城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '114.224.0.0 - 114.239.255.255'
% Abuse contact for '114.224.0.0 - 114.239.255.255' is 'anti-spam@chinatelecom.cn'
inetnum: 114.224.0.0 - 114.239.255.255
netname: CHINANET-JS
descr: Chinanet Jiangsu Province Network
descr: China Telecom
descr: No.31,jingrong street
descr: Beijing 100032
country: CN
admin-c: CH93-AP
tech-c: CJ186-AP
abuse-c: AC1573-AP
status: ALLOCATED PORTABLE
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-lower: MAINT-CHINANET-JS
mnt-routes: MAINT-CHINANET-JS
mnt-irt: IRT-CHINANET-CN
last-modified: 2021-06-15T08:05:26Z
source: APNIC
irt: IRT-CHINANET-CN
address: No.31 ,jingrong street,beijing
address: 100032
e-mail: anti-spam@chinatelecom.cn
abuse-mailbox: anti-spam@chinatelecom.cn
admin-c: CH93-AP
tech-c: CH93-AP
auth: # Filtered
remarks: anti-spam@chinatelecom.cn was validated on 2026-05-21
mnt-by: MAINT-CHINANET
last-modified: 2026-05-21T01:31:36Z
source: APNIC
role: ABUSE CHINANETCN
country: ZZ
address: No.31 ,jingrong street,beijing
address: 100032
phone: +000000000
e-mail: anti-spam@chinatelecom.cn
admin-c: CH93-AP
tech-c: CH93-AP
nic-hdl: AC1573-AP
remarks: Generated from irt object IRT-CHINANET-CN
remarks: anti-spam@chinatelecom.cn was validated on 2026-05-21
abuse-mailbox: anti-spam@chinatelecom.cn
mnt-by: APNIC-ABUSE
last-modified: 2026-05-21T01:32:00Z
source: APNIC
role: CHINANET JIANGSU
address: 260 Zhongyang Road,Nanjing 210037
country: CN
phone: +86-25-87799222
e-mail: jsipmanager@163.com
remarks: send anti-spam reports tojsipmanager@163.com
remarks: send abuse reports tojsipmanager@163.com
remarks: times in GMT+8
remarks: www.jsinfo.net
admin-c: CH360-AP
tech-c: CS306-AP
tech-c: CN142-AP
nic-hdl: CJ186-AP
notify: jsipmanager@163.com
mnt-by: MAINT-CHINANET-JS
last-modified: 2022-08-05T15:34:47Z
source: APNIC
person: Chinanet Hostmaster
nic-hdl: CH93-AP
e-mail: anti-spam@chinatelecom.cn
address: No.31 ,jingrong street,beijing
address: 100032
phone: +86-10-58501724
fax-no: +86-10-58501724
country: CN
mnt-by: MAINT-CHINANET
last-modified: 2022-02-28T06:53:44Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.231.190.24
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64019
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;114.231.190.24. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026052400 1800 900 604800 86400
;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 24 22:01:57 CST 2026
;; MSG SIZE rcvd: 107
Host 24.190.231.114.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 24.190.231.114.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 128.14.133.58 | attack | " " |
2019-08-09 04:44:16 |
| 187.13.59.185 | attack | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-08 11:43:45,262 INFO [amun_request_handler] PortScan Detected on Port: 445 (187.13.59.185) |
2019-08-09 04:26:17 |
| 171.7.35.94 | attack | Automatic report - Port Scan Attack |
2019-08-09 05:01:03 |
| 118.31.19.178 | attackspam | 20 attempts against mh_ha-misbehave-ban on dawn.magehost.pro |
2019-08-09 04:43:30 |
| 120.28.86.202 | attack | Automatic report - Port Scan Attack |
2019-08-09 04:53:44 |
