City: unknown
Region: unknown
Country: Hong Kong
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '203.175.12.0 - 203.175.15.255'
% Abuse contact for '203.175.12.0 - 203.175.15.255' is 'abuse@goalnowtech.com'
inetnum: 203.175.12.0 - 203.175.15.255
netname: GAOFENG-HK
descr: GAOFENG NETWORK LIMITED
country: HK
org: ORG-GNL1-AP
admin-c: GNTL2-AP
tech-c: GNTL2-AP
abuse-c: AG835-AP
status: ASSIGNED PORTABLE
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-routes: MAINT-GAOFENG-HK
mnt-irt: IRT-GAOFENG-HK
last-modified: 2024-01-19T11:13:06Z
source: APNIC
irt: IRT-GAOFENG-HK
address: Room A, 3/F., Ying Wai Building, No. 166-170 Apliu Street, Hong Kong Hong Kong 999077
e-mail: abuse@goalnowtech.com
abuse-mailbox: abuse@goalnowtech.com
admin-c: GNTL2-AP
tech-c: GNTL2-AP
auth: # Filtered
remarks: abuse@goalnowtech.com was validated on 2026-03-13
mnt-by: MAINT-GAOFENG-HK
last-modified: 2026-03-13T03:57:19Z
source: APNIC
organisation: ORG-GNL1-AP
org-name: GAOFENG NETWORK LIMITED
org-type: LIR
country: HK
address: Room A, 3/F., Ying Wai Building, No. 166-170 Apliu Street
address: Apliu Street
phone: +852-9888-9995
e-mail: noc@goalnowtech.com
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2024-02-19T12:47:57Z
source: APNIC
role: ABUSE GAOFENGHK
country: ZZ
address: Room A, 3/F., Ying Wai Building, No. 166-170 Apliu Street, Hong Kong Hong Kong 999077
phone: +000000000
e-mail: abuse@goalnowtech.com
admin-c: GNTL2-AP
tech-c: GNTL2-AP
nic-hdl: AG835-AP
remarks: Generated from irt object IRT-GAOFENG-HK
remarks: abuse@goalnowtech.com was validated on 2026-03-13
abuse-mailbox: abuse@goalnowtech.com
mnt-by: APNIC-ABUSE
last-modified: 2026-03-13T03:57:41Z
source: APNIC
role: GOALNOW NETWORK TECHNOLOGY LIMITED ADMINISTRATOR
address: Room A, 3/F., Ying Wai Building, No. 166-170 Apliu Street, Hong Kong Hong Kong 999077
country: HK
phone: +000000000
e-mail: admin@goalnowtech.com
admin-c: GNTL2-AP
tech-c: GNTL2-AP
nic-hdl: GNTL2-AP
notify: admin@goalnowtech.com
mnt-by: MAINT-GAOFENG-HK
last-modified: 2025-01-28T03:02:51Z
source: APNIC
% Information related to '203.175.14.0/24AS152320'
route: 203.175.14.0/24
origin: AS152320
descr: GAOFENG NETWORK LIMITED
A01, 3/F, CHEUNG LUNG, INDUSTRIAL BUILDING
CHEUNG YI STREET
LAI CHI KOK
mnt-by: MAINT-GAOFENG-HK
last-modified: 2024-01-20T15:59:54Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 203.175.14.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43582
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;203.175.14.91. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026051501 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 16 10:58:47 CST 2026
;; MSG SIZE rcvd: 106
Host 91.14.175.203.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 91.14.175.203.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 195.154.114.117 | attack | reported through recidive - multiple failed attempts(SSH) |
2020-08-17 03:35:38 |
| 139.155.68.58 | attackbotsspam | Brute force SMTP login attempted. ... |
2020-08-17 03:10:29 |
| 192.144.142.62 | attack | Aug 16 21:21:15 [host] sshd[26908]: Invalid user u Aug 16 21:21:15 [host] sshd[26908]: pam_unix(sshd: Aug 16 21:21:17 [host] sshd[26908]: Failed passwor |
2020-08-17 03:31:02 |
| 27.115.51.162 | attackbotsspam | SSH Brute-Forcing (server2) |
2020-08-17 03:01:59 |
| 54.38.65.215 | attack | 2020-08-16T17:31:15.693590+02:00 |
