City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '59.82.0.0 - 59.82.255.255'
% Abuse contact for '59.82.0.0 - 59.82.255.255' is 'didong.jc@alibaba-inc.com'
inetnum: 59.82.0.0 - 59.82.255.255
netname: ALIBABA-CN-NET
descr: Hangzhou Alibaba Advertising Co.,Ltd.
descr: No.699, Wangshang RD., Hangzhou, China
country: CN
admin-c: ZM678-AP
tech-c: ZM877-AP
tech-c: ZM876-AP
abuse-c: AC1601-AP
status: ALLOCATED PORTABLE
mnt-by: MAINT-CNNIC-AP
mnt-irt: IRT-ALIBABA-CN-NET-CN
mnt-lower: MAINT-CNNIC-AP
mnt-routes: MAINT-CNNIC-AP
last-modified: 2023-11-28T00:58:21Z
source: APNIC
irt: IRT-ALIBABA-CN-NET-CN
address: No.699, Wangshang RD., Hangzhou, China
e-mail: didong.jc@alibaba-inc.com
abuse-mailbox: didong.jc@alibaba-inc.com
auth: # Filtered
admin-c: ZM678-AP
tech-c: ZM678-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2021-09-05T23:38:38Z
source: APNIC
role: ABUSE CNNICCN
country: ZZ
address: Beijing, China
phone: +000000000
e-mail: ipas@cnnic.cn
admin-c: IP50-AP
tech-c: IP50-AP
nic-hdl: AC1601-AP
remarks: Generated from irt object IRT-CNNIC-CN
remarks: ipas@cnnic.cn is invalid
abuse-mailbox: ipas@cnnic.cn
mnt-by: APNIC-ABUSE
last-modified: 2025-09-19T17:20:32Z
source: APNIC
person: Shuo Yu
address: 5F, Builing D, the West Lake International Plaza of S&T
address: No.391 Wen'er Road, Hangzhou City
address: Zhejiang, China, 310099
country: CN
phone: +86-0571-85022600
e-mail: anti-spam@list.alibaba-inc.com
nic-hdl: ZM678-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2021-04-13T23:21:57Z
source: APNIC
person: security trouble
e-mail: abuse@alibaba-inc.com
address: 5th,floor,Building D,the West Lake International Plaza of S&T,391#Wen??r Road
address: Hangzhou, Zhejiang, China
phone: +86-0571-85022600
country: CN
mnt-by: MAINT-CNNIC-AP
nic-hdl: ZM876-AP
last-modified: 2025-07-01T07:06:11Z
source: APNIC
person: Guowei Pan
address: 5F, Builing D, the West Lake International Plaza of S&T
address: No.391 Wen'er Road, Hangzhou City
address: Zhejiang, China, 310099
country: CN
phone: +86-0571-85022088-30763
fax-no: +86-0571-85022600
e-mail: abuse@alibaba-inc.com
nic-hdl: ZM877-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2025-07-01T07:05:46Z
source: APNIC
% Information related to '59.82.135.0/24AS37963'
route: 59.82.135.0/24
origin: AS37963
descr: China Internet Network Information Center
Floor1, Building No.1 C/-Chinese Academy of Sciences
4, South 4th Street
Haidian District,
mnt-by: MAINT-CNNIC-AP
last-modified: 2020-02-18T01:18:02Z
source: APNIC
% Information related to '59.82.135.0/24AS45102'
route: 59.82.135.0/24
origin: AS45102
descr: China Internet Network Information Center
Floor1, Building No.1 C/-Chinese Academy of Sciences
4, South 4th Street
Haidian District,
mnt-by: MAINT-CNNIC-AP
last-modified: 2020-02-18T01:19:53Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 59.82.135.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32508
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;59.82.135.164. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025102301 1800 900 604800 86400
;; Query time: 93 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 24 07:30:46 CST 2025
;; MSG SIZE rcvd: 106
Host 164.135.82.59.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 164.135.82.59.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 121.135.115.245 | attackspambots | Jun 15 05:55:55 * sshd[27749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.135.115.245 Jun 15 05:55:57 * sshd[27749]: Failed password for invalid user bitbucket from 121.135.115.245 port 36302 ssh2 |
2020-06-15 12:17:59 |
| 159.65.134.146 | attackspam | 20 attempts against mh-ssh on cloud |
2020-06-15 12:22:49 |
| 59.94.245.252 | attackbots | Automatic report - Port Scan Attack |
2020-06-15 10:02:42 |
| 112.85.42.173 | attack | Jun 15 05:55:57 eventyay sshd[8393]: Failed password for root from 112.85.42.173 port 19908 ssh2 Jun 15 05:56:09 eventyay sshd[8393]: error: maximum authentication attempts exceeded for root from 112.85.42.173 port 19908 ssh2 [preauth] Jun 15 05:56:15 eventyay sshd[8396]: Failed password for root from 112.85.42.173 port 50050 ssh2 ... |
2020-06-15 12:01:40 |
