城市(city): Changzhou
省份(region): Jiangsu
国家(country): China
运营商(isp): China Unicom
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '122.192.203.0 - 122.192.203.255'
% Abuse contact for '122.192.203.0 - 122.192.203.255' is 'zhaoyz3@chinaunicom.cn'
inetnum: 122.192.203.0 - 122.192.203.255
netname: JIANGSUGROUP
country: CN
descr: JIANGSU GROUP CO.,NANJING,JIANGSU PROVINCE
admin-c: LL58-AP
tech-c: LL58-AP
status: ASSIGNED NON-PORTABLE
mnt-by: MAINT-CNCGROUP-JS
last-modified: 2010-10-22T07:38:05Z
source: APNIC
person: Lan Li
nic-hdl: LL58-AP
e-mail: js-cu-ipmanage@chinaunicom.cn
address: No. 65 Beijing West Road,Nanjing,China
phone: +86257900060
fax-no: +86252900280
country: CN
mnt-by: MAINT-NEW
last-modified: 2013-08-15T02:13:11Z
source: APNIC
% Information related to '122.192.0.0/14AS4837'
route: 122.192.0.0/14
descr: CNC Group CHINA169 Jiangsu Province Network
country: CN
origin: AS4837
mnt-by: MAINT-CNCGROUP-RR
last-modified: 2008-09-04T07:54:52Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.192.203.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49970
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;122.192.203.117. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040902 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 10 09:03:53 CST 2026
;; MSG SIZE rcvd: 108
Host 117.203.192.122.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 117.203.192.122.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 60.248.219.185 | attack | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-08 21:35:36,198 INFO [amun_request_handler] PortScan Detected on Port: 445 (60.248.219.185) |
2019-08-09 07:46:17 |
| 120.29.152.218 | attackbotsspam | Aug 8 21:53:34 system,error,critical: login failure for user admin from 120.29.152.218 via telnet Aug 8 21:53:35 system,error,critical: login failure for user root from 120.29.152.218 via telnet Aug 8 21:53:36 system,error,critical: login failure for user root from 120.29.152.218 via telnet Aug 8 21:53:37 system,error,critical: login failure for user root from 120.29.152.218 via telnet Aug 8 21:53:38 system,error,critical: login failure for user admin from 120.29.152.218 via telnet Aug 8 21:53:40 system,error,critical: login failure for user default from 120.29.152.218 via telnet Aug 8 21:53:41 system,error,critical: login failure for user guest from 120.29.152.218 via telnet Aug 8 21:53:42 system,error,critical: login failure for user admin from 120.29.152.218 via telnet Aug 8 21:53:43 system,error,critical: login failure for user root from 120.29.152.218 via telnet Aug 8 21:53:44 system,error,critical: login failure for user root from 120.29.152.218 via telnet |
2019-08-09 07:48:32 |
| 61.76.173.244 | attack | Aug 9 02:25:28 server sshd\[11028\]: Invalid user ku from 61.76.173.244 port 41664 Aug 9 02:25:28 server sshd\[11028\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.76.173.244 Aug 9 02:25:30 server sshd\[11028\]: Failed password for invalid user ku from 61.76.173.244 port 41664 ssh2 Aug 9 02:30:19 server sshd\[30170\]: Invalid user hong from 61.76.173.244 port 33707 Aug 9 02:30:19 server sshd\[30170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.76.173.244 |
2019-08-09 07:31:39 |
| 49.88.112.77 | attackbots | Aug 8 22:54:23 ip-172-31-62-245 sshd\[23039\]: Failed password for root from 49.88.112.77 port 42124 ssh2\ Aug 8 22:54:39 ip-172-31-62-245 sshd\[23041\]: Failed password for root from 49.88.112.77 port 28540 ssh2\ Aug 8 22:54:54 ip-172-31-62-245 sshd\[23045\]: Failed password for root from 49.88.112.77 port 13966 ssh2\ Aug 8 22:55:09 ip-172-31-62-245 sshd\[23052\]: Failed password for root from 49.88.112.77 port 53585 ssh2\ Aug 8 22:55:25 ip-172-31-62-245 sshd\[23054\]: Failed password for root from 49.88.112.77 port 41067 ssh2\ |
