City: unknown
Region: unknown
Country: Hong Kong
Internet Service Provider: CSL Limited
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '202.66.0.0 - 202.66.127.255'
% Abuse contact for '202.66.0.0 - 202.66.127.255' is 'abuse@citictel-cpc.com'
inetnum: 202.66.0.0 - 202.66.127.255
netname: CITICTEL-CPC-HK
descr: CITIC Telecom International CPC Limited
descr: 20/F Lincoln House
descr: Taikoo Place
descr: 979 Kings Road, Quarry Bay
country: HK
org: ORG-CTIC1-AP
admin-c: CN275-AP
tech-c: CTIC1-AP
abuse-c: AC1848-AP
status: ALLOCATED PORTABLE
mnt-by: APNIC-HM
mnt-lower: MAINT-HK-CITICTELCPC
mnt-routes: MAINT-HK-CITICTELCPC
mnt-irt: IRT-CITICTEL-CPC-HK
last-modified: 2020-06-24T06:23:06Z
source: APNIC
irt: IRT-CITICTEL-CPC-HK
address: 20/F, Lincoln House,
address: Taikoo Place,
address: Quarry Bay,
address: HONG KONG
e-mail: abuse@citictel-cpc.com
abuse-mailbox: abuse@citictel-cpc.com
admin-c: CN275-AP
tech-c: CTIC1-AP
auth: # Filtered
remarks: abuse@citictel-cpc.com was validated on 2026-03-03
mnt-by: MAINT-HK-CITICTELCPC
last-modified: 2026-03-03T13:25:42Z
source: APNIC
organisation: ORG-CTIC1-AP
org-name: CITIC Telecom International CPC Limited
org-type: LIR
country: HK
address: 20/F Lincoln House
address: Taikoo Place
address: 979 King's Road
phone: +852-2170-7101
fax-no: +852-2795-1262
e-mail: hostinfo@citictel-cpc.com
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:14:43Z
source: APNIC
role: ABUSE CITICTELCPCHK
country: ZZ
address: 20/F, Lincoln House,
address: Taikoo Place,
address: Quarry Bay,
address: HONG KONG
phone: +000000000
e-mail: abuse@citictel-cpc.com
admin-c: CN275-AP
tech-c: CTIC1-AP
nic-hdl: AC1848-AP
remarks: Generated from irt object IRT-CITICTEL-CPC-HK
remarks: abuse@citictel-cpc.com was validated on 2026-03-03
abuse-mailbox: abuse@citictel-cpc.com
mnt-by: APNIC-ABUSE
last-modified: 2026-03-03T13:25:52Z
source: APNIC
role: CITICTel-CPC NOC
address: 20/F, Lincoln House,
address: Taikoo Place,
address: Quarry Bay,
address: HONG KONG
country: HK
phone: +852-2170-7101
e-mail: hostinfo@citictel-cpc.com
admin-c: CTIC1-AP
tech-c: CTIC1-AP
nic-hdl: CN275-AP
remarks: send email to "abuse@citictel-cpc.com" for spamming/abuse issue
notify: hostinfo@citictel-cpc.com
abuse-mailbox: abuse@citictel-cpc.com
mnt-by: MAINT-HK-CITICTELCPC
last-modified: 2013-08-13T04:19:50Z
source: APNIC
person: CITIC Telecom International CPC Limited NOC
address: 20/F, Lincoln House,
address: Taikoo Place,
address: Quarry Bay,
address: HONG KONG
country: HK
phone: +852-2170-7101
e-mail: hostinfo@citictel-cpc.com
nic-hdl: CTIC1-AP
remarks: send email to "abuse@citictel-cpc.com" for spamming/abuse issue
notify: hostinfo@citictel-cpc.com
abuse-mailbox: abuse@citictel-cpc.com
mnt-by: MAINT-HK-CITICTELCPC
last-modified: 2013-08-13T04:16:50Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.66.5.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8310
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;202.66.5.8. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026030600 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 06 23:11:32 CST 2026
;; MSG SIZE rcvd: 103
8.5.66.202.in-addr.arpa domain name pointer 202.66.5-8.static.hk.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
8.5.66.202.in-addr.arpa name = 202.66.5-8.static.hk.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 59.120.189.234 | attackspambots | Dec 10 10:21:32 ns37 sshd[21395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.189.234 |
2019-12-10 17:26:08 |
| 46.101.48.191 | attackspambots | Dec 10 09:47:27 vps691689 sshd[24093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.48.191 Dec 10 09:47:29 vps691689 sshd[24093]: Failed password for invalid user gmod from 46.101.48.191 port 41766 ssh2 ... |
2019-12-10 17:06:34 |
| 149.202.75.205 | attackspambots | Dec 10 10:14:48 loxhost sshd\[22702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.75.205 user=root Dec 10 10:14:50 loxhost sshd\[22702\]: Failed password for root from 149.202.75.205 port 36302 ssh2 Dec 10 10:19:36 loxhost sshd\[22872\]: Invalid user quentin from 149.202.75.205 port 45140 Dec 10 10:19:36 loxhost sshd\[22872\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.75.205 Dec 10 10:19:38 loxhost sshd\[22872\]: Failed password for invalid user quentin from 149.202.75.205 port 45140 ssh2 ... |