| 106.12.84.63 | attackspam | Jun 15 06:14:12 dhoomketu sshd[751275]: Invalid user oregon from 106.12.84.63 port 61578 Jun 15 06:14:12 dhoomketu sshd[751275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.84.63 Jun 15 06:14:12 dhoomketu sshd[751275]: Invalid user oregon from 106.12.84.63 port 61578 Jun 15 06:14:13 dhoomketu sshd[751275]: Failed password for invalid user oregon from 106.12.84.63 port 61578 ssh2 Jun 15 06:18:14 dhoomketu sshd[751342]: Invalid user abc999 from 106.12.84.63 port 57099 ... |
2020-06-15 10:13:23 |
| 96.114.154.177 | attack | Sender is sending threatening emails to recipient for extortion and fraud. |
2020-06-15 09:58:06 |
| 222.73.180.219 | attackspambots | Jun 14 20:48:52 dignus sshd[23511]: Failed password for invalid user future from 222.73.180.219 port 33108 ssh2 Jun 14 20:52:35 dignus sshd[23879]: Invalid user ts from 222.73.180.219 port 57972 Jun 14 20:52:35 dignus sshd[23879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.73.180.219 Jun 14 20:52:38 dignus sshd[23879]: Failed password for invalid user ts from 222.73.180.219 port 57972 ssh2 Jun 14 20:56:09 dignus sshd[24240]: Invalid user contabilidad from 222.73.180.219 port 54603 ... |
2020-06-15 12:05:00 |
| 171.244.140.174 | attack | Jun 15 06:18:06 inter-technics sshd[5868]: Invalid user git from 171.244.140.174 port 49666 Jun 15 06:18:06 inter-technics sshd[5868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.140.174 Jun 15 06:18:06 inter-technics sshd[5868]: Invalid user git from 171.244.140.174 port 49666 Jun 15 06:18:08 inter-technics sshd[5868]: Failed password for invalid user git from 171.244.140.174 port 49666 ssh2 Jun 15 06:20:09 inter-technics sshd[6035]: Invalid user lo from 171.244.140.174 port 21543 ... |
2020-06-15 12:26:33 |
| 217.182.169.183 | attackspambots | 2020-06-15T03:48:26.596718abusebot-5.cloudsearch.cf sshd[1462]: Invalid user nj from 217.182.169.183 port 33908 2020-06-15T03:48:26.602058abusebot-5.cloudsearch.cf sshd[1462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.ip-217-182-169.eu 2020-06-15T03:48:26.596718abusebot-5.cloudsearch.cf sshd[1462]: Invalid user nj from 217.182.169.183 port 33908 2020-06-15T03:48:28.564372abusebot-5.cloudsearch.cf sshd[1462]: Failed password for invalid user nj from 217.182.169.183 port 33908 ssh2 2020-06-15T03:52:18.389429abusebot-5.cloudsearch.cf sshd[1579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.ip-217-182-169.eu user=root 2020-06-15T03:52:20.201312abusebot-5.cloudsearch.cf sshd[1579]: Failed password for root from 217.182.169.183 port 35258 ssh2 2020-06-15T03:55:55.527554abusebot-5.cloudsearch.cf sshd[1754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=18 ... |
2020-06-15 12:15:53 |
| 62.210.215.25 | attackbots | Jun 15 05:53:02 cp sshd[4223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.215.25 Jun 15 05:53:04 cp sshd[4223]: Failed password for invalid user front from 62.210.215.25 port 49894 ssh2 Jun 15 05:56:05 cp sshd[6002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.215.25 |
2020-06-15 12:08:56 |
| 190.129.49.62 | attackspambots | 20 attempts against mh-ssh on cloud |
2020-06-15 12:12:10 |
| 87.246.7.125 | attackspam | (smtpauth) Failed SMTP AUTH login from 87.246.7.125 (BG/Bulgaria/125.0-255.7.246.87.in-addr.arpa): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-06-15 08:25:47 login authenticator failed for (9HJb8q70) [87.246.7.125]: 535 Incorrect authentication data (set_id=office@allasdairy.com) |
2020-06-15 12:24:11 |
| 45.128.152.74 | attack | Auto Fail2Ban report, multiple SSH login attempts. |
2020-06-15 10:03:05 |
| 93.123.96.138 | attackspambots | (sshd) Failed SSH login from 93.123.96.138 (BG/Bulgaria/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 15 05:47:05 amsweb01 sshd[25353]: Invalid user ubuntu from 93.123.96.138 port 49582 Jun 15 05:47:07 amsweb01 sshd[25353]: Failed password for invalid user ubuntu from 93.123.96.138 port 49582 ssh2 Jun 15 05:52:46 amsweb01 sshd[26191]: Invalid user usuario from 93.123.96.138 port 45620 Jun 15 05:52:49 amsweb01 sshd[26191]: Failed password for invalid user usuario from 93.123.96.138 port 45620 ssh2 Jun 15 05:56:00 amsweb01 sshd[26827]: Invalid user user from 93.123.96.138 port 45732 |
2020-06-15 12:13:05 |
| 212.19.20.87 | attack | DATE:2020-06-14 23:22:41, IP:212.19.20.87, PORT:5900 VNC brute force auth on honeypot server (epe-honey1-hq) |
2020-06-15 10:00:39 |