2019-08-09 07:42:02 |
| 213.174.250.91 | attack | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-08 21:41:17,811 INFO [amun_request_handler] PortScan Detected on Port: 445 (213.174.250.91) |
2019-08-09 07:32:02 |
| 27.254.61.112 | attackspam | Aug 9 01:56:52 srv-4 sshd\[7220\]: Invalid user yasmin from 27.254.61.112 Aug 9 01:56:52 srv-4 sshd\[7220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.61.112 Aug 9 01:56:54 srv-4 sshd\[7220\]: Failed password for invalid user yasmin from 27.254.61.112 port 59392 ssh2 ... |
2019-08-09 07:56:27 |
| 141.98.80.74 | attackspam | Aug 8 23:47:09 heicom postfix/smtpd\[14813\]: warning: unknown\[141.98.80.74\]: SASL PLAIN authentication failed: authentication failure Aug 8 23:47:11 heicom postfix/smtpd\[14813\]: warning: unknown\[141.98.80.74\]: SASL PLAIN authentication failed: authentication failure Aug 8 23:55:00 heicom postfix/smtpd\[15066\]: warning: unknown\[141.98.80.74\]: SASL PLAIN authentication failed: authentication failure Aug 8 23:55:02 heicom postfix/smtpd\[15066\]: warning: unknown\[141.98.80.74\]: SASL PLAIN authentication failed: authentication failure Aug 8 23:55:23 heicom postfix/smtpd\[15066\]: warning: unknown\[141.98.80.74\]: SASL PLAIN authentication failed: authentication failure ... |
2019-08-09 08:03:49 |
| 218.92.0.154 | attackspambots | Aug 8 23:53:36 dedicated sshd[31803]: Failed password for root from 218.92.0.154 port 42561 ssh2 Aug 8 23:53:39 dedicated sshd[31803]: Failed password for root from 218.92.0.154 port 42561 ssh2 Aug 8 23:53:41 dedicated sshd[31803]: Failed password for root from 218.92.0.154 port 42561 ssh2 Aug 8 23:53:44 dedicated sshd[31803]: Failed password for root from 218.92.0.154 port 42561 ssh2 Aug 8 23:53:47 dedicated sshd[31803]: Failed password for root from 218.92.0.154 port 42561 ssh2 |
2019-08-09 07:47:39 |
| 94.220.213.254 | attack | fire |
2019-08-09 08:02:54 |
| 36.71.246.170 | attackspambots | WordPress wp-login brute force :: 36.71.246.170 0.176 BYPASS [09/Aug/2019:07:53:09 1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2019-08-09 08:06:39 |
| 175.211.116.234 | attackbotsspam | $f2bV_matches |
2019-08-09 07:50:33 |
| 186.148.172.19 | attack | Aug 8 23:54:24 mout sshd[5739]: Invalid user 25 from 186.148.172.19 port 45816 |
2019-08-09 07:35:01 |
| 125.18.118.208 | attack | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-08 21:39:36,910 INFO [amun_request_handler] PortScan Detected on Port: 445 (125.18.118.208) |
2019-08-09 07:37:08 |
| 103.228.55.79 | attackbotsspam | Aug 9 03:19:17 vibhu-HP-Z238-Microtower-Workstation sshd\[22063\]: Invalid user q from 103.228.55.79 Aug 9 03:19:17 vibhu-HP-Z238-Microtower-Workstation sshd\[22063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.228.55.79 Aug 9 03:19:19 vibhu-HP-Z238-Microtower-Workstation sshd\[22063\]: Failed password for invalid user q from 103.228.55.79 port 42348 ssh2 Aug 9 03:24:00 vibhu-HP-Z238-Microtower-Workstation sshd\[22192\]: Invalid user test from 103.228.55.79 Aug 9 03:24:00 vibhu-HP-Z238-Microtower-Workstation sshd\[22192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.228.55.79 ... |
2019-08-09 07:43:44 |
| 185.204.135.119 | attackbots | Aug 9 01:31:46 herz-der-gamer sshd[24066]: Invalid user death from 185.204.135.119 port 48532 ... |
2019-08-09 08:01:30 |