城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '14.208.0.0 - 14.223.255.255'
% Abuse contact for '14.208.0.0 - 14.223.255.255' is 'anti-spam@chinatelecom.cn'
inetnum: 14.208.0.0 - 14.223.255.255
netname: CHINANET-GD
descr: CHINANET Guangdong province network
descr: Data Communication Division
descr: China Telecom
country: CN
admin-c: CH93-AP
tech-c: IC83-AP
abuse-c: AC1573-AP
status: ALLOCATED PORTABLE
remarks: service provider
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
notify: abuse_gdnoc@189.cn
mnt-by: APNIC-HM
mnt-lower: MAINT-CHINANET-GD
mnt-irt: IRT-CHINANET-CN
last-modified: 2021-06-15T08:06:06Z
source: APNIC
irt: IRT-CHINANET-CN
address: No.31 ,jingrong street,beijing
address: 100032
e-mail: anti-spam@chinatelecom.cn
abuse-mailbox: anti-spam@chinatelecom.cn
admin-c: CH93-AP
tech-c: CH93-AP
auth: # Filtered
remarks: anti-spam@chinatelecom.cn was validated on 2025-11-13
mnt-by: MAINT-CHINANET
last-modified: 2025-11-18T00:26:23Z
source: APNIC
role: ABUSE CHINANETCN
country: ZZ
address: No.31 ,jingrong street,beijing
address: 100032
phone: +000000000
e-mail: anti-spam@chinatelecom.cn
admin-c: CH93-AP
tech-c: CH93-AP
nic-hdl: AC1573-AP
remarks: Generated from irt object IRT-CHINANET-CN
remarks: anti-spam@chinatelecom.cn was validated on 2025-11-13
abuse-mailbox: anti-spam@chinatelecom.cn
mnt-by: APNIC-ABUSE
last-modified: 2025-11-13T14:15:15Z
source: APNIC
person: Chinanet Hostmaster
nic-hdl: CH93-AP
e-mail: anti-spam@chinatelecom.cn
address: No.31 ,jingrong street,beijing
address: 100032
phone: +86-10-58501724
fax-no: +86-10-58501724
country: CN
mnt-by: MAINT-CHINANET
last-modified: 2022-02-28T06:53:44Z
source: APNIC
person: IPMASTER CHINANET-GD
nic-hdl: IC83-AP
e-mail: abuse_gdicnoc@163.com
address: NO.18,RO. ZHONGSHANER,YUEXIU DISTRIC,GUANGZHOU
phone: +86-20-87189274
fax-no: +86-20-87189274
country: CN
mnt-by: MAINT-CHINANET-GD
remarks: IPMASTER is not for spam complaint,please send spam complaint to abuse_gdicnoc@163.com
abuse-mailbox: abuse_gdicnoc@163.com
last-modified: 2021-05-12T09:06:58Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.213.49.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40601
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.213.49.91. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026013101 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 01 08:00:50 CST 2026
;; MSG SIZE rcvd: 105
Host 91.49.213.14.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 91.49.213.14.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 118.193.35.172 | attackbots | Jul 30 11:12:11 serwer sshd\[23445\]: Invalid user griffin from 118.193.35.172 port 24836 Jul 30 11:12:11 serwer sshd\[23445\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.193.35.172 Jul 30 11:12:13 serwer sshd\[23445\]: Failed password for invalid user griffin from 118.193.35.172 port 24836 ssh2 ... |
2020-07-30 18:26:32 |
| 113.92.35.166 | attackbotsspam | Automatic Fail2ban report - Trying login SSH |
2020-07-30 18:23:24 |
| 103.87.205.189 | attackbots | Attempted Brute Force (dovecot) |
2020-07-30 18:15:20 |
| 111.229.116.118 | attack | 2020-07-30T07:50:52.615378ks3355764 sshd[23748]: Invalid user xiehongjun from 111.229.116.118 port 42776 2020-07-30T07:50:54.757333ks3355764 sshd[23748]: Failed password for invalid user xiehongjun from 111.229.116.118 port 42776 ssh2 ... |
2020-07-30 17:55:38 |
| 94.246.169.40 | attackspambots | Jul 30 05:06:21 mail.srvfarm.net postfix/smtps/smtpd[3699994]: warning: unknown[94.246.169.40]: SASL PLAIN authentication failed: Jul 30 05:06:21 mail.srvfarm.net postfix/smtps/smtpd[3699994]: lost connection after AUTH from unknown[94.246.169.40] Jul 30 05:14:12 mail.srvfarm.net postfix/smtps/smtpd[3699995]: warning: unknown[94.246.169.40]: SASL PLAIN authentication failed: Jul 30 05:14:12 mail.srvfarm.net postfix/smtps/smtpd[3699995]: lost connection after AUTH from unknown[94.246.169.40] Jul 30 05:14:17 mail.srvfarm.net postfix/smtpd[3700156]: warning: unknown[94.246.169.40]: SASL PLAIN authentication failed: |
