City: unknown
Region: unknown
Country: Hong Kong
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '43.242.200.0 - 43.242.203.255'
% Abuse contact for '43.242.200.0 - 43.242.203.255' is 'abuse@255.hk'
inetnum: 43.242.200.0 - 43.242.203.255
netname: HJTL-HK
descr: HK JIUJIUIDC TECHNOLOGY LIMITED
country: HK
org: ORG-HJTL1-AP
admin-c: HJTL1-AP
tech-c: HJTL1-AP
abuse-c: AH1118-AP
status: ALLOCATED PORTABLE
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-lower: MAINT-HJTL-HK
mnt-routes: MAINT-HJTL-HK
mnt-irt: IRT-HJTL-HK
last-modified: 2025-08-15T10:02:15Z
source: APNIC
irt: IRT-HJTL-HK
address: 15/F, TRANS ASIA CTR 18 KIN HONG ST, KWAI CHUNG, HK
address:
e-mail: abuse@255.hk
abuse-mailbox: abuse@255.hk
admin-c: HJTL1-AP
tech-c: HJTL1-AP
auth: # Filtered
remarks: abuse@255.hk was validated on 2025-04-11
mnt-by: MAINT-HJTL-HK
last-modified: 2025-09-04T07:06:07Z
source: APNIC
organisation: ORG-HJTL1-AP
org-name: HK JIUJIUIDC TECHNOLOGY LIMITED
org-type: LIR
country: HK
address: 15/F, TRANS ASIA CTR 18 KIN HONG ST, KWAI CHUNG
phone: +852-6859-1002
fax-no: +852-6859-1121
e-mail: webhost9237@yahoo.com
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2024-01-08T12:55:10Z
source: APNIC
role: ABUSE HJTLHK
country: ZZ
address: 15/F, TRANS ASIA CTR 18 KIN HONG ST, KWAI CHUNG, HK
address:
phone: +000000000
e-mail: abuse@255.hk
admin-c: HJTL1-AP
tech-c: HJTL1-AP
nic-hdl: AH1118-AP
remarks: Generated from irt object IRT-HJTL-HK
remarks: abuse@255.hk was validated on 2025-04-11
abuse-mailbox: abuse@255.hk
mnt-by: APNIC-ABUSE
last-modified: 2025-04-11T16:31:26Z
source: APNIC
role: HK JIUJIUIDC TECHNOLOGY LIMITED administrator
address: 15/F, TRANS ASIA CTR 18 KIN HONG ST, KWAI CHUNG, HK
country: HK
phone: +852-68591121
fax-no: +852-68591121
e-mail: abuse@255.hk
admin-c: HJTL1-AP
tech-c: HJTL1-AP
nic-hdl: HJTL1-AP
mnt-by: MAINT-HJTL-HK
last-modified: 2024-04-03T14:44:34Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 43.242.202.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44773
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;43.242.202.244. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025092502 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 26 05:07:45 CST 2025
;; MSG SIZE rcvd: 107
Host 244.202.242.43.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 244.202.242.43.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
218.92.0.223 | attackbots | Jul 28 12:59:28 scw-6657dc sshd[3864]: Failed password for root from 218.92.0.223 port 36701 ssh2 Jul 28 12:59:28 scw-6657dc sshd[3864]: Failed password for root from 218.92.0.223 port 36701 ssh2 Jul 28 12:59:35 scw-6657dc sshd[3864]: Failed password for root from 218.92.0.223 port 36701 ssh2 ... |
2020-07-28 21:00:35 |
51.77.41.246 | attackspam | $f2bV_matches |
2020-07-28 21:06:13 |
159.89.188.167 | attack | Jul 28 12:10:06 *** sshd[3862]: Invalid user zhangyl from 159.89.188.167 |
2020-07-28 20:58:07 |
120.132.27.238 | attackbotsspam | Jul 28 12:07:24 ws26vmsma01 sshd[219956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.27.238 Jul 28 12:07:26 ws26vmsma01 sshd[219956]: Failed password for invalid user zliang from 120.132.27.238 port 58462 ssh2 ... |
2020-07-28 21:07:22 |
78.85.5.232 | attack | Jul 28 14:07:27 santamaria sshd\[10079\]: Invalid user drill from 78.85.5.232 Jul 28 14:07:27 santamaria sshd\[10079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.85.5.232 Jul 28 14:07:30 santamaria sshd\[10079\]: Failed password for invalid user drill from 78.85.5.232 port 22912 ssh2 ... |
2020-07-28 21:05:22 |
36.110.217.140 | attack | Jul 28 09:36:13 firewall sshd[9237]: Invalid user zhcui from 36.110.217.140 Jul 28 09:36:15 firewall sshd[9237]: Failed password for invalid user zhcui from 36.110.217.140 port 43364 ssh2 Jul 28 09:41:08 firewall sshd[9430]: Invalid user shuqunli from 36.110.217.140 ... |
2020-07-28 21:23:03 |
150.136.31.34 | attack | Jul 28 15:10:06 vpn01 sshd[880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.136.31.34 Jul 28 15:10:08 vpn01 sshd[880]: Failed password for invalid user zcf from 150.136.31.34 port 45266 ssh2 ... |
2020-07-28 21:34:19 |
213.37.100.199 | attackspam | Jul 28 14:07:21 jane sshd[29923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.37.100.199 Jul 28 14:07:22 jane sshd[29923]: Failed password for invalid user sukai from 213.37.100.199 port 54150 ssh2 ... |
2020-07-28 21:10:37 |
31.184.199.114 | attack | Tried sshing with brute force. |
2020-07-28 21:12:24 |
61.177.172.41 | attackspam | 2020-07-28T14:58:47.002193vps773228.ovh.net sshd[10887]: Failed password for root from 61.177.172.41 port 54134 ssh2 2020-07-28T14:58:49.781198vps773228.ovh.net sshd[10887]: Failed password for root from 61.177.172.41 port 54134 ssh2 2020-07-28T14:58:53.166683vps773228.ovh.net sshd[10887]: Failed password for root from 61.177.172.41 port 54134 ssh2 2020-07-28T14:58:56.442196vps773228.ovh.net sshd[10887]: Failed password for root from 61.177.172.41 port 54134 ssh2 2020-07-28T14:59:00.128677vps773228.ovh.net sshd[10887]: Failed password for root from 61.177.172.41 port 54134 ssh2 ... |
2020-07-28 21:09:48 |
184.168.46.208 | attackspambots | LGS,WP GET /newsite/wp-includes/wlwmanifest.xml |
2020-07-28 21:28:23 |
178.128.121.137 | attackbots | Jul 28 13:40:02 rocket sshd[10544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.121.137 Jul 28 13:40:04 rocket sshd[10544]: Failed password for invalid user gwx from 178.128.121.137 port 35244 ssh2 ... |
2020-07-28 21:03:46 |
150.143.244.36 | attackbots | Automated report (2020-07-28T05:07:31-07:00). Caught masquerading as Facebook external hit. Caught masquerading as Twitterbot. |
2020-07-28 21:03:29 |
51.83.33.202 | attack | Jul 28 06:07:27 Host-KLAX-C sshd[26475]: Disconnected from invalid user wansong 51.83.33.202 port 51696 [preauth] ... |
2020-07-28 21:07:37 |
89.204.139.226 | attackbotsspam | Unauthorized IMAP connection attempt |
2020-07-28 21:04:58 |