City: unknown
Region: unknown
Country: Hong Kong
Internet Service Provider: CSL Limited
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '43.225.196.0 - 43.225.196.255'
% Abuse contact for '43.225.196.0 - 43.225.196.255' is 'abuse@dataplugs.com'
inetnum: 43.225.196.0 - 43.225.196.255
netname: NETSEC
descr: NETSEC
country: US
admin-c: NN541-AP
tech-c: NN541-AP
abuse-c: AD748-AP
status: ALLOCATED NON-PORTABLE
mnt-by: MAINT-DATAPLUGS-HK
mnt-irt: IRT-DATAPLUGS-HK
last-modified: 2025-09-09T04:58:50Z
source: APNIC
irt: IRT-DATAPLUGS-HK
address: Unit 8, 26/F, Billion Plaza,, 8 Cheung Yue St, Cheung Sha Wan,, Kowloon, Hong Kong
e-mail: abuse@dataplugs.com
abuse-mailbox: abuse@dataplugs.com
admin-c: DLA5-AP
tech-c: DLA5-AP
auth: # Filtered
remarks: abuse@dataplugs.com was validated on 2026-02-04
mnt-by: MAINT-DATAPLUGS-HK
last-modified: 2026-02-04T01:19:20Z
source: APNIC
role: ABUSE DATAPLUGSHK
country: ZZ
address: Unit 8, 26/F, Billion Plaza,, 8 Cheung Yue St, Cheung Sha Wan,, Kowloon, Hong Kong
phone: +000000000
e-mail: abuse@dataplugs.com
admin-c: DLA5-AP
tech-c: DLA5-AP
nic-hdl: AD748-AP
remarks: Generated from irt object IRT-DATAPLUGS-HK
remarks: abuse@dataplugs.com was validated on 2026-02-04
abuse-mailbox: abuse@dataplugs.com
mnt-by: APNIC-ABUSE
last-modified: 2026-02-04T01:19:34Z
source: APNIC
role: NETSEC NOC
address: Suite 1007, 10/F, The Bay Hub, 17 Kai Cheung Rd, Kowloon Bay
country: HK
phone: +85227511100
e-mail: noc@netsec.com
admin-c: NN541-AP
tech-c: NN541-AP
nic-hdl: NN541-AP
mnt-by: MAINT-NETSEC-HK
last-modified: 2025-03-14T05:55:40Z
source: APNIC
% Information related to '43.225.196.0/24AS45753'
route: 43.225.196.0/24
origin: AS45753
descr: Dataplugs Limited
Unit 8, 26/F, Billion Plaza,
8 Cheung Yue St, Cheung Sha Wan,
Kowloon
mnt-by: MAINT-DATAPLUGS-HK
last-modified: 2021-10-19T04:32:28Z
source: APNIC
% Information related to '43.225.196.0/24AS963'
route: 43.225.196.0/24
origin: AS963
descr: Dataplugs Limited
Unit 8, 26/F, Billion Plaza,
8 Cheung Yue St, Cheung Sha Wan,
Kowloon
mnt-by: MAINT-DATAPLUGS-HK
last-modified: 2025-04-01T07:08:10Z
source: APNIC
% Information related to '43.225.196.0/24AS9744'
route: 43.225.196.0/24
origin: AS9744
descr: Dataplugs Limited
Unit 8, 26/F, Billion Plaza,
8 Cheung Yue St, Cheung Sha Wan,
Kowloon
mnt-by: MAINT-DATAPLUGS-HK
last-modified: 2021-11-05T06:35:38Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 43.225.196.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3465
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;43.225.196.6. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026030300 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 03 21:01:01 CST 2026
;; MSG SIZE rcvd: 105
Host 6.196.225.43.in-addr.arpa not found: 2(SERVFAIL)
server can't find 43.225.196.6.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 185.59.139.99 | attack | Oct 13 14:38:20 rocket sshd[9249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.59.139.99 Oct 13 14:38:22 rocket sshd[9249]: Failed password for invalid user yvonne from 185.59.139.99 port 40444 ssh2 ... |
2020-10-13 22:01:18 |
| 61.177.172.107 | attackbotsspam | Oct 13 13:43:50 django-0 sshd[821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.107 user=root Oct 13 13:43:52 django-0 sshd[821]: Failed password for root from 61.177.172.107 port 42098 ssh2 ... |
2020-10-13 21:42:56 |
