城市(city): Nanjing
省份(region): Jiangsu
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '121.224.0.0 - 121.239.255.255'
% Abuse contact for '121.224.0.0 - 121.239.255.255' is 'anti-spam@chinatelecom.cn'
inetnum: 121.224.0.0 - 121.239.255.255
netname: CHINANET-JS
descr: CHINANET jiangsu province network
descr: China Telecom
descr: A12,Xin-Jie-Kou-Wai Street
descr: Beijing 100088
country: CN
admin-c: CH93-AP
tech-c: CJ186-AP
abuse-c: AC1573-AP
status: ALLOCATED PORTABLE
mnt-by: APNIC-HM
mnt-lower: MAINT-CHINANET-JS
mnt-routes: MAINT-CHINANET-JS
mnt-irt: IRT-CHINANET-CN
last-modified: 2021-06-15T08:05:09Z
source: APNIC
irt: IRT-CHINANET-CN
address: No.31 ,jingrong street,beijing
address: 100032
e-mail: anti-spam@chinatelecom.cn
abuse-mailbox: anti-spam@chinatelecom.cn
admin-c: CH93-AP
tech-c: CH93-AP
auth: # Filtered
remarks: anti-spam@chinatelecom.cn was validated on 2025-11-13
mnt-by: MAINT-CHINANET
last-modified: 2025-11-18T00:26:23Z
source: APNIC
role: ABUSE CHINANETCN
country: ZZ
address: No.31 ,jingrong street,beijing
address: 100032
phone: +000000000
e-mail: anti-spam@chinatelecom.cn
admin-c: CH93-AP
tech-c: CH93-AP
nic-hdl: AC1573-AP
remarks: Generated from irt object IRT-CHINANET-CN
remarks: anti-spam@chinatelecom.cn was validated on 2025-11-13
abuse-mailbox: anti-spam@chinatelecom.cn
mnt-by: APNIC-ABUSE
last-modified: 2025-11-13T14:15:15Z
source: APNIC
role: CHINANET JIANGSU
address: 260 Zhongyang Road,Nanjing 210037
country: CN
phone: +86-25-87799222
e-mail: jsipmanager@163.com
remarks: send anti-spam reports tojsipmanager@163.com
remarks: send abuse reports tojsipmanager@163.com
remarks: times in GMT+8
remarks: www.jsinfo.net
admin-c: CH360-AP
tech-c: CS306-AP
tech-c: CN142-AP
nic-hdl: CJ186-AP
notify: jsipmanager@163.com
mnt-by: MAINT-CHINANET-JS
last-modified: 2022-08-05T15:34:47Z
source: APNIC
person: Chinanet Hostmaster
nic-hdl: CH93-AP
e-mail: anti-spam@chinatelecom.cn
address: No.31 ,jingrong street,beijing
address: 100032
phone: +86-10-58501724
fax-no: +86-10-58501724
country: CN
mnt-by: MAINT-CHINANET
last-modified: 2022-02-28T06:53:44Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.230.89.110
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54168
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;121.230.89.110. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026030701 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 08 03:04:46 CST 2026
;; MSG SIZE rcvd: 107
Host 110.89.230.121.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 110.89.230.121.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 139.59.59.102 | attack | 2020-06-28T12:47:19 t 22d[46513]: pam_unix(22d:auth): authentication failure, logname= uid=0 euid=0 tty=22 ruser= rhost=139.59.59.102 ", "Jun 28 12:47:21 t 22d[46513]: Failed password for invalid user es from 139.59.59.102 port 46560 222"], "failures": 3, "mlfid": " t 22d[46513]: ", "user": "es", "ip4": "139.59.59.102"} |
2020-06-29 21:29:30 |
| 138.204.111.146 | attackspambots | TCP src-port=60850 dst-port=25 Listed on abuseat-org barracuda spamcop (Project Honey Pot rated Suspicious) (141) |
2020-06-29 21:47:28 |
| 122.51.169.118 | attack | Jun 29 13:12:28 jane sshd[7862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.169.118 Jun 29 13:12:31 jane sshd[7862]: Failed password for invalid user tiago from 122.51.169.118 port 52174 ssh2 ... |
2020-06-29 21:21:29 |
| 178.22.192.225 | attackspambots | [portscan] Port scan |
2020-06-29 21:17:19 |
| 94.33.52.61 | attackbots | Jun 29 14:34:47 home sshd[14392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.33.52.61 Jun 29 14:34:50 home sshd[14392]: Failed password for invalid user ts3 from 94.33.52.61 port 52060 ssh2 Jun 29 14:38:04 home sshd[14658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.33.52.61 ... |
2020-06-29 21:39:52 |
| 138.204.111.77 | attackbotsspam | TCP src-port=42894 dst-port=25 Listed on dnsbl-sorbs abuseat-org barracuda (Project Honey Pot rated Suspicious) (143) |
2020-06-29 21:35:30 |