| 223.197.175.34 | attackspam | Logged: 8/08/2019 11:52:11 AM UTC AS4760 HKT Limited Port: 993 Protocol: tcp Service Name: imaps Description: IMAP over TLS protocol |
2019-08-09 04:27:59 |
| 119.132.88.49 | attackbots | Aug 8 13:14:00 georgia postfix/smtpd[6208]: connect from unknown[119.132.88.49] Aug 8 13:14:01 georgia postfix/smtpd[6208]: warning: unknown[119.132.88.49]: SASL LOGIN authentication failed: authentication failure Aug 8 13:14:01 georgia postfix/smtpd[6208]: lost connection after AUTH from unknown[119.132.88.49] Aug 8 13:14:01 georgia postfix/smtpd[6208]: disconnect from unknown[119.132.88.49] ehlo=1 auth=0/1 commands=1/2 Aug 8 13:14:02 georgia postfix/smtpd[6208]: connect from unknown[119.132.88.49] Aug 8 13:14:03 georgia postfix/smtpd[6208]: warning: unknown[119.132.88.49]: SASL LOGIN authentication failed: authentication failure Aug 8 13:14:03 georgia postfix/smtpd[6208]: lost connection after AUTH from unknown[119.132.88.49] Aug 8 13:14:03 georgia postfix/smtpd[6208]: disconnect from unknown[119.132.88.49] ehlo=1 auth=0/1 commands=1/2 Aug 8 13:14:03 georgia postfix/smtpd[6208]: connect from unknown[119.132.88.49] Aug 8 13:14:04 georgia postfix/smtpd[6208]: ........ ------------------------------- |
2019-08-09 04:59:10 |
| 136.232.8.34 | attack | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-08 10:54:04,384 INFO [amun_request_handler] PortScan Detected on Port: 445 (136.232.8.34) |
2019-08-09 04:47:34 |
| 95.19.192.237 | attackspambots | Aug 8 11:35:44 shared09 sshd[23086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.19.192.237 user=mysql Aug 8 11:35:45 shared09 sshd[23086]: Failed password for mysql from 95.19.192.237 port 54712 ssh2 Aug 8 11:35:46 shared09 sshd[23086]: Received disconnect from 95.19.192.237 port 54712:11: Bye Bye [preauth] Aug 8 11:35:46 shared09 sshd[23086]: Disconnected from 95.19.192.237 port 54712 [preauth] Aug 8 11:51:40 shared09 sshd[28200]: Invalid user wi from 95.19.192.237 Aug 8 11:51:40 shared09 sshd[28200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.19.192.237 Aug 8 11:51:42 shared09 sshd[28200]: Failed password for invalid user wi from 95.19.192.237 port 48656 ssh2 Aug 8 11:51:42 shared09 sshd[28200]: Received disconnect from 95.19.192.237 port 48656:11: Bye Bye [preauth] Aug 8 11:51:42 shared09 sshd[28200]: Disconnected from 95.19.192.237 port 48656 [preauth] ........ -------------------------------------- |
2019-08-09 04:37:04 |
| 81.74.229.246 | attackbots | Aug 8 17:47:34 plex sshd[26746]: Invalid user ts5 from 81.74.229.246 port 52841 |
2019-08-09 05:01:34 |
| 14.231.173.16 | attackspambots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-08 16:37:42,619 INFO [amun_request_handler] PortScan Detected on Port: 445 (14.231.173.16) |
2019-08-09 04:35:27 |
| 188.254.75.94 | attackspam | [portscan] Port scan |
2019-08-09 04:57:10 |
| 177.154.238.138 | attackbotsspam | failed_logins |
2019-08-09 04:48:24 |
| 201.163.180.183 | attackbots | Aug 8 15:54:12 *** sshd[25845]: Failed password for invalid user viktor from 201.163.180.183 port 45825 ssh2 |
2019-08-09 04:41:58 |
| 177.69.49.210 | attackbots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-08 11:42:03,823 INFO [amun_request_handler] PortScan Detected on Port: 445 (177.69.49.210) |
2019-08-09 04:31:02 |