| 118.24.211.170 | attack | Oct 13 14:07:21 serwer sshd\[21257\]: Invalid user victoras from 118.24.211.170 port 40370 Oct 13 14:07:21 serwer sshd\[21257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.211.170 Oct 13 14:07:23 serwer sshd\[21257\]: Failed password for invalid user victoras from 118.24.211.170 port 40370 ssh2 ... |
2020-10-13 22:24:20 |
| 113.107.166.9 | attack | Port scan denied |
2020-10-13 22:20:10 |
| 170.106.37.30 | attackbotsspam | Oct 13 15:18:00 sso sshd[3031]: Failed password for root from 170.106.37.30 port 51692 ssh2 Oct 13 15:28:24 sso sshd[4563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.37.30 ... |
2020-10-13 22:25:05 |
| 194.152.206.93 | attackspam | Oct 13 01:35:59 pixelmemory sshd[767716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.152.206.93 Oct 13 01:35:59 pixelmemory sshd[767716]: Invalid user rb from 194.152.206.93 port 55010 Oct 13 01:36:01 pixelmemory sshd[767716]: Failed password for invalid user rb from 194.152.206.93 port 55010 ssh2 Oct 13 01:43:25 pixelmemory sshd[816138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.152.206.93 user=root Oct 13 01:43:27 pixelmemory sshd[816138]: Failed password for root from 194.152.206.93 port 57685 ssh2 ... |
2020-10-13 22:19:38 |
| 120.53.223.186 | attack | SSH_scan |
2020-10-13 22:07:29 |
| 122.51.64.150 | attack | Oct 13 13:52:35 host1 sshd[99615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.64.150 user=root Oct 13 13:52:37 host1 sshd[99615]: Failed password for root from 122.51.64.150 port 55504 ssh2 Oct 13 13:55:21 host1 sshd[99776]: Invalid user laurentiu from 122.51.64.150 port 38758 Oct 13 13:55:21 host1 sshd[99776]: Invalid user laurentiu from 122.51.64.150 port 38758 ... |
2020-10-13 22:29:20 |
| 180.76.181.152 | attack | $f2bV_matches |
2020-10-13 21:55:56 |
| 122.194.229.59 | attack | Oct 13 16:27:15 abendstille sshd\[3206\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.194.229.59 user=root Oct 13 16:27:17 abendstille sshd\[3206\]: Failed password for root from 122.194.229.59 port 64124 ssh2 Oct 13 16:27:18 abendstille sshd\[3226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.194.229.59 user=root Oct 13 16:27:20 abendstille sshd\[3226\]: Failed password for root from 122.194.229.59 port 61052 ssh2 Oct 13 16:27:21 abendstille sshd\[3206\]: Failed password for root from 122.194.229.59 port 64124 ssh2 ... |
2020-10-13 22:28:54 |
| 102.114.15.254 | attackbots | Port scan denied |
2020-10-13 21:54:49 |
| 203.190.55.213 | attackspam | Invalid user keshi from 203.190.55.213 port 52132 |
2020-10-13 22:28:12 |
| 106.54.191.247 | attackbots | Oct 13 14:27:24 sip sshd[1925034]: Failed password for invalid user oracle from 106.54.191.247 port 56054 ssh2 Oct 13 14:32:42 sip sshd[1925087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.191.247 user=root Oct 13 14:32:44 sip sshd[1925087]: Failed password for root from 106.54.191.247 port 55364 ssh2 ... |
2020-10-13 21:38:41 |
| 61.2.14.242 | attack | 20/10/12@17:14:18: FAIL: Alarm-Network address from=61.2.14.242 20/10/12@17:14:18: FAIL: Alarm-Network address from=61.2.14.242 ... |
2020-10-13 22:10:41 |
| 61.132.52.35 | attackspambots | Oct 13 14:52:48 host1 sshd[105048]: Invalid user cornelia from 61.132.52.35 port 36638 Oct 13 14:52:50 host1 sshd[105048]: Failed password for invalid user cornelia from 61.132.52.35 port 36638 ssh2 Oct 13 14:52:48 host1 sshd[105048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.132.52.35 Oct 13 14:52:48 host1 sshd[105048]: Invalid user cornelia from 61.132.52.35 port 36638 Oct 13 14:52:50 host1 sshd[105048]: Failed password for invalid user cornelia from 61.132.52.35 port 36638 ssh2 ... |
2020-10-13 22:13:11 |