| 188.170.193.187 | attackbots | Lines containing failures of 188.170.193.187 (max 1000) Jun 29 11:03:22 UTC__SANYALnet-Labs__cac1 sshd[11305]: Connection from 188.170.193.187 port 41699 on 64.137.179.160 port 22 Jun 29 11:03:23 UTC__SANYALnet-Labs__cac1 sshd[11305]: Did not receive identification string from 188.170.193.187 port 41699 Jun 29 11:03:26 UTC__SANYALnet-Labs__cac1 sshd[11306]: Connection from 188.170.193.187 port 18966 on 64.137.179.160 port 22 Jun 29 11:03:28 UTC__SANYALnet-Labs__cac1 sshd[11306]: Invalid user service from 188.170.193.187 port 18966 Jun 29 11:03:28 UTC__SANYALnet-Labs__cac1 sshd[11306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.170.193.187 Jun 29 11:03:31 UTC__SANYALnet-Labs__cac1 sshd[11306]: Failed password for invalid user service from 188.170.193.187 port 18966 ssh2 Jun 29 11:03:31 UTC__SANYALnet-Labs__cac1 sshd[11306]: Connection closed by 188.170.193.187 port 18966 [preauth] ........ ----------------------------------------------- https://www.blocklist.d |
2020-06-29 21:27:50 |
| 213.195.124.127 | attackbotsspam | Jun 29 06:49:13 dignus sshd[24627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.195.124.127 Jun 29 06:49:15 dignus sshd[24627]: Failed password for invalid user pyramide from 213.195.124.127 port 38924 ssh2 Jun 29 06:49:56 dignus sshd[24704]: Invalid user gabriel from 213.195.124.127 port 48304 Jun 29 06:49:56 dignus sshd[24704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.195.124.127 Jun 29 06:49:58 dignus sshd[24704]: Failed password for invalid user gabriel from 213.195.124.127 port 48304 ssh2 ... |
2020-06-29 21:53:05 |
| 103.28.23.11 | attackspambots | 2020-06-29T12:59:04.371473mail.csmailer.org sshd[20152]: Failed password for invalid user postgres from 103.28.23.11 port 51510 ssh2 2020-06-29T13:02:54.365316mail.csmailer.org sshd[20893]: Invalid user girl from 103.28.23.11 port 51000 2020-06-29T13:02:54.368795mail.csmailer.org sshd[20893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-103-28-23-11.as137341.net 2020-06-29T13:02:54.365316mail.csmailer.org sshd[20893]: Invalid user girl from 103.28.23.11 port 51000 2020-06-29T13:02:56.129267mail.csmailer.org sshd[20893]: Failed password for invalid user girl from 103.28.23.11 port 51000 ssh2 ... |
2020-06-29 21:33:36 |
| 193.189.77.133 | attackspam | 2020-06-29 12:41:28 plain_virtual_exim authenticator failed for ([193.189.77.133]) [193.189.77.133]: 535 Incorrect authentication data ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=193.189.77.133 |
2020-06-29 21:19:14 |
| 125.94.151.182 | attackbotsspam | Unauthorised access (Jun 29) SRC=125.94.151.182 LEN=52 TOS=0x02 TTL=112 ID=610 DF TCP DPT=445 WINDOW=8192 CWR ECE SYN |
2020-06-29 21:54:21 |
| 120.70.99.15 | attack | Jun 29 14:26:34 vps sshd[215064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.99.15 Jun 29 14:26:36 vps sshd[215064]: Failed password for invalid user cmc from 120.70.99.15 port 42005 ssh2 Jun 29 14:30:03 vps sshd[229298]: Invalid user hadoop from 120.70.99.15 port 33199 Jun 29 14:30:03 vps sshd[229298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.99.15 Jun 29 14:30:05 vps sshd[229298]: Failed password for invalid user hadoop from 120.70.99.15 port 33199 ssh2 ... |
2020-06-29 21:39:15 |
| 87.10.81.62 | attack | Automatic report - Port Scan Attack |
2020-06-29 21:44:06 |
| 41.32.237.93 | attack | Unauthorized connection attempt from IP address 41.32.237.93 on Port 445(SMB) |
2020-06-29 21:45:08 |
| 45.55.233.213 | attackbotsspam | 2020-06-29T16:05:19.250090lavrinenko.info sshd[10663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.233.213 2020-06-29T16:05:19.237002lavrinenko.info sshd[10663]: Invalid user admin from 45.55.233.213 port 51860 2020-06-29T16:05:21.248271lavrinenko.info sshd[10663]: Failed password for invalid user admin from 45.55.233.213 port 51860 ssh2 2020-06-29T16:08:36.700586lavrinenko.info sshd[10741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.233.213 user=root 2020-06-29T16:08:38.408067lavrinenko.info sshd[10741]: Failed password for root from 45.55.233.213 port 50274 ssh2 ... |
2020-06-29 21:09:23 |