City: Singapore
Region: unknown
Country: Singapore
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 45.78.192.0 - 45.78.255.255
CIDR: 45.78.192.0/18
NetName: APNIC
NetHandle: NET-45-78-192-0-1
Parent: NET45 (NET-45-0-0-0-0)
NetType: Early Registrations, Transferred to APNIC
OriginAS:
Organization: Asia Pacific Network Information Centre (APNIC)
RegDate: 2024-11-20
Updated: 2024-11-20
Ref: https://rdap.arin.net/registry/ip/45.78.192.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois://whois.apnic.net
OrgName: Asia Pacific Network Information Centre
OrgId: APNIC
Address: PO Box 3646
City: South Brisbane
StateProv: QLD
PostalCode: 4101
Country: AU
RegDate:
Updated: 2012-01-24
Ref: https://rdap.arin.net/registry/entity/APNIC
ReferralServer: whois://whois.apnic.net
ResourceLink: http://wq.apnic.net/whois-search/static/search.html
OrgAbuseHandle: AWC12-ARIN
OrgAbuseName: APNIC Whois Contact
OrgAbusePhone: +61 7 3858 3188
OrgAbuseEmail: search-apnic-not-arin@apnic.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
OrgTechHandle: AWC12-ARIN
OrgTechName: APNIC Whois Contact
OrgTechPhone: +61 7 3858 3188
OrgTechEmail: search-apnic-not-arin@apnic.net
OrgTechRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.apnic.net.
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '45.78.192.0 - 45.78.255.254'
% Abuse contact for '45.78.192.0 - 45.78.255.254' is 'bd_abuse@bytedance.com'
inetnum: 45.78.192.0 - 45.78.255.254
netname: BYTEPLUS-SG
descr: BYTEPLUS
country: SG
admin-c: BPLA13-AP
tech-c: BPLA13-AP
abuse-c: AB1590-AP
status: ALLOCATED NON-PORTABLE
mnt-by: MAINT-BYTEPLUS-SG
mnt-irt: IRT-BYTEPLUS-SG
last-modified: 2024-12-17T09:46:34Z
source: APNIC
irt: IRT-BYTEPLUS-SG
address: 1 Raffles Quay,
e-mail: bd_abuse@bytedance.com
abuse-mailbox: bd_abuse@bytedance.com
admin-c: BPLA13-AP
tech-c: BPLA13-AP
auth: # Filtered
remarks: bd_abuse@bytedance.com was validated on 2025-08-25
mnt-by: MAINT-BYTEPLUS-SG
last-modified: 2025-11-18T00:36:32Z
source: APNIC
role: ABUSE BYTEPLUSSG
country: ZZ
address: 1 Raffles Quay, # 26-10, South Tower, Singapore Singapore 048583
phone: +000000000
e-mail: bd_abuse@bytedance.com
admin-c: BPLA13-AP
tech-c: BPLA13-AP
nic-hdl: AB1590-AP
remarks: Generated from irt object IRT-BYTEPLUS-SG
remarks: bd_abuse@bytedance.com was validated on 2025-08-25
abuse-mailbox: bd_abuse@bytedance.com
mnt-by: APNIC-ABUSE
last-modified: 2025-08-25T01:59:54Z
source: APNIC
role: Byteplus Pte Ltd administrator
address: 1 Raffles Quay, #26-10, South Tower, Singapore Singapore 048583
country: SG
phone: +65-6950-4420
e-mail: bd_abuse@bytedance.com
admin-c: BPLA13-AP
tech-c: BPLA13-AP
nic-hdl: BPLA13-AP
mnt-by: MAINT-BYTEPLUS-SG
last-modified: 2022-11-22T00:30:44Z
source: APNIC
% Information related to '45.78.235.0/24AS150436'
route: 45.78.235.0/24
origin: AS150436
descr: Byteplus Pte. Ltd.
