake International Plaza of S&T
address: No.391 Wen'er Road, Hangzhou City
address: Zhejiang, China, 310099
country: CN
phone: +86-0571-85022088-30763
fax-no: +86-0571-85022600
e-mail: abuse@alibaba-inc.com
nic-hdl: ZM877-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2025-07-01T07:05:46Z
source: APNIC
% Information related to '121.40.0.0/14AS37963'
route: 121.40.0.0/14
descr: Hangzhou Alibaba Advertising Co.,Ltd.
country: CN
origin: AS37963
mnt-by: MAINT-CNNIC-AP
last-modified: 2019-08-07T23:28:05Z
source: APNIC
% Information related to '121.40.0.0/14AS45102'
route: 121.40.0.0/14
descr: Alibaba (US) Technology Co., Ltd.
country: CN
origin: AS45102
mnt-by: MAINT-CNNIC-AP
last-modified: 2019-08-07T23:28:03Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.40.41.211
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55298
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;121.40.41.211. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040400 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 04 17:30:03 CST 2026
;; MSG SIZE rcvd: 106
Host 211.41.40.121.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 211.41.40.121.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 104.131.58.179 | attackbotsspam | WordPress login Brute force / Web App Attack on client site. |
2020-04-07 13:54:42 |
| 94.33.52.178 | attackbotsspam | Apr 7 05:34:51 localhost sshd[1740]: Invalid user misha from 94.33.52.178 port 43866 Apr 7 05:34:51 localhost sshd[1740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94-33-52-178.static.clienti.tiscali.it Apr 7 05:34:51 localhost sshd[1740]: Invalid user misha from 94.33.52.178 port 43866 Apr 7 05:34:53 localhost sshd[1740]: Failed password for invalid user misha from 94.33.52.178 port 43866 ssh2 Apr 7 05:44:37 localhost sshd[2852]: Invalid user facturacion from 94.33.52.178 port 53868 ... |
2020-04-07 13:55:46 |
| 2.116.178.212 | attackspambots | Apr 7 00:06:32 mail sshd\[21274\]: Invalid user jessie from 2.116.178.212 Apr 7 00:06:32 mail sshd\[21274\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.116.178.212 ... |
2020-04-07 13:59:48 |
| 23.253.73.217 | attackspambots | SSH Brute-Forcing (server2) |
2020-04-07 14:20:39 |
| 209.17.96.122 | attackspam | Automatic report - Banned IP Access |
2020-04-07 13:57:31 |
| 36.66.149.211 | attack | Apr 7 01:26:40 debian sshd[20135]: Unable to negotiate with 36.66.149.211 port 40340: no matching key exchange method found. Their offer: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth] Apr 7 01:29:12 debian sshd[20188]: Unable to negotiate with 36.66.149.211 port 60334: no matching key exchange method found. Their offer: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth] ... |
2020-04-07 14:26:48 |
| 138.68.243.62 | attackbots | Icarus honeypot on github |
2020-04-07 14:14:56 |
| 202.168.71.146 | attackspambots | 2020-04-06T21:34:05.559467-07:00 suse-nuc sshd[22097]: Invalid user hydra from 202.168.71.146 port 36930 ... |
2020-04-07 14:25:42 |
| 139.199.48.217 | attack | Apr 7 05:44:44 game-panel sshd[14064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.48.217 Apr 7 05:44:46 game-panel sshd[14064]: Failed password for invalid user user from 139.199.48.217 port 51494 ssh2 Apr 7 05:49:44 game-panel sshd[14293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.48.217 |
2020-04-07 14:23:11 |
| 116.247.81.100 | attack | Apr 6 19:30:12 eddieflores sshd\[6424\]: Invalid user user from 116.247.81.100 Apr 6 19:30:12 eddieflores sshd\[6424\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.247.81.100 Apr 6 19:30:14 eddieflores sshd\[6424\]: Failed password for invalid user user from 116.247.81.100 port 53824 ssh2 Apr 6 19:35:43 eddieflores sshd\[6894\]: Invalid user billy from 116.247.81.100 Apr 6 19:35:43 eddieflores sshd\[6894\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.247.81.100 |
2020-04-07 14:09:51 |
| 46.148.20.56 | attackbots | 0,41-01/14 [bc01/m14] PostRequest-Spammer scoring: essen |
2020-04-07 14:17:58 |
| 138.68.2.107 | attack | Telnet Server BruteForce Attack |
2020-04-07 14:18:56 |
| 106.12.89.154 | attack | Apr 7 08:01:52 vpn01 sshd[29723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.89.154 Apr 7 08:01:54 vpn01 sshd[29723]: Failed password for invalid user postgres from 106.12.89.154 port 58442 ssh2 ... |
2020-04-07 14:13:36 |
| 218.92.0.189 | attackspambots | 04/07/2020-01:48:30.287509 218.92.0.189 Protocol: 6 ET SCAN Potential SSH Scan |
2020-04-07 13:48:58 |
| 118.68.226.25 | attack | Attempted hacking |
2020-04-07 13:53:57 |