2020-08-17 03:04:48 |
| 122.114.29.180 | attackspam | Aug 16 16:44:41 vps sshd[247706]: Failed password for invalid user admin from 122.114.29.180 port 22542 ssh2 Aug 16 16:48:35 vps sshd[270131]: Invalid user vlt from 122.114.29.180 port 64006 Aug 16 16:48:35 vps sshd[270131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.29.180 Aug 16 16:48:36 vps sshd[270131]: Failed password for invalid user vlt from 122.114.29.180 port 64006 ssh2 Aug 16 16:52:24 vps sshd[296110]: Invalid user port from 122.114.29.180 port 41498 ... |
2020-08-17 03:00:45 |
| 106.13.227.104 | attackbotsspam | Aug 16 19:24:39 rotator sshd\[2261\]: Invalid user lynx from 106.13.227.104Aug 16 19:24:41 rotator sshd\[2261\]: Failed password for invalid user lynx from 106.13.227.104 port 37342 ssh2Aug 16 19:26:32 rotator sshd\[3063\]: Invalid user user from 106.13.227.104Aug 16 19:26:34 rotator sshd\[3063\]: Failed password for invalid user user from 106.13.227.104 port 57260 ssh2Aug 16 19:28:18 rotator sshd\[3125\]: Invalid user emmanuel from 106.13.227.104Aug 16 19:28:20 rotator sshd\[3125\]: Failed password for invalid user emmanuel from 106.13.227.104 port 48936 ssh2 ... |
2020-08-17 03:13:42 |
| 35.229.89.37 | attackbots | Aug 16 19:32:04 l02a sshd[20771]: Invalid user alba from 35.229.89.37 Aug 16 19:32:04 l02a sshd[20771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.89.229.35.bc.googleusercontent.com Aug 16 19:32:04 l02a sshd[20771]: Invalid user alba from 35.229.89.37 Aug 16 19:32:06 l02a sshd[20771]: Failed password for invalid user alba from 35.229.89.37 port 49388 ssh2 |
2020-08-17 02:59:56 |
| 95.111.74.98 | attack | Aug 16 21:26:33 webhost01 sshd[19452]: Failed password for root from 95.111.74.98 port 51608 ssh2 Aug 16 21:29:59 webhost01 sshd[19521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.111.74.98 ... |
2020-08-17 03:09:07 |
| 1.249.137.25 | attack | Email rejected due to spam filtering |
2020-08-17 03:29:29 |
| 182.61.37.35 | attackbots | Aug 16 16:51:13 inter-technics sshd[13165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.37.35 user=root Aug 16 16:51:15 inter-technics sshd[13165]: Failed password for root from 182.61.37.35 port 54244 ssh2 Aug 16 16:52:40 inter-technics sshd[13252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.37.35 user=root Aug 16 16:52:42 inter-technics sshd[13252]: Failed password for root from 182.61.37.35 port 34114 ssh2 Aug 16 16:54:03 inter-technics sshd[13332]: Invalid user anderson from 182.61.37.35 port 42216 ... |
2020-08-17 03:32:14 |
| 193.118.53.203 | attack | Port scan: Attack repeated for 24 hours |
2020-08-17 03:31:44 |
| 93.61.134.60 | attackspambots | Aug 16 17:07:24 vps333114 sshd[4995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93-61-134-60.ip146.fastwebnet.it Aug 16 17:07:26 vps333114 sshd[4995]: Failed password for invalid user dcb from 93.61.134.60 port 44178 ssh2 ... |
2020-08-17 03:01:43 |
| 168.90.140.208 | attackbots | 1597580427 - 08/16/2020 14:20:27 Host: 168.90.140.208/168.90.140.208 Port: 8080 TCP Blocked |
2020-08-17 03:28:55 |
| 35.245.33.180 | attack | Aug 16 21:03:25 vpn01 sshd[18984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.245.33.180 Aug 16 21:03:27 vpn01 sshd[18984]: Failed password for invalid user ysl from 35.245.33.180 port 36844 ssh2 ... |
2020-08-17 03:10:18 |