2019-12-10 17:23:16 |
| 58.215.215.134 | attackspam | Dec 10 07:22:03 thevastnessof sshd[2896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.215.215.134 ... |
2019-12-10 16:58:17 |
| 164.132.107.245 | attackbots | Dec 10 09:20:14 vps647732 sshd[3374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.107.245 Dec 10 09:20:15 vps647732 sshd[3374]: Failed password for invalid user http from 164.132.107.245 port 60980 ssh2 ... |
2019-12-10 17:17:57 |
| 54.37.155.165 | attackspam | Dec 9 22:43:28 php1 sshd\[11705\]: Invalid user git from 54.37.155.165 Dec 9 22:43:28 php1 sshd\[11705\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.155.165 Dec 9 22:43:30 php1 sshd\[11705\]: Failed password for invalid user git from 54.37.155.165 port 49574 ssh2 Dec 9 22:49:29 php1 sshd\[12283\]: Invalid user guest from 54.37.155.165 Dec 9 22:49:29 php1 sshd\[12283\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.155.165 |
2019-12-10 17:03:42 |
| 103.117.192.87 | attack | Host Scan |
2019-12-10 17:31:09 |
| 88.249.66.247 | attack | Automatic report - Port Scan Attack |
2019-12-10 17:00:27 |
| 1.71.129.49 | attackbotsspam | Dec 10 10:16:25 meumeu sshd[11343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.71.129.49 Dec 10 10:16:27 meumeu sshd[11343]: Failed password for invalid user pontus from 1.71.129.49 port 37319 ssh2 Dec 10 10:22:32 meumeu sshd[12145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.71.129.49 ... |
2019-12-10 17:28:13 |
| 50.239.143.100 | attackspambots | Dec 9 23:18:01 eddieflores sshd\[31986\]: Invalid user romlah from 50.239.143.100 Dec 9 23:18:01 eddieflores sshd\[31986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.239.143.100 Dec 9 23:18:02 eddieflores sshd\[31986\]: Failed password for invalid user romlah from 50.239.143.100 port 48188 ssh2 Dec 9 23:23:36 eddieflores sshd\[662\]: Invalid user apache from 50.239.143.100 Dec 9 23:23:36 eddieflores sshd\[662\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.239.143.100 |
2019-12-10 17:31:57 |
| 45.226.135.18 | attackspam | Automatic report - Banned IP Access |
2019-12-10 17:32:29 |
| 118.25.27.67 | attackspambots | Dec 10 09:44:45 MK-Soft-VM5 sshd[31865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.27.67 Dec 10 09:44:47 MK-Soft-VM5 sshd[31865]: Failed password for invalid user slaby from 118.25.27.67 port 36398 ssh2 ... |
2019-12-10 17:02:14 |
| 125.130.110.20 | attack | Dec 10 00:10:56 home sshd[9384]: Invalid user helpdesk from 125.130.110.20 port 54658 Dec 10 00:10:56 home sshd[9384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.130.110.20 Dec 10 00:10:56 home sshd[9384]: Invalid user helpdesk from 125.130.110.20 port 54658 Dec 10 00:10:58 home sshd[9384]: Failed password for invalid user helpdesk from 125.130.110.20 port 54658 ssh2 Dec 10 00:19:09 home sshd[9462]: Invalid user console from 125.130.110.20 port 60088 Dec 10 00:19:09 home sshd[9462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.130.110.20 Dec 10 00:19:09 home sshd[9462]: Invalid user console from 125.130.110.20 port 60088 Dec 10 00:19:11 home sshd[9462]: Failed password for invalid user console from 125.130.110.20 port 60088 ssh2 Dec 10 00:25:04 home sshd[9512]: Invalid user oratest from 125.130.110.20 port 41020 Dec 10 00:25:04 home sshd[9512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty= |
2019-12-10 17:32:14 |
| 5.11.37.63 | attackbotsspam | Dec 10 10:25:35 nextcloud sshd\[31002\]: Invalid user ftpuser from 5.11.37.63 Dec 10 10:25:35 nextcloud sshd\[31002\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.11.37.63 Dec 10 10:25:37 nextcloud sshd\[31002\]: Failed password for invalid user ftpuser from 5.11.37.63 port 56470 ssh2 ... |
2019-12-10 17:37:08 |
| 37.49.225.166 | attack | 37.49.225.166 was recorded 11 times by 10 hosts attempting to connect to the following ports: 17185,3283. Incident counter (4h, 24h, all-time): 11, 33, 1018 |
2019-12-10 17:11:52 |