2020-07-30 18:16:58 |
| 218.60.41.136 | attackspam | Jul 30 12:06:10 pkdns2 sshd\[16525\]: Invalid user wcg from 218.60.41.136Jul 30 12:06:12 pkdns2 sshd\[16525\]: Failed password for invalid user wcg from 218.60.41.136 port 49420 ssh2Jul 30 12:11:04 pkdns2 sshd\[16736\]: Invalid user mmr from 218.60.41.136Jul 30 12:11:06 pkdns2 sshd\[16736\]: Failed password for invalid user mmr from 218.60.41.136 port 56308 ssh2Jul 30 12:16:07 pkdns2 sshd\[16992\]: Invalid user wrchang from 218.60.41.136Jul 30 12:16:09 pkdns2 sshd\[16992\]: Failed password for invalid user wrchang from 218.60.41.136 port 34966 ssh2 ... |
2020-07-30 18:07:31 |
| 103.151.122.57 | attackbots | 2020-07-30T07:46:40.495458www postfix/smtpd[25547]: warning: unknown[103.151.122.57]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2020-07-30T07:46:48.282859www postfix/smtpd[25547]: warning: unknown[103.151.122.57]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2020-07-30T07:47:00.054379www postfix/smtpd[25547]: warning: unknown[103.151.122.57]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-07-30 18:14:47 |
| 195.43.66.163 | attack | Jul 30 05:43:52 mail.srvfarm.net postfix/smtps/smtpd[3702623]: warning: unknown[195.43.66.163]: SASL PLAIN authentication failed: Jul 30 05:43:52 mail.srvfarm.net postfix/smtps/smtpd[3702623]: lost connection after AUTH from unknown[195.43.66.163] Jul 30 05:46:04 mail.srvfarm.net postfix/smtps/smtpd[3703278]: warning: unknown[195.43.66.163]: SASL PLAIN authentication failed: Jul 30 05:46:04 mail.srvfarm.net postfix/smtps/smtpd[3703278]: lost connection after AUTH from unknown[195.43.66.163] Jul 30 05:47:45 mail.srvfarm.net postfix/smtps/smtpd[3703902]: warning: unknown[195.43.66.163]: SASL PLAIN authentication failed: |
2020-07-30 18:08:01 |
| 106.75.3.59 | attackspam | Jul 30 14:09:56 lunarastro sshd[30129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.3.59 Jul 30 14:09:58 lunarastro sshd[30129]: Failed password for invalid user lwy from 106.75.3.59 port 54549 ssh2 |
2020-07-30 18:03:41 |
| 193.112.108.11 | attackbotsspam | ssh intrusion attempt |
2020-07-30 18:03:14 |
| 179.191.85.242 | attackspambots | Jul 30 05:26:00 mail.srvfarm.net postfix/smtpd[3700160]: NOQUEUE: reject: RCPT from scs019.scsa.com.br[179.191.85.242]: 450 4.7.1 |
2020-07-30 18:10:05 |
| 36.7.175.44 | attackspam | Thu Jul 30 11:36:45 2020 \[pid 19697\] \[anonymous\] FAIL LOGIN: Client "36.7.175.44"Thu Jul 30 11:37:09 2020 \[pid 19715\] \[www\] FAIL LOGIN: Client "36.7.175.44"Thu Jul 30 11:37:16 2020 \[pid 19724\] \[www\] FAIL LOGIN: Client "36.7.175.44"Thu Jul 30 11:37:21 2020 \[pid 19731\] \[www\] FAIL LOGIN: Client "36.7.175.44"Thu Jul 30 11:37:28 2020 \[pid 19736\] \[www\] FAIL LOGIN: Client "36.7.175.44" ... |
2020-07-30 17:58:30 |
| 181.48.46.195 | attackspambots | SSH Brute Force |
2020-07-30 18:29:49 |
| 103.18.242.29 | attack | Jul 30 05:40:54 mail.srvfarm.net postfix/smtpd[3703883]: warning: unknown[103.18.242.29]: SASL PLAIN authentication failed: Jul 30 05:40:54 mail.srvfarm.net postfix/smtpd[3703883]: lost connection after AUTH from unknown[103.18.242.29] Jul 30 05:41:02 mail.srvfarm.net postfix/smtpd[3704375]: warning: unknown[103.18.242.29]: SASL PLAIN authentication failed: Jul 30 05:41:02 mail.srvfarm.net postfix/smtpd[3704375]: lost connection after AUTH from unknown[103.18.242.29] Jul 30 05:47:15 mail.srvfarm.net postfix/smtpd[3702801]: warning: unknown[103.18.242.29]: SASL PLAIN authentication failed: |
2020-07-30 18:16:11 |
| 36.90.222.101 | attackspam | 1596085624 - 07/30/2020 07:07:04 Host: 36.90.222.101/36.90.222.101 Port: 445 TCP Blocked |
2020-07-30 17:51:05 |