City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '59.82.0.0 - 59.82.255.255'
% Abuse contact for '59.82.0.0 - 59.82.255.255' is 'didong.jc@alibaba-inc.com'
inetnum: 59.82.0.0 - 59.82.255.255
netname: ALIBABA-CN-NET
descr: Hangzhou Alibaba Advertising Co.,Ltd.
descr: No.699, Wangshang RD., Hangzhou, China
country: CN
admin-c: ZM678-AP
tech-c: ZM877-AP
tech-c: ZM876-AP
abuse-c: AC1601-AP
status: ALLOCATED PORTABLE
mnt-by: MAINT-CNNIC-AP
mnt-irt: IRT-ALIBABA-CN-NET-CN
mnt-lower: MAINT-CNNIC-AP
mnt-routes: MAINT-CNNIC-AP
last-modified: 2023-11-28T00:58:21Z
source: APNIC
irt: IRT-ALIBABA-CN-NET-CN
address: No.699, Wangshang RD., Hangzhou, China
e-mail: didong.jc@alibaba-inc.com
abuse-mailbox: didong.jc@alibaba-inc.com
auth: # Filtered
admin-c: ZM678-AP
tech-c: ZM678-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2021-09-05T23:38:38Z
source: APNIC
role: ABUSE CNNICCN
country: ZZ
address: Beijing, China
phone: +000000000
e-mail: ipas@cnnic.cn
admin-c: IP50-AP
tech-c: IP50-AP
nic-hdl: AC1601-AP
remarks: Generated from irt object IRT-CNNIC-CN
remarks: ipas@cnnic.cn is invalid
abuse-mailbox: ipas@cnnic.cn
mnt-by: APNIC-ABUSE
last-modified: 2025-09-19T17:20:32Z
source: APNIC
person: Shuo Yu
address: 5F, Builing D, the West Lake International Plaza of S&T
address: No.391 Wen'er Road, Hangzhou City
address: Zhejiang, China, 310099
country: CN
phone: +86-0571-85022600
e-mail: anti-spam@list.alibaba-inc.com
nic-hdl: ZM678-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2021-04-13T23:21:57Z
source: APNIC
person: security trouble
e-mail: abuse@alibaba-inc.com
address: 5th,floor,Building D,the West Lake International Plaza of S&T,391#Wen??r Road
address: Hangzhou, Zhejiang, China
phone: +86-0571-85022600
country: CN
mnt-by: MAINT-CNNIC-AP
nic-hdl: ZM876-AP
last-modified: 2025-07-01T07:06:11Z
source: APNIC
person: Guowei Pan
address: 5F, Builing D, the West Lake International Plaza of S&T
address: No.391 Wen'er Road, Hangzhou City
address: Zhejiang, China, 310099
country: CN
phone: +86-0571-85022088-30763
fax-no: +86-0571-85022600
e-mail: abuse@alibaba-inc.com
nic-hdl: ZM877-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2025-07-01T07:05:46Z
source: APNIC
% Information related to '59.82.135.0/24AS37963'
route: 59.82.135.0/24
origin: AS37963
descr: China Internet Network Information Center
Floor1, Building No.1 C/-Chinese Academy of Sciences
4, South 4th Street
Haidian District,
mnt-by: MAINT-CNNIC-AP
last-modified: 2020-02-18T01:18:02Z
source: APNIC
% Information related to '59.82.135.0/24AS45102'
route: 59.82.135.0/24
origin: AS45102
descr: China Internet Network Information Center
Floor1, Building No.1 C/-Chinese Academy of Sciences
4, South 4th Street
Haidian District,
mnt-by: MAINT-CNNIC-AP
last-modified: 2020-02-18T01:19:53Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 59.82.135.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52640
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;59.82.135.135. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025102301 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 24 05:30:40 CST 2025
;; MSG SIZE rcvd: 106
Host 135.135.82.59.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 135.135.82.59.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 78.245.106.138 | attackspambots | Automatic report - Port Scan Attack |
2019-08-29 12:49:14 |
| 141.98.81.37 | attackspambots | Invalid user admin from 141.98.81.37 port 40973 |
2019-08-29 13:39:35 |
| 14.136.118.138 | attack | Aug 28 19:01:28 sachi sshd\[3793\]: Invalid user wch from 14.136.118.138 Aug 28 19:01:28 sachi sshd\[3793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=014136118138.ctinets.com Aug 28 19:01:30 sachi sshd\[3793\]: Failed password for invalid user wch from 14.136.118.138 port 55922 ssh2 Aug 28 19:06:05 sachi sshd\[4219\]: Invalid user mich from 14.136.118.138 Aug 28 19:06:05 sachi sshd\[4219\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=014136118138.ctinets.com |
2019-08-29 13:10:52 |
| 207.154.232.160 | attackspambots | Aug 29 08:07:27 hosting sshd[10449]: Invalid user test from 207.154.232.160 port 34118 Aug 29 08:07:27 hosting sshd[10449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.232.160 Aug 29 08:07:27 hosting sshd[10449]: Invalid user test from 207.154.232.160 port 34118 Aug 29 08:07:29 hosting sshd[10449]: Failed password for invalid user test from 207.154.232.160 port 34118 ssh2 Aug 29 08:12:54 hosting sshd[10793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.232.160 user=root Aug 29 08:12:57 hosting sshd[10793]: Failed password for root from 207.154.232.160 port 49416 ssh2 ... |
