City: Hong Kong
Region: unknown
Country: Hong Kong
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '150.40.192.0 - 150.40.255.255'
% Abuse contact for '150.40.192.0 - 150.40.255.255' is 'hwssecurity@huaweicloud.com'
inetnum: 150.40.192.0 - 150.40.255.255
netname: Huawei-Cloud-HK
descr: Huawei-Cloud-HK
country: HK
admin-c: HIPL7-AP
tech-c: HIPL7-AP
abuse-c: AH905-AP
status: ALLOCATED NON-PORTABLE
mnt-by: MAINT-HIPL-SG
mnt-irt: IRT-HIPL-SG
last-modified: 2024-08-13T10:16:45Z
geofeed: https://res-static.hc-cdn.cn/cloudbu-site/china/zh-cn/IP-location/google-geo-feed.csv
source: APNIC
irt: IRT-HIPL-SG
address: 15A Changi Business Park Central 1 Eightrium
e-mail: hwssecurity@huaweicloud.com
abuse-mailbox: hwssecurity@huaweicloud.com
admin-c: HIPL4-AP
tech-c: HIPL4-AP
auth: # Filtered
remarks: hwssecurity@huaweicloud.com
remarks: hwssecurity@huaweicloud.com was validated on 2026-01-30
mnt-by: MAINT-HIPL-SG
last-modified: 2026-04-25T02:48:52Z
source: APNIC
role: ABUSE HIPLSG
country: ZZ
address: 15A Changi Business Park Central 1 Eightrium
phone: +000000000
e-mail: hwssecurity@huaweicloud.com
admin-c: HIPL4-AP
tech-c: HIPL4-AP
nic-hdl: AH905-AP
remarks: Generated from irt object IRT-HIPL-SG
remarks: hwssecurity@huaweicloud.com was validated on 2026-01-30
abuse-mailbox: hwssecurity@huaweicloud.com
mnt-by: APNIC-ABUSE
last-modified: 2026-01-30T02:19:07Z
source: APNIC
role: HUAWEI INTERNATIONAL PTE LTD administrator
address: 15A Changi Business Park Central 1 Eightrium #03-03/04, Singapore 486035
country: SG
phone: +8618730601505
e-mail: wanggang222@huawei.com
admin-c: HIPL7-AP
tech-c: HIPL7-AP
nic-hdl: HIPL7-AP
notify: wanggang222@huawei.com
mnt-by: MAINT-HIPL-SG
last-modified: 2021-06-04T07:42:42Z
source: APNIC
% Information related to '150.40.254.0/24AS136907'
route: 150.40.254.0/24
country: HK
origin: AS136907
descr: HUAWEI INTERNATIONAL PTE. LTD.
15A Changi Business Park Central 1 Eightrium #03-03/04
mnt-by: MAINT-HIPL-SG
last-modified: 2025-01-21T07:59:27Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.40.254.162
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38430
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;150.40.254.162. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026050401 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 05 05:30:37 CST 2026
;; MSG SIZE rcvd: 107
b'Host 162.254.40.150.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 150.40.254.162.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 157.245.211.180 | attackbotsspam | Aug 2 08:30:22 ny01 sshd[28677]: Failed password for root from 157.245.211.180 port 41976 ssh2 Aug 2 08:31:44 ny01 sshd[28857]: Failed password for root from 157.245.211.180 port 35444 ssh2 |
2020-08-02 20:37:40 |
| 212.129.25.123 | attackbotsspam | php WP PHPmyadamin ABUSE blocked for 12h |
2020-08-02 20:45:56 |
| 106.241.33.158 | attackspambots | Aug 2 14:27:42 home sshd[1373105]: Failed password for root from 106.241.33.158 port 53465 ssh2 Aug 2 14:29:05 home sshd[1373676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.241.33.158 user=root Aug 2 14:29:07 home sshd[1373676]: Failed password for root from 106.241.33.158 port 18142 ssh2 Aug 2 14:30:28 home sshd[1374084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.241.33.158 user=root Aug 2 14:30:30 home sshd[1374084]: Failed password for root from 106.241.33.158 port 39338 ssh2 ... |
2020-08-02 20:33:55 |
| 174.111.226.101 | attackbots | php WP PHPmyadamin ABUSE blocked for 12h |
2020-08-02 20:47:14 |
| 128.70.6.255 | attack | Port Scan ... |
2020-08-02 20:54:14 |
| 176.9.71.213 | attackbotsspam | (mod_security) mod_security (id:210492) triggered by 176.9.71.213 (DE/Germany/motoko-mk4.lapo.it): 5 in the last 3600 secs |
2020-08-02 20:39:24 |
| 157.230.151.241 | attackspambots | Aug 2 14:25:53 vps647732 sshd[10802]: Failed password for root from 157.230.151.241 port 53364 ssh2 ... |
2020-08-02 20:53:36 |
| 165.22.223.82 | attackbotsspam | GET /wp-login.php |
2020-08-02 20:58:36 |
| 128.199.223.233 | attackspam | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-02T12:02:31Z and 2020-08-02T12:15:47Z |
2020-08-02 20:42:01 |
| 222.186.42.213 | attackspam | Aug 2 14:28:22 piServer sshd[31939]: Failed password for root from 222.186.42.213 port 21687 ssh2 Aug 2 14:28:25 piServer sshd[31939]: Failed password for root from 222.186.42.213 port 21687 ssh2 Aug 2 14:28:28 piServer sshd[31939]: Failed password for root from 222.186.42.213 port 21687 ssh2 ... |
2020-08-02 20:34:22 |
| 111.204.86.194 | attackbotsspam | Aug 2 09:11:59 vps46666688 sshd[3259]: Failed password for root from 111.204.86.194 port 57898 ssh2 ... |
2020-08-02 20:53:02 |
| 45.64.237.125 | attackbots | Aug 2 14:14:20 host sshd[23774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.64.237.125 user=root Aug 2 14:14:22 host sshd[23774]: Failed password for root from 45.64.237.125 port 35908 ssh2 ... |
2020-08-02 20:34:52 |
| 177.189.241.61 | attackspam | Automatic report - Banned IP Access |
2020-08-02 20:48:32 |
| 106.51.3.214 | attackspambots | Aug 2 12:04:23 scw-tender-jepsen sshd[7447]: Failed password for root from 106.51.3.214 port 54138 ssh2 |
2020-08-02 20:47:31 |
| 118.70.72.103 | attack | 2020-08-02T12:06:21.840223shield sshd\[27780\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.72.103 user=root 2020-08-02T12:06:24.116280shield sshd\[27780\]: Failed password for root from 118.70.72.103 port 38460 ssh2 2020-08-02T12:10:23.536647shield sshd\[28405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.72.103 user=root 2020-08-02T12:10:25.703811shield sshd\[28405\]: Failed password for root from 118.70.72.103 port 37508 ssh2 2020-08-02T12:14:26.677362shield sshd\[29353\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.72.103 user=root |
2020-08-02 20:33:08 |