1 Raffles Quay, #26-10, South Tower
mnt-by: MAINT-BYTEPLUS-SG
last-modified: 2024-12-17T09:49:17Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.78.235.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62326
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;45.78.235.68. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026020101 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 02 04:30:19 CST 2026
;; MSG SIZE rcvd: 105
b'Host 68.235.78.45.in-addr.arpa not found: 2(SERVFAIL)
'
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 68.235.78.45.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 58.56.32.238 | attackbotsspam | Oct 5 09:08:08 microserver sshd[50864]: Invalid user centos2017 from 58.56.32.238 port 5537 Oct 5 09:08:08 microserver sshd[50864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.32.238 Oct 5 09:08:11 microserver sshd[50864]: Failed password for invalid user centos2017 from 58.56.32.238 port 5537 ssh2 Oct 5 09:12:06 microserver sshd[51495]: Invalid user Lyon1@3 from 58.56.32.238 port 5538 Oct 5 09:12:06 microserver sshd[51495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.32.238 Oct 5 09:24:04 microserver sshd[52980]: Invalid user Qaz@2017 from 58.56.32.238 port 5541 Oct 5 09:24:04 microserver sshd[52980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.32.238 Oct 5 09:24:06 microserver sshd[52980]: Failed password for invalid user Qaz@2017 from 58.56.32.238 port 5541 ssh2 Oct 5 09:28:00 microserver sshd[53601]: Invalid user Qaz@2017 from 58.56.32.238 port 5542 |
2019-10-05 18:15:59 |
| 106.13.58.170 | attackbotsspam | Invalid user james from 106.13.58.170 port 45804 |
2019-10-05 18:17:24 |
| 202.144.133.140 | attack | xmlrpc attack |
2019-10-05 18:11:28 |
| 187.167.67.187 | attack | Automatic report - Port Scan Attack |
2019-10-05 18:26:07 |
| 192.241.190.85 | attack | Wordpress bruteforce |
2019-10-05 18:18:18 |
| 61.19.193.158 | attackbotsspam | Oct 5 07:15:02 mintao sshd\[30625\]: Invalid user tomcat from 61.19.193.158\ Oct 5 07:17:24 mintao sshd\[30643\]: Invalid user postgres from 61.19.193.158\ |
2019-10-05 18:01:45 |
| 117.48.208.71 | attack | Oct 4 21:26:36 hanapaa sshd\[18694\]: Invalid user Admin!QAZ from 117.48.208.71 Oct 4 21:26:36 hanapaa sshd\[18694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.48.208.71 Oct 4 21:26:38 hanapaa sshd\[18694\]: Failed password for invalid user Admin!QAZ from 117.48.208.71 port 56124 ssh2 Oct 4 21:31:15 hanapaa sshd\[19093\]: Invalid user q12we34rt56y from 117.48.208.71 Oct 4 21:31:15 hanapaa sshd\[19093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.48.208.71 |
2019-10-05 18:24:34 |
| 170.238.112.18 | attack | Automatic report - Port Scan Attack |
2019-10-05 18:12:19 |
| 115.68.77.68 | attack | Oct 5 07:14:26 *** sshd[24839]: User root from 115.68.77.68 not allowed because not listed in AllowUsers |
2019-10-05 18:32:11 |
| 176.115.100.201 | attackbotsspam | Oct 5 12:57:29 sauna sshd[161824]: Failed password for root from 176.115.100.201 port 33012 ssh2 ... |
2019-10-05 18:10:17 |
| 77.120.105.84 | attackspam | WordPress wp-login brute force :: 77.120.105.84 0.048 BYPASS [05/Oct/2019:13:45:39 1000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 4630 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2019-10-05 18:32:48 |
| 221.195.234.108 | attackbots | no |
2019-10-05 18:14:26 |
| 79.157.219.166 | attackspambots | Oct 5 10:07:27 game-panel sshd[29816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.157.219.166 Oct 5 10:07:29 game-panel sshd[29816]: Failed password for invalid user Chicken@2017 from 79.157.219.166 port 42551 ssh2 Oct 5 10:11:58 game-panel sshd[29998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.157.219.166 |
2019-10-05 18:17:42 |
| 178.62.237.38 | attackspam | Oct 5 11:53:45 pornomens sshd\[3622\]: Invalid user Crystal123 from 178.62.237.38 port 42004 Oct 5 11:53:45 pornomens sshd\[3622\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.237.38 Oct 5 11:53:48 pornomens sshd\[3622\]: Failed password for invalid user Crystal123 from 178.62.237.38 port 42004 ssh2 ... |
2019-10-05 18:33:31 |
| 212.129.35.106 | attackbots | Invalid user maggi from 212.129.35.106 port 50101 |
2019-10-05 18:10:58 |