城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '124.72.0.0 - 124.72.255.255'
% Abuse contact for '124.72.0.0 - 124.72.255.255' is 'anti-spam@chinatelecom.cn'
inetnum: 124.72.0.0 - 124.72.255.255
netname: CHINANET-FJ
descr: CHINANET Fujian province network
descr: China Telecom
descr: 7,East Street ,Fuzhou ,Fujian ,PRC
country: CN
admin-c: FH71-AP
tech-c: FH71-AP
abuse-c: AC1573-AP
status: ALLOCATED PORTABLE
remarks: service provider
mnt-by: APNIC-HM
mnt-lower: MAINT-CHINANET-FJ
mnt-irt: IRT-CHINANET-CN
last-modified: 2021-06-15T08:05:51Z
source: APNIC
irt: IRT-CHINANET-CN
address: No.31 ,jingrong street,beijing
address: 100032
e-mail: anti-spam@chinatelecom.cn
abuse-mailbox: anti-spam@chinatelecom.cn
admin-c: CH93-AP
tech-c: CH93-AP
auth: # Filtered
remarks: anti-spam@chinatelecom.cn was validated on 2025-04-24
mnt-by: MAINT-CHINANET
last-modified: 2025-09-04T00:59:42Z
source: APNIC
role: ABUSE CHINANETCN
country: ZZ
address: No.31 ,jingrong street,beijing
address: 100032
phone: +000000000
e-mail: anti-spam@chinatelecom.cn
admin-c: CH93-AP
tech-c: CH93-AP
nic-hdl: AC1573-AP
remarks: Generated from irt object IRT-CHINANET-CN
remarks: anti-spam@chinatelecom.cn was validated on 2025-04-24
abuse-mailbox: anti-spam@chinatelecom.cn
mnt-by: APNIC-ABUSE
last-modified: 2025-04-24T03:21:54Z
source: APNIC
person: FUJIANNET HOSTMASTER
nic-hdl: FH71-AP
e-mail: fjnic@fjdcb.fz.fj.cn
address: 7,East Street ,Fuzhou ,Fujian ,PRC
phone: +86-591-83309761
fax-no: +86-591-83371954
country: CN
mnt-by: MAINT-CHINANET-FJ
last-modified: 2010-01-05T07:36:17Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.72.61.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35447
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;124.72.61.142. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025101400 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 14 17:19:46 CST 2025
;; MSG SIZE rcvd: 106
142.61.72.124.in-addr.arpa domain name pointer 142.61.72.124.broad.xm.fj.dynamic.163data.com.cn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
142.61.72.124.in-addr.arpa name = 142.61.72.124.broad.xm.fj.dynamic.163data.com.cn.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
122.51.54.30 | attack | Unauthorized SSH login attempts |
2020-03-23 18:14:45 |
71.254.8.90 | attackbotsspam | Unauthorized connection attempt detected from IP address 71.254.8.90 to port 1433 |
2020-03-23 18:19:55 |
213.222.56.130 | attackbotsspam | [Fri Mar 06 02:58:39 2020] - Syn Flood From IP: 213.222.56.130 Port: 37789 |
2020-03-23 18:43:28 |
51.15.126.41 | attackspam | 2020-03-23T10:05:29.702841homeassistant sshd[14926]: Invalid user a from 51.15.126.41 port 40150 2020-03-23T10:05:29.717099homeassistant sshd[14926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.126.41 ... |
2020-03-23 18:18:05 |
211.57.150.115 | attack | 23/tcp 81/tcp [2020-03-04/23]2pkt |
2020-03-23 18:34:59 |
116.14.69.192 | attackbots | 81/tcp 88/tcp [2020-03-10/23]2pkt |
2020-03-23 18:30:15 |
85.172.79.25 | attackbots | Unauthorized connection attempt detected from IP address 85.172.79.25 to port 1433 [T] |
2020-03-23 18:41:32 |
168.0.68.163 | attack | 2323/tcp 24176/tcp 23/tcp [2020-02-10/03-23]3pkt |
2020-03-23 18:44:37 |
103.54.219.106 | attack | 445/tcp 445/tcp 445/tcp... [2020-01-23/03-23]13pkt,1pt.(tcp) |
2020-03-23 18:01:38 |
183.61.164.184 | attackspambots | [Mon Mar 09 19:16:21 2020] - Syn Flood From IP: 183.61.164.184 Port: 6000 |
2020-03-23 18:16:45 |
95.9.36.220 | attackbotsspam | 37215/tcp 60001/tcp... [2020-01-23/03-23]4pkt,2pt.(tcp) |
2020-03-23 18:24:35 |
78.128.112.74 | attackbots | [Sat Mar 07 08:00:33 2020] - Syn Flood From IP: 78.128.112.74 Port: 65531 |
2020-03-23 18:33:49 |
110.188.20.246 | attackbotsspam | Host Scan |
2020-03-23 18:30:46 |
79.137.72.98 | attack | 5x Failed Password |
2020-03-23 18:10:50 |
190.149.59.82 | attackspam | Microsoft SQL Server User Authentication Brute Force Attempt, PTR: 82.59.149.190.dynamic.intelnet.net.gt. |
2020-03-23 18:32:06 |