城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '210.26.0.0 - 210.31.255.255'
% Abuse contact for '210.26.0.0 - 210.31.255.255' is 'abuse@cernet.edu.cn'
inetnum: 210.26.0.0 - 210.31.255.255
netname: CERNET-CN
descr: China Education and Research Network
descr: Room 224, Tsinghua University
descr: Beijing, China
country: CN
admin-c: JW725-AP
tech-c: XL364-AP
tech-c: LZ530-AP
abuse-c: AC1685-AP
status: ALLOCATED PORTABLE
remarks: confederation
mnt-by: APNIC-HM
mnt-lower: MAINT-CERNET-AP
mnt-routes: MAINT-CERNET-AP
mnt-irt: IRT-CERNET-AP
last-modified: 2020-10-20T00:56:02Z
source: APNIC
irt: IRT-CERNET-AP
address: Network Center,
address: FIT-3-220, Tsinghua Univ
address: Beijing 100084, China
phone: +86-10-62784301
fax-no: +86-10-62785933
e-mail: abuse@cernet.edu.cn
abuse-mailbox: abuse@cernet.edu.cn
admin-c: CER-AP
tech-c: CER-AP
auth: # Filtered
remarks: timezone GMT+8
remarks: abuse@cernet.edu.cn was validated on 2026-03-05
mnt-by: MAINT-CERNET-AP
last-modified: 2026-03-05T06:39:56Z
source: APNIC
role: ABUSE CERNETAP
country: ZZ
address: Network Center,
address: FIT-3-220, Tsinghua Univ
address: Beijing 100084, China
phone: +86-10-62784301
e-mail: abuse@cernet.edu.cn
admin-c: CER-AP
tech-c: CER-AP
nic-hdl: AC1685-AP
remarks: Generated from irt object IRT-CERNET-AP
remarks: abuse@cernet.edu.cn was validated on 2026-03-05
abuse-mailbox: abuse@cernet.edu.cn
mnt-by: APNIC-ABUSE
last-modified: 2026-03-05T06:40:20Z
source: APNIC
person: Jianping Wu
address: China Education and Research Network Center
address: Room 225, Main Building, Tsinghua University
address: Beijing 100084
address: CN
country: CN
phone: +86-10-6278-5983
fax-no: +86-10-6278-5933
e-mail: jianping@cernet.edu.cn
nic-hdl: JW725-AP
mnt-by: MAINT-CERNET-AP
last-modified: 2011-12-22T05:23:32Z
source: APNIC
person: Ling Zhang
address: Network Center
address: South China University of Technology
address: Guangzhou, Guangdong 510641, China
address: CN
country: CN
phone: +86-20-87110596
fax-no: +86-20-87110019
e-mail: ling@scut.edu.cn
nic-hdl: LZ530-AP
notify: dbmon@apnic.net
mnt-by: MAINT-CERNET-AP
last-modified: 2011-12-22T05:23:32Z
source: APNIC
person: Xing Li
address: China Education and Research Network Center
address: Room 225, Main Building, Tsinghua University
address: Beijing 100084
address: CN
country: CN
phone: +86-10-6278-5983
fax-no: +86-10-6278-5933
e-mail: xing@cernet.edu.cn
nic-hdl: XL364-AP
mnt-by: MAINT-CERNET-AP
last-modified: 2011-12-22T05:23:32Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 210.30.97.228
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6402
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;210.30.97.228. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040501 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 06 06:00:10 CST 2026
;; MSG SIZE rcvd: 106
Host 228.97.30.210.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 228.97.30.210.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 139.162.108.129 | attack | Unauthorized connection attempt detected from IP address 139.162.108.129 to port 3306 [T] |
2020-06-24 01:49:19 |
| 192.241.204.225 | attack | Unauthorized connection attempt detected from IP address 192.241.204.225 to port 8081 [T] |
2020-06-24 01:43:44 |
| 94.73.205.8 | attackbots | Unauthorized connection attempt detected from IP address 94.73.205.8 to port 23 [T] |
2020-06-24 01:52:50 |
| 178.125.198.45 | attackspam | Unauthorized connection attempt detected from IP address 178.125.198.45 to port 445 [T] |
2020-06-24 01:26:26 |
| 218.94.82.218 | attackspambots | Fail2Ban Ban Triggered |
2020-06-24 01:40:29 |
| 20.40.1.68 | attack | nginx/IPasHostname/a4a6f |
2020-06-24 01:58:29 |
| 165.227.114.134 | attack | " " |
2020-06-24 01:27:40 |
| 104.206.128.30 | attackspam |
|
2020-06-24 01:34:04 |
| 83.220.162.174 | attackspambots | Telnet Honeypot -> Telnet Bruteforce / Login |
2020-06-24 01:54:36 |
| 216.218.206.66 | attack | Unauthorized connection attempt detected from IP address 216.218.206.66 to port 21 |
2020-06-24 01:59:47 |
| 193.56.28.158 | attackbotsspam | Unauthorized connection attempt detected from IP address 193.56.28.158 to port 1080 |
2020-06-24 02:00:40 |
| 146.120.97.41 | attackspambots | SSH brute force attempt |
2020-06-24 01:29:03 |
| 88.84.209.145 | attackspam | Unauthorized connection attempt detected from IP address 88.84.209.145 to port 81 [T] |
2020-06-24 01:54:02 |
| 192.241.211.169 | attack | Unauthorized connection attempt detected from IP address 192.241.211.169 to port 22 [T] |
2020-06-24 02:00:57 |
| 218.248.43.100 | attackbotsspam | SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: static.ill.218.248.43.100/24.bsnl.in. |
2020-06-24 01:40:07 |