城市(city): Shanghai
省份(region): Shanghai
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '124.220.0.0 - 124.223.255.255'
% Abuse contact for '124.220.0.0 - 124.223.255.255' is 'abuse@tencent.com'
inetnum: 124.220.0.0 - 124.223.255.255
netname: TencentCloud
descr: Tencent cloud computing (Beijing) Co., Ltd.
descr: Floor 6, Yinke Building, 38 Haidian St, Haidian District Beijing
country: CN
admin-c: JT1125-AP
tech-c: JX1747-AP
abuse-c: AC1601-AP
status: ALLOCATED PORTABLE
mnt-by: MAINT-CNNIC-AP
mnt-irt: IRT-TENCENTCLOUD-CN
last-modified: 2023-11-28T00:57:04Z
source: APNIC
irt: IRT-TencentCloud-CN
address: 9F, FIYTA Building, Gaoxinnanyi Road, Southern
address: District of Hi-tech Park, Shenzhen
e-mail: tencent_noc@tencent.com
admin-c: JT1125-AP
tech-c: JX1747-AP
abuse-mailbox: abuse@tencent.com
remarks: abuse@tencent.com was validated on 2025-10-29
remarks: tencent_noc@tencent.com was validated on 2025-10-29
auth: # Filtered
mnt-by: MAINT-CNNIC-AP
last-modified: 2025-11-18T00:34:40Z
source: APNIC
role: ABUSE CNNICCN
country: ZZ
address: Beijing, China
phone: +000000000
e-mail: ipas@cnnic.cn
admin-c: IP50-AP
tech-c: IP50-AP
nic-hdl: AC1601-AP
remarks: Generated from irt object IRT-CNNIC-CN
remarks: ipas@cnnic.cn is invalid
abuse-mailbox: ipas@cnnic.cn
mnt-by: APNIC-ABUSE
last-modified: 2025-09-19T17:20:32Z
source: APNIC
person: James Tian
address: 9F, FIYTA Building, Gaoxinnanyi Road,Southern
address: District of Hi-tech Park, Shenzhen
country: CN
phone: +86-755-86013388-84952
e-mail: johnsonqu@tencent.com
nic-hdl: JT1125-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2024-03-19T08:21:31Z
source: APNIC
person: Jimmy Xiao
address: 9F, FIYTA Building, Gaoxinnanyi Road,Southern
address: District of Hi-tech Park, Shenzhen
country: CN
phone: +86-755-86013388-80224
e-mail: klayliang@tencent.com
nic-hdl: JX1747-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2021-09-17T00:38:09Z
source: APNIC
% Information related to '124.220.0.0/14AS45090'
route: 124.220.0.0/14
origin: AS45090
descr: China Internet Network Information Center
Floor1, Building No.1 C/-Chinese Academy of Sciences
4, South 4th Street
Haidian District,
mnt-by: MAINT-CNNIC-AP
last-modified: 2021-10-11T01:50:32Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.221.236.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64110
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;124.221.236.99. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040602 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 07 08:00:51 CST 2026
;; MSG SIZE rcvd: 107
Host 99.236.221.124.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 99.236.221.124.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 179.221.89.34 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-15 06:05:32 |
| 113.31.102.157 | attack | $f2bV_matches |
2020-02-15 06:22:25 |
| 119.28.73.77 | attackspam | Automatic report - Banned IP Access |
2020-02-15 05:58:54 |
| 112.85.42.182 | attackbots | SSH Brute-Force attacks |
2020-02-15 06:29:21 |
| 35.221.158.235 | attackspam | Feb 14 17:20:07 MK-Soft-Root2 sshd[9939]: Failed password for root from 35.221.158.235 port 43354 ssh2 ... |
2020-02-15 06:12:30 |
| 179.220.199.220 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-15 06:13:14 |
| 182.188.39.81 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-15 06:24:59 |
| 179.223.217.117 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-15 05:54:29 |
| 81.31.235.93 | attackspam | Automatic report - Port Scan Attack |
2020-02-15 06:21:56 |
| 221.14.155.156 | attackbots | Attempted to connect 2 times to port 23 TCP |
2020-02-15 06:00:18 |
| 94.50.18.165 | attackspam | unauthorized ssh connection attempt |
2020-02-15 06:15:52 |
| 125.141.56.230 | attack | Feb 11 23:46:18 km20725 sshd[7842]: Invalid user rouse from 125.141.56.230 Feb 11 23:46:18 km20725 sshd[7842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.141.56.230 Feb 11 23:46:19 km20725 sshd[7842]: Failed password for invalid user rouse from 125.141.56.230 port 50208 ssh2 Feb 11 23:46:19 km20725 sshd[7842]: Received disconnect from 125.141.56.230: 11: Bye Bye [preauth] Feb 12 00:00:29 km20725 sshd[8552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.141.56.230 user=www-data Feb 12 00:00:31 km20725 sshd[8552]: Failed password for www-data from 125.141.56.230 port 45476 ssh2 Feb 12 00:00:32 km20725 sshd[8552]: Received disconnect from 125.141.56.230: 11: Bye Bye [preauth] Feb 12 00:04:46 km20725 sshd[8744]: Invalid user irmserv from 125.141.56.230 Feb 12 00:04:46 km20725 sshd[8744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.1........ ------------------------------- |
2020-02-15 06:01:47 |
| 179.220.189.238 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-15 06:17:07 |
| 69.229.6.8 | attackbots | 2020-02-14T21:55:24.398052 sshd[21852]: Invalid user 123 from 69.229.6.8 port 56116 2020-02-14T21:55:24.411888 sshd[21852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.229.6.8 2020-02-14T21:55:24.398052 sshd[21852]: Invalid user 123 from 69.229.6.8 port 56116 2020-02-14T21:55:26.532097 sshd[21852]: Failed password for invalid user 123 from 69.229.6.8 port 56116 ssh2 ... |
2020-02-15 06:11:07 |
| 37.187.97.33 | attackbots | Feb 14 06:30:56 web9 sshd\[19012\]: Invalid user bandit from 37.187.97.33 Feb 14 06:30:56 web9 sshd\[19012\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.97.33 Feb 14 06:30:58 web9 sshd\[19012\]: Failed password for invalid user bandit from 37.187.97.33 port 57504 ssh2 Feb 14 06:34:04 web9 sshd\[19503\]: Invalid user zhun123 from 37.187.97.33 Feb 14 06:34:04 web9 sshd\[19503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.97.33 |
2020-02-15 06:07:43 |