City: Beijing
Region: Beijing
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 47.92.0.0 - 47.97.255.255
CIDR: 47.92.0.0/14, 47.96.0.0/15
NetName: APNIC
NetHandle: NET-47-92-0-0-1
Parent: NET47 (NET-47-0-0-0-0)
NetType: Early Registrations, Transferred to APNIC
OriginAS:
Organization: Asia Pacific Network Information Centre (APNIC)
RegDate: 2015-03-02
Updated: 2015-03-02
Ref: https://rdap.arin.net/registry/ip/47.92.0.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois.apnic.net
OrgName: Asia Pacific Network Information Centre
OrgId: APNIC
Address: PO Box 3646
City: South Brisbane
StateProv: QLD
PostalCode: 4101
Country: AU
RegDate:
Updated: 2012-01-24
Ref: https://rdap.arin.net/registry/entity/APNIC
ReferralServer: whois://whois.apnic.net
ResourceLink: http://wq.apnic.net/whois-search/static/search.html
OrgAbuseHandle: AWC12-ARIN
OrgAbuseName: APNIC Whois Contact
OrgAbusePhone: +61 7 3858 3188
OrgAbuseEmail: search-apnic-not-arin@apnic.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
OrgTechHandle: AWC12-ARIN
OrgTechName: APNIC Whois Contact
OrgTechPhone: +61 7 3858 3188
OrgTechEmail: search-apnic-not-arin@apnic.net
OrgTechRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.apnic.net.
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '47.92.0.0 - 47.95.255.255'
% Abuse contact for '47.92.0.0 - 47.95.255.255' is 'didong.jc@alibaba-inc.com'
inetnum: 47.92.0.0 - 47.95.255.255
netname: ALISOFT
descr: Aliyun Computing Co., LTD
descr: 5F, Builing D, the West Lake International Plaza of S&T
descr: No.391 Wen'er Road, Hangzhou, Zhejiang, China, 310099
country: CN
admin-c: ZM1015-AP
tech-c: ZM877-AP
tech-c: ZM876-AP
tech-c: ZM875-AP
abuse-c: AC1601-AP
status: ALLOCATED PORTABLE
mnt-by: MAINT-CNNIC-AP
mnt-irt: IRT-ALISOFT-CN
last-modified: 2023-11-28T00:58:17Z
source: APNIC
irt: IRT-ALISOFT-CN
address: No.391 Wen'er Road, Hangzhou, Zhejiang, China, 310099
e-mail: didong.jc@alibaba-inc.com
abuse-mailbox: didong.jc@alibaba-inc.com
admin-c: ZM877-AP
tech-c: ZM877-AP
auth: # Filtered
mnt-by: MAINT-CNNIC-AP
last-modified: 2025-11-18T00:35:07Z
source: APNIC
role: ABUSE CNNICCN
country: ZZ
address: Beijing, China
phone: +000000000
e-mail: ipas@cnnic.cn
admin-c: IP50-AP
tech-c: IP50-AP
nic-hdl: AC1601-AP
remarks: Generated from irt object IRT-CNNIC-CN
remarks: ipas@cnnic.cn is invalid
abuse-mailbox: ipas@cnnic.cn
mnt-by: APNIC-ABUSE
last-modified: 2025-09-19T17:20:32Z
source: APNIC
person: Li Jia
address: NO.969 West Wen Yi Road, Yu Hang District, Hangzhou
country: CN
phone: +86-0571-85022088
e-mail: jiali.jl@alibaba-inc.com
nic-hdl: ZM1015-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2025-07-01T07:12:42Z
source: APNIC
person: Guoxin Gao
address: 5F, Builing D, the West Lake International Plaza of S&T
address: No.391 Wen'er Road, Hangzhou City
address: Zhejiang, China, 310099
country: CN
phone: +86-0571-85022600
fax-no: +86-0571-85022600
e-mail: anti-spam@list.alibaba-inc.com
nic-hdl: ZM875-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2014-07-30T01:56:01Z
source: APNIC
person: security trouble
e-mail: abuse@alibaba-inc.com
address: 5th,floor,Building D,the West Lake International Plaza of S&T,391#Wen??r Road
address: Hangzhou, Zhejiang, China
phone: +86-0571-85022600
country: CN
mnt-by: MAINT-CNNIC-AP
nic-hdl: ZM876-AP
last-modified: 2025-07-01T07:06:11Z
source: APNIC
person: Guowei Pan
address: 5F, Builing D, the West Lake International Plaza of S&T
address: No.391 Wen'er Road, Hangzhou City
address: Zhejiang, China, 310099
country: CN
phone: +86-0571-85022088-30763
fax-no: +86-0571-85022600
e-mail: abuse@alibaba-inc.com
nic-hdl: ZM877-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2025-07-01T07:05:46Z
source: APNIC
% Information related to '47.92.0.0/14AS37963'
route: 47.92.0.0/14
descr: Hangzhou Alibaba Advertising Co.,Ltd.
