City: Reston
Region: Virginia
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
NetRange: 165.154.0.0 - 165.154.255.255
CIDR: 165.154.0.0/16
NetName: APNIC
NetHandle: NET-165-154-0-0-1
Parent: NET165 (NET-165-0-0-0-0)
NetType: Early Registrations, Transferred to APNIC
OriginAS:
Organization: Asia Pacific Network Information Centre (APNIC)
RegDate: 2021-02-16
Updated: 2021-02-16
Ref: https://rdap.arin.net/registry/ip/165.154.0.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois://whois.apnic.net
OrgName: Asia Pacific Network Information Centre
OrgId: APNIC
Address: PO Box 3646
City: South Brisbane
StateProv: QLD
PostalCode: 4101
Country: AU
RegDate:
Updated: 2012-01-24
Ref: https://rdap.arin.net/registry/entity/APNIC
ReferralServer: whois://whois.apnic.net
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
OrgTechHandle: AWC12-ARIN
OrgTechName: APNIC Whois Contact
OrgTechPhone: +61 7 3858 3188
OrgTechEmail: search-apnic-not-arin@apnic.net
OrgTechRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
OrgAbuseHandle: AWC12-ARIN
OrgAbuseName: APNIC Whois Contact
OrgAbusePhone: +61 7 3858 3188
OrgAbuseEmail: search-apnic-not-arin@apnic.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.apnic.net.
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '165.154.224.0 - 165.154.255.255'
% Abuse contact for '165.154.224.0 - 165.154.255.255' is 'enquiry@scloud.sg'
inetnum: 165.154.224.0 - 165.154.255.255
netname: SCLOUDPTELTD-SG
descr: Scloud Pte Ltd t/a Scloud Pte Ltd
country: SG
org: ORG-SPL64-AP
admin-c: SPLA52-AP
tech-c: SPLA52-AP
status: ALLOCATED PORTABLE
abuse-c: AS3102-AP
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-lower: MAINT-SCLOUDPTELTD-SG
mnt-routes: MAINT-SCLOUDPTELTD-SG
mnt-irt: IRT-SCLOUDPTELTD-SG
last-modified: 2021-09-14T05:37:01Z
source: APNIC
irt: IRT-SCLOUDPTELTD-SG
address: BLK71 Ayer Rajah Crescent
e-mail: enquiry@scloud.sg
abuse-mailbox: enquiry@scloud.sg
admin-c: SPLA52-AP
tech-c: SPLA52-AP
auth: # Filtered
remarks: enquiry@scloud.sg was validated on 2025-07-01
mnt-by: MAINT-SCLOUDPTELTD-SG
last-modified: 2025-09-04T07:47:47Z
source: APNIC
organisation: ORG-SPL64-AP
org-name: Scloud Pte Ltd
org-type: LIR
country: SG
address: 160 Robinson Rd, SBF Center, # 14-01
phone: +65 65920936
fax-no: +6562920937
e-mail: enquiry@scloud.sg
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:18:26Z
source: APNIC
role: ABUSE SCLOUDPTELTDSG
country: ZZ
address: BLK71 Ayer Rajah Crescent # 05-24/25/26
phone: +000000000
e-mail: enquiry@scloud.sg
admin-c: SPLA52-AP
tech-c: SPLA52-AP
nic-hdl: AS3102-AP
remarks: Generated from irt object IRT-SCLOUDPTELTD-SG
remarks: enquiry@scloud.sg was validated on 2025-07-01
abuse-mailbox: enquiry@scloud.sg
mnt-by: APNIC-ABUSE
last-modified: 2025-07-01T11:09:07Z
source: APNIC
role: Scloud Pte Ltd administrator
address: 160 Robinson Rd, SBF Center, #14-01, Singapore Singapore 068914
country: SG
phone: +65-65920936
e-mail: tech@scloud.sg
admin-c: SPLA52-AP
tech-c: SPLA52-AP
nic-hdl: SPLA52-AP
notify: tech@scloud.sg
mnt-by: MAINT-SCLOUDPTELTD-SG
last-modified: 2021-09-14T05:36:49Z
source: APNIC
% Information related to '165.154.238.0/24AS142002'
route: 165.154.238.0/24
origin: AS142002
descr: Scloud Pte Ltd
160 Robinson Rd, SBF Center, #14-01
mnt-by: MAINT-SCLOUDPTELTD-SG
last-modified: 2021-04-27T02:36:04Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 165.154.238.63
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36658
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;165.154.238.63. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025101200 1800 900 604800 86400
;; Query time: 161 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Oct 13 01:30:19 CST 2025
;; MSG SIZE rcvd: 107
Host 63.238.154.165.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 63.238.154.165.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
41.13.44.24 | attackbotsspam | Attempted connection to port 80. |
2020-04-05 06:28:15 |
114.98.126.14 | attackspam | Invalid user lvl from 114.98.126.14 port 37982 |
2020-04-05 05:55:18 |
