City: Los Angeles
Region: California
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 165.154.0.0 - 165.154.255.255
CIDR: 165.154.0.0/16
NetName: APNIC
NetHandle: NET-165-154-0-0-1
Parent: NET165 (NET-165-0-0-0-0)
NetType: Early Registrations, Transferred to APNIC
OriginAS:
Organization: Asia Pacific Network Information Centre (APNIC)
RegDate: 2021-02-16
Updated: 2021-02-16
Ref: https://rdap.arin.net/registry/ip/165.154.0.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois://whois.apnic.net
OrgName: Asia Pacific Network Information Centre
OrgId: APNIC
Address: PO Box 3646
City: South Brisbane
StateProv: QLD
PostalCode: 4101
Country: AU
RegDate:
Updated: 2012-01-24
Ref: https://rdap.arin.net/registry/entity/APNIC
ReferralServer: whois://whois.apnic.net
ResourceLink: http://wq.apnic.net/whois-search/static/search.html
OrgTechHandle: AWC12-ARIN
OrgTechName: APNIC Whois Contact
OrgTechPhone: +61 7 3858 3188
OrgTechEmail: search-apnic-not-arin@apnic.net
OrgTechRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
OrgAbuseHandle: AWC12-ARIN
OrgAbuseName: APNIC Whois Contact
OrgAbusePhone: +61 7 3858 3188
OrgAbuseEmail: search-apnic-not-arin@apnic.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.apnic.net.
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '165.154.224.0 - 165.154.255.255'
% Abuse contact for '165.154.224.0 - 165.154.255.255' is 'enquiry@scloud.sg'
inetnum: 165.154.224.0 - 165.154.255.255
netname: SCLOUDPTELTD-SG
descr: Scloud Pte Ltd t/a Scloud Pte Ltd
country: SG
org: ORG-SPL64-AP
admin-c: SPLA52-AP
tech-c: SPLA52-AP
status: ALLOCATED PORTABLE
abuse-c: AS3102-AP
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-lower: MAINT-SCLOUDPTELTD-SG
mnt-routes: MAINT-SCLOUDPTELTD-SG
mnt-irt: IRT-SCLOUDPTELTD-SG
last-modified: 2021-09-14T05:37:01Z
source: APNIC
irt: IRT-SCLOUDPTELTD-SG
address: BLK71 Ayer Rajah Crescent
e-mail: enquiry@scloud.sg
abuse-mailbox: enquiry@scloud.sg
admin-c: SPLA52-AP
tech-c: SPLA52-AP
auth: # Filtered
remarks: enquiry@scloud.sg is invalid
mnt-by: MAINT-SCLOUDPTELTD-SG
last-modified: 2026-01-21T13:08:33Z
source: APNIC
organisation: ORG-SPL64-AP
org-name: Scloud Pte Ltd
org-type: LIR
country: SG
address: 160 Robinson Rd, SBF Center, # 14-01
phone: +65 65920936
fax-no: +6562920937
e-mail: enquiry@scloud.sg
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:18:26Z
source: APNIC
role: ABUSE SCLOUDPTELTDSG
country: ZZ
address: BLK71 Ayer Rajah Crescent
phone: +000000000
e-mail: enquiry@scloud.sg
admin-c: SPLA52-AP
tech-c: SPLA52-AP
nic-hdl: AS3102-AP
remarks: Generated from irt object IRT-SCLOUDPTELTD-SG
remarks: enquiry@scloud.sg is invalid
abuse-mailbox: enquiry@scloud.sg
mnt-by: APNIC-ABUSE
last-modified: 2026-01-21T13:09:31Z
source: APNIC
role: Scloud Pte Ltd administrator
address: 160 Robinson Rd, SBF Center, #14-01, Singapore Singapore 068914
country: SG
phone: +65-65920936
e-mail: tech@scloud.sg
admin-c: SPLA52-AP
tech-c: SPLA52-AP
nic-hdl: SPLA52-AP
notify: tech@scloud.sg
mnt-by: MAINT-SCLOUDPTELTD-SG
last-modified: 2021-09-14T05:36:49Z
source: APNIC
% Information related to '165.154.235.0/24AS142002'
route: 165.154.235.0/24
origin: AS142002
descr: Scloud Pte Ltd
160 Robinson Rd, SBF Center, #14-01
mnt-by: MAINT-SCLOUDPTELTD-SG
last-modified: 2021-04-27T02:35:54Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 165.154.235.77
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45609