country: CN
origin: AS37963
mnt-by: MAINT-CNNIC-AP
last-modified: 2019-08-07T23:28:06Z
source: APNIC
% Information related to '47.92.0.0/14AS45102'
route: 47.92.0.0/14
descr: Alibaba (US) Technology Co., Ltd.
country: CN
origin: AS45102
mnt-by: MAINT-CNNIC-AP
last-modified: 2019-08-07T23:28:04Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 47.92.119.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63068
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;47.92.119.197. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026020602 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 07 08:30:21 CST 2026
;; MSG SIZE rcvd: 106
Host 197.119.92.47.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 197.119.92.47.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 128.199.254.188 | attack | Sep 8 15:59:47 propaganda sshd[42439]: Connection from 128.199.254.188 port 37101 on 10.0.0.161 port 22 rdomain "" Sep 8 15:59:48 propaganda sshd[42439]: Connection closed by 128.199.254.188 port 37101 [preauth] |
2020-09-09 14:26:48 |
| 5.188.158.147 | attackspam | (Sep 9) LEN=40 TTL=249 ID=32490 TCP DPT=3389 WINDOW=1024 SYN (Sep 9) LEN=40 TTL=248 ID=16658 TCP DPT=3389 WINDOW=1024 SYN (Sep 9) LEN=40 TTL=249 ID=11148 TCP DPT=3389 WINDOW=1024 SYN (Sep 8) LEN=40 TTL=248 ID=37536 TCP DPT=3389 WINDOW=1024 SYN (Sep 8) LEN=40 TTL=249 ID=25247 TCP DPT=3389 WINDOW=1024 SYN (Sep 8) LEN=40 TTL=249 ID=45601 TCP DPT=3389 WINDOW=1024 SYN (Sep 8) LEN=40 TTL=249 ID=37009 TCP DPT=3389 WINDOW=1024 SYN (Sep 7) LEN=40 TTL=249 ID=17591 TCP DPT=3389 WINDOW=1024 SYN (Sep 7) LEN=40 TTL=249 ID=25835 TCP DPT=3389 WINDOW=1024 SYN (Sep 7) LEN=40 TTL=248 ID=33462 TCP DPT=3389 WINDOW=1024 SYN (Sep 7) LEN=40 TTL=249 ID=37317 TCP DPT=3389 WINDOW=1024 SYN (Sep 7) LEN=40 TTL=249 ID=56103 TCP DPT=3389 WINDOW=1024 SYN |
2020-09-09 14:54:19 |
| 45.142.120.36 | attackbots | $f2bV_matches |
2020-09-09 14:40:48 |
| 222.186.180.17 | attackbotsspam | DATE:2020-09-09 08:27:20,IP:222.186.180.17,MATCHES:10,PORT:ssh |
2020-09-09 14:33:04 |
| 124.156.107.252 | attackbots | Sep 9 07:00:41 rotator sshd\[1151\]: Failed password for root from 124.156.107.252 port 44478 ssh2Sep 9 07:02:46 rotator sshd\[1194\]: Failed password for root from 124.156.107.252 port 36748 ssh2Sep 9 07:04:49 rotator sshd\[1226\]: Failed password for root from 124.156.107.252 port 57246 ssh2Sep 9 07:06:56 rotator sshd\[2009\]: Failed password for root from 124.156.107.252 port 49508 ssh2Sep 9 07:08:37 rotator sshd\[2037\]: Invalid user oracle from 124.156.107.252Sep 9 07:08:39 rotator sshd\[2037\]: Failed password for invalid user oracle from 124.156.107.252 port 41766 ssh2 ... |
2020-09-09 14:59:39 |
| 222.186.180.6 | attackbotsspam | Sep 9 08:26:30 vps639187 sshd\[27736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.6 user=root Sep 9 08:26:32 vps639187 sshd\[27736\]: Failed password for root from 222.186.180.6 port 58036 ssh2 Sep 9 08:26:35 vps639187 sshd\[27736\]: Failed password for root from 222.186.180.6 port 58036 ssh2 ... |