2019-08-29 13:25:27 |
| 134.209.170.193 | attackbotsspam | *Port Scan* detected from 134.209.170.193 (US/United States/-). 4 hits in the last 210 seconds |
2019-08-29 12:42:35 |
| 37.120.33.30 | attackspambots | Aug 28 16:56:35 web1 sshd\[12516\]: Invalid user fw from 37.120.33.30 Aug 28 16:56:35 web1 sshd\[12516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.120.33.30 Aug 28 16:56:36 web1 sshd\[12516\]: Failed password for invalid user fw from 37.120.33.30 port 38166 ssh2 Aug 28 17:00:36 web1 sshd\[12858\]: Invalid user rory from 37.120.33.30 Aug 28 17:00:36 web1 sshd\[12858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.120.33.30 |
2019-08-29 12:50:00 |
| 71.6.146.130 | attack | 3389BruteforceStormFW21 |
2019-08-29 12:43:58 |
| 219.128.23.26 | attackbotsspam | Aug 29 03:14:47 *** sshd[31328]: reveeclipse mapping checking getaddrinfo for 26.23.128.219.broad.zs.gd.dynamic.163data.com.cn [219.128.23.26] failed - POSSIBLE BREAK-IN ATTEMPT! Aug 29 03:14:47 *** sshd[31328]: Invalid user admin from 219.128.23.26 Aug 29 03:14:47 *** sshd[31328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.128.23.26 Aug 29 03:14:49 *** sshd[31328]: Failed password for invalid user admin from 219.128.23.26 port 33608 ssh2 Aug 29 03:14:51 *** sshd[31328]: Failed password for invalid user admin from 219.128.23.26 port 33608 ssh2 Aug 29 03:14:53 *** sshd[31328]: Failed password for invalid user admin from 219.128.23.26 port 33608 ssh2 Aug 29 03:14:55 *** sshd[31328]: Failed password for invalid user admin from 219.128.23.26 port 33608 ssh2 Aug 29 03:14:57 *** sshd[31328]: Failed password for invalid user admin from 219.128.23.26 port 33608 ssh2 Aug 29 03:14:59 *** sshd[31328]: Failed password for invalid us........ ------------------------------- |
2019-08-29 13:12:33 |
| 77.221.82.127 | attackbotsspam | Aug 29 06:35:21 vps647732 sshd[18678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.221.82.127 Aug 29 06:35:23 vps647732 sshd[18678]: Failed password for invalid user cap from 77.221.82.127 port 56654 ssh2 ... |
2019-08-29 12:57:24 |
| 185.248.160.231 | attackspam | Aug 29 03:42:01 MK-Soft-VM6 sshd\[15013\]: Invalid user david from 185.248.160.231 port 44610 Aug 29 03:42:01 MK-Soft-VM6 sshd\[15013\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.248.160.231 Aug 29 03:42:04 MK-Soft-VM6 sshd\[15013\]: Failed password for invalid user david from 185.248.160.231 port 44610 ssh2 ... |
2019-08-29 13:44:52 |
| 47.91.92.228 | attackspambots | Aug 29 03:25:30 cvbmail sshd\[2475\]: Invalid user fdl from 47.91.92.228 Aug 29 03:25:30 cvbmail sshd\[2475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.91.92.228 Aug 29 03:25:32 cvbmail sshd\[2475\]: Failed password for invalid user fdl from 47.91.92.228 port 40382 ssh2 |
2019-08-29 13:13:46 |
| 14.177.234.161 | attack | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-28 21:57:12,854 INFO [amun_request_handler] PortScan Detected on Port: 445 (14.177.234.161) |
2019-08-29 13:02:05 |
| 146.185.149.245 | attack | Aug 29 00:42:52 debian sshd[30444]: Unable to negotiate with 146.185.149.245 port 39754: no matching key exchange method found. Their offer: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth] Aug 29 00:51:13 debian sshd[30796]: Unable to negotiate with 146.185.149.245 port 33360: no matching key exchange method found. Their offer: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth] ... |
2019-08-29 13:04:35 |
| 198.199.107.41 | attackbots | Aug 29 06:12:59 DAAP sshd[6491]: Invalid user otrs from 198.199.107.41 port 46403 Aug 29 06:12:59 DAAP sshd[6491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.107.41 Aug 29 06:12:59 DAAP sshd[6491]: Invalid user otrs from 198.199.107.41 port 46403 Aug 29 06:13:01 DAAP sshd[6491]: Failed password for invalid user otrs from 198.199.107.41 port 46403 ssh2 Aug 29 06:16:55 DAAP sshd[6508]: Invalid user wchen from 198.199.107.41 port 41010 ... |
2019-08-29 13:15:07 |
| 121.141.5.199 | attackbotsspam | Aug 29 06:37:02 lnxmysql61 sshd[25113]: Failed password for root from 121.141.5.199 port 40724 ssh2 Aug 29 06:42:58 lnxmysql61 sshd[25882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.141.5.199 Aug 29 06:42:59 lnxmysql61 sshd[25882]: Failed password for invalid user test02 from 121.141.5.199 port 56850 ssh2 |
2019-08-29 13:27:39 |