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;165.154.235.77. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041301 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 14 04:30:05 CST 2026
;; MSG SIZE rcvd: 107
Host 77.235.154.165.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 77.235.154.165.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 222.239.28.178 | attack | Bruteforce detected by fail2ban |
2020-06-29 20:21:52 |
| 49.235.138.168 | attack | 2020-06-29T13:06:24.716596centos sshd[17305]: Invalid user rack from 49.235.138.168 port 45808 2020-06-29T13:06:26.544072centos sshd[17305]: Failed password for invalid user rack from 49.235.138.168 port 45808 ssh2 2020-06-29T13:13:20.613835centos sshd[17674]: Invalid user chs from 49.235.138.168 port 36842 ... |
2020-06-29 20:23:39 |
| 107.173.177.187 | attack | Attempts against SMTP/SSMTP |
2020-06-29 20:39:39 |
| 144.91.84.11 | attackbots | VNC authentication failed from 144.91.84.11 |
2020-06-29 20:55:22 |
| 205.185.115.40 | attack |
|
2020-06-29 20:28:27 |
| 80.82.70.140 | attack | ... |
2020-06-29 20:13:11 |
| 93.174.93.31 | attackspambots | Jun 29 14:05:08 debian-2gb-nbg1-2 kernel: \[15690951.214332\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=93.174.93.31 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=14794 PROTO=TCP SPT=52515 DPT=16512 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-06-29 20:25:49 |
| 23.102.163.29 | attackspambots | SASL broute force |
2020-06-29 20:29:40 |
| 51.75.121.252 | attackspam | Invalid user redhat from 51.75.121.252 port 58270 |
2020-06-29 20:20:09 |
| 91.207.40.45 | attackbots | 2020-06-27T07:20:29 t 22d[7318]: pam_unix(22d:auth): authentication failure, logname= uid=0 euid=0 tty=22 ruser= rhost=91.207.40.45 ", "Jun 27 07:20:31 t 22d[7318]: Failed password for invalid user prashant from 91.207.40.45 port 35948 222", "Jun 27 07:24:04 t 22d[25845]: pam_unix(22d:auth): authentication failure, logname= uid=0 euid=0 tty=22 ruser= rhost=91.207.40.45 ", "Jun 27 07:24:07 t 22d[25845]: Failed password for invalid user testuser from 91.207.40.45 port 35210 222", "Jun 27 07:27:34 t 22d[26728]: Failed password for root from 91.207.40.45 port 34472 222"], "failures": 8, "mlfid": " t 22d[7318]: ", "user": "prashant", "ip4": "91.207.40.45"} |
2020-06-29 20:38:38 |
| 192.3.177.219 | attack | Jun 29 13:09:15 ns382633 sshd\[29015\]: Invalid user steam from 192.3.177.219 port 32898 Jun 29 13:09:15 ns382633 sshd\[29015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.177.219 Jun 29 13:09:17 ns382633 sshd\[29015\]: Failed password for invalid user steam from 192.3.177.219 port 32898 ssh2 Jun 29 13:17:35 ns382633 sshd\[30591\]: Invalid user ts3 from 192.3.177.219 port 60998 Jun 29 13:17:35 ns382633 sshd\[30591\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.177.219 |
2020-06-29 20:33:02 |
| 5.251.12.154 | attack | Automatic report - Port Scan Attack |
2020-06-29 20:49:45 |
| 185.176.27.114 | attackbotsspam | MH/MP Probe, Scan, Hack - |
2020-06-29 20:37:06 |
| 20.188.231.66 | attackspambots | Time: Mon Jun 29 08:24:17 2020 -0300 IP: 20.188.231.66 (AU/Australia/-) Failures: 5 (smtpauth) Interval: 3600 seconds Blocked: Permanent Block |
2020-06-29 20:16:18 |
| 178.33.12.237 | attackbots | Jun 29 14:19:14 pve1 sshd[3493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.12.237 Jun 29 14:19:16 pve1 sshd[3493]: Failed password for invalid user bob from 178.33.12.237 port 35930 ssh2 ... |
2020-06-29 20:41:16 |