2020-09-09 14:29:08 |
| 49.235.159.133 | attack | SSH Brute Force |
2020-09-09 14:34:00 |
| 188.166.9.210 | attackspam | (sshd) Failed SSH login from 188.166.9.210 (NL/Netherlands/-): 5 in the last 3600 secs |
2020-09-09 14:37:31 |
| 91.149.139.198 | attackspambots | Sep 9 03:44:21 ns382633 sshd\[11416\]: Invalid user pi from 91.149.139.198 port 51622 Sep 9 03:44:21 ns382633 sshd\[11417\]: Invalid user pi from 91.149.139.198 port 51626 Sep 9 03:44:21 ns382633 sshd\[11416\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.149.139.198 Sep 9 03:44:21 ns382633 sshd\[11417\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.149.139.198 Sep 9 03:44:23 ns382633 sshd\[11416\]: Failed password for invalid user pi from 91.149.139.198 port 51622 ssh2 Sep 9 03:44:23 ns382633 sshd\[11417\]: Failed password for invalid user pi from 91.149.139.198 port 51626 ssh2 |
2020-09-09 14:24:09 |
| 206.189.228.120 | attack | Sep 9 07:50:31 pipo sshd[25511]: Invalid user merlin from 206.189.228.120 port 37942 Sep 9 07:50:31 pipo sshd[25511]: Disconnected from invalid user merlin 206.189.228.120 port 37942 [preauth] Sep 9 07:50:55 pipo sshd[26083]: Disconnected from authenticating user gnats 206.189.228.120 port 44946 [preauth] Sep 9 07:51:19 pipo sshd[26901]: Invalid user guest from 206.189.228.120 port 51938 ... |
2020-09-09 14:53:12 |
| 84.92.92.196 | attackspambots | Sep 9 03:00:00 ns308116 sshd[11324]: Invalid user Doonside from 84.92.92.196 port 37024 Sep 9 03:00:00 ns308116 sshd[11324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.92.92.196 Sep 9 03:00:02 ns308116 sshd[11324]: Failed password for invalid user Doonside from 84.92.92.196 port 37024 ssh2 Sep 9 03:07:08 ns308116 sshd[17635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.92.92.196 user=root Sep 9 03:07:10 ns308116 sshd[17635]: Failed password for root from 84.92.92.196 port 48058 ssh2 ... |
2020-09-09 15:00:33 |
| 46.35.19.18 | attackspambots | SSH-BruteForce |
2020-09-09 14:44:42 |
| 185.50.37.152 | attackbotsspam | Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): |
2020-09-09 14:53:40 |
| 190.98.54.18 | attack | (smtpauth) Failed SMTP AUTH login from 190.98.54.18 (SR/Suriname/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-09-08 21:24:40 plain authenticator failed for (7kkjfsxhu00moc079z6pfjza6u) [190.98.54.18]: 535 Incorrect authentication data (set_id=admin@mehrbaft.com) |
2020-09-09 14:33:36 |
| 83.103.59.192 | attackspambots | Sep 9 08:10:22 server sshd[50969]: Failed password for root from 83.103.59.192 port 47394 ssh2 Sep 9 08:13:55 server sshd[52541]: Failed password for root from 83.103.59.192 port 52544 ssh2 Sep 9 08:17:27 server sshd[54219]: Failed password for root from 83.103.59.192 port 57694 ssh2 |
2020-09-09 14:37:04 |