94.102.49.168 | attackspam | Apr 4 22:30:56 debian-2gb-nbg1-2 kernel: \[8291289.774472\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=94.102.49.168 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=34847 PROTO=TCP SPT=41502 DPT=33993 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-04-05 06:10:54 |
222.186.175.148 | attackbots | Apr 5 00:18:41 plex sshd[24517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148 user=root Apr 5 00:18:44 plex sshd[24517]: Failed password for root from 222.186.175.148 port 1194 ssh2 |
2020-04-05 06:19:29 |
222.186.30.218 | attackspambots | SSH login attempts |
2020-04-05 06:20:04 |
138.197.171.149 | attack | SSH Invalid Login |
2020-04-05 05:52:37 |
134.209.157.201 | attackbotsspam | (sshd) Failed SSH login from 134.209.157.201 (IN/India/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 5 00:14:55 ubnt-55d23 sshd[13451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.157.201 user=root Apr 5 00:14:57 ubnt-55d23 sshd[13451]: Failed password for root from 134.209.157.201 port 53450 ssh2 |
2020-04-05 06:18:21 |
150.95.31.150 | attackspambots | Apr 4 22:52:29 lock-38 sshd[566178]: Failed password for root from 150.95.31.150 port 57058 ssh2 Apr 4 22:59:55 lock-38 sshd[566364]: Failed password for root from 150.95.31.150 port 47148 ssh2 Apr 4 23:03:57 lock-38 sshd[566491]: Failed password for root from 150.95.31.150 port 52160 ssh2 Apr 4 23:07:49 lock-38 sshd[566617]: Failed password for root from 150.95.31.150 port 57222 ssh2 Apr 4 23:11:36 lock-38 sshd[566793]: Failed password for root from 150.95.31.150 port 34012 ssh2 ... |
2020-04-05 06:00:50 |
98.156.168.169 | attackbotsspam | Attempted connection to port 88. |
2020-04-05 06:23:32 |
179.113.122.237 | attack | Apr 4 23:44:43 legacy sshd[15306]: Failed password for root from 179.113.122.237 port 54196 ssh2 Apr 4 23:48:27 legacy sshd[15414]: Failed password for root from 179.113.122.237 port 54900 ssh2 Apr 4 23:52:09 legacy sshd[15529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.113.122.237 ... |
2020-04-05 05:58:52 |
51.75.246.176 | attack | Apr 5 00:06:16 haigwepa sshd[5341]: Failed password for root from 51.75.246.176 port 44688 ssh2 ... |
2020-04-05 06:25:11 |
111.229.43.153 | attack | Apr 4 23:45:06 tuxlinux sshd[18048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.43.153 user=root Apr 4 23:45:08 tuxlinux sshd[18048]: Failed password for root from 111.229.43.153 port 37078 ssh2 Apr 4 23:45:06 tuxlinux sshd[18048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.43.153 user=root Apr 4 23:45:08 tuxlinux sshd[18048]: Failed password for root from 111.229.43.153 port 37078 ssh2 Apr 4 23:48:08 tuxlinux sshd[18095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.43.153 user=root ... |
2020-04-05 06:05:13 |
106.13.39.127 | attackbotsspam | Apr 4 18:32:50 vlre-nyc-1 sshd\[21735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.39.127 user=root Apr 4 18:32:52 vlre-nyc-1 sshd\[21735\]: Failed password for root from 106.13.39.127 port 55180 ssh2 Apr 4 18:35:47 vlre-nyc-1 sshd\[21838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.39.127 user=root Apr 4 18:35:50 vlre-nyc-1 sshd\[21838\]: Failed password for root from 106.13.39.127 port 37898 ssh2 Apr 4 18:38:34 vlre-nyc-1 sshd\[21939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.39.127 user=root ... |
2020-04-05 05:58:22 |
51.178.2.81 | attackspambots | Apr 4 23:44:56 legacy sshd[15329]: Failed password for root from 51.178.2.81 port 55786 ssh2 Apr 4 23:48:36 legacy sshd[15422]: Failed password for root from 51.178.2.81 port 38964 ssh2 ... |
2020-04-05 06:08:44 |
157.230.91.45 | attackbotsspam | Apr 5 00:06:42 ns382633 sshd\[16725\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.91.45 user=root Apr 5 00:06:45 ns382633 sshd\[16725\]: Failed password for root from 157.230.91.45 port 44799 ssh2 Apr 5 00:12:24 ns382633 sshd\[17989\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.91.45 user=root Apr 5 00:12:26 ns382633 sshd\[17989\]: Failed password for root from 157.230.91.45 port 57988 ssh2 Apr 5 00:16:43 ns382633 sshd\[18921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.91.45 user=root |
2020-04-05 06:23:11 |