城市(city): Zhoukou
省份(region): Henan
国家(country): China
运营商(isp): China Mobile
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '39.128.0.0 - 39.191.255.255'
% Abuse contact for '39.128.0.0 - 39.191.255.255' is 'abuse@chinamobile.com'
inetnum: 39.128.0.0 - 39.191.255.255
netname: CMNET
descr: China Mobile Communications Corporation
descr: Mobile Communications Network Operator in China
descr: Internet Service Provider in China
country: CN
org: ORG-CM1-AP
admin-c: ct74-AP
tech-c: HL1318-AP
abuse-c: AC2006-AP
status: ALLOCATED PORTABLE
remarks: service provider
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-lower: MAINT-CN-CMCC
mnt-routes: MAINT-CN-CMCC
mnt-irt: IRT-CHINAMOBILE-CN
last-modified: 2020-10-20T00:58:36Z
source: APNIC
irt: IRT-CHINAMOBILE-CN
address: China Mobile Communications Corporation
address: 29, Jinrong Ave., Xicheng District, Beijing, 100032
e-mail: abuse@chinamobile.com
abuse-mailbox: abuse@chinamobile.com
admin-c: CT74-AP
tech-c: CT74-AP
auth: # Filtered
remarks: abuse@chinamobile.com was validated on 2025-09-15
mnt-by: MAINT-CN-CMCC
last-modified: 2025-11-18T00:26:27Z
source: APNIC
organisation: ORG-CM1-AP
org-name: China Mobile
org-type: LIR
country: CN
address: 29, Jinrong Ave.
phone: +86-10-5268-6688
fax-no: +86-10-5261-6187
e-mail: hostmaster@chinamobile.com
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:14:48Z
source: APNIC
role: ABUSE CHINAMOBILECN
country: ZZ
address: China Mobile Communications Corporation
address: 29, Jinrong Ave., Xicheng District, Beijing, 100032
phone: +000000000
e-mail: abuse@chinamobile.com
admin-c: CT74-AP
tech-c: CT74-AP
nic-hdl: AC2006-AP
remarks: Generated from irt object IRT-CHINAMOBILE-CN
remarks: abuse@chinamobile.com was validated on 2025-09-15
abuse-mailbox: abuse@chinamobile.com
mnt-by: APNIC-ABUSE
last-modified: 2025-09-15T02:20:13Z
source: APNIC
role: chinamobile tech
address: 29, Jinrong Ave.,Xicheng district
address: Beijing
country: CN
phone: +86 5268 6688
fax-no: +86 5261 6187
e-mail: hostmaster@chinamobile.com
admin-c: HL1318-AP
tech-c: HL1318-AP
nic-hdl: ct74-AP
notify: hostmaster@chinamobile.com
mnt-by: MAINT-cn-cmcc
abuse-mailbox: abuse@chinamobile.com
last-modified: 2016-11-29T09:37:27Z
source: APNIC
person: haijun li
nic-hdl: HL1318-AP
e-mail: hostmaster@chinamobile.com
address: 29,Jinrong Ave, Xicheng district,beijing,100032
phone: +86 1052686688
fax-no: +86 10 52616187
country: CN
mnt-by: MAINT-CN-CMCC
abuse-mailbox: abuse@chinamobile.com
last-modified: 2016-11-29T09:38:38Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 39.163.104.224
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1277
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;39.163.104.224. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026012500 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 25 16:01:56 CST 2026
;; MSG SIZE rcvd: 107
Host 224.104.163.39.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 224.104.163.39.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 106.12.90.45 | attack | Jun 26 06:25:49 ns3033917 sshd[31287]: Invalid user cdk from 106.12.90.45 port 43360 Jun 26 06:25:51 ns3033917 sshd[31287]: Failed password for invalid user cdk from 106.12.90.45 port 43360 ssh2 Jun 26 06:28:45 ns3033917 sshd[31302]: Invalid user jx from 106.12.90.45 port 41076 ... |
2020-06-26 14:44:29 |
| 111.179.38.150 | attackbots | Port scan: Attack repeated for 24 hours |
2020-06-26 14:58:13 |
| 115.124.74.158 | attackspambots | Unauthorized connection attempt: SRC=115.124.74.158 ... |
2020-06-26 15:14:41 |
| 222.186.190.17 | attackbots | Jun 26 08:52:35 OPSO sshd\[31987\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.17 user=root Jun 26 08:52:37 OPSO sshd\[31987\]: Failed password for root from 222.186.190.17 port 16913 ssh2 Jun 26 08:52:40 OPSO sshd\[31987\]: Failed password for root from 222.186.190.17 port 16913 ssh2 Jun 26 08:52:42 OPSO sshd\[31987\]: Failed password for root from 222.186.190.17 port 16913 ssh2 Jun 26 08:53:27 OPSO sshd\[32237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.17 user=root |
2020-06-26 15:03:58 |
| 128.14.181.170 | attackspam | Port scan denied |
2020-06-26 15:00:17 |
| 185.56.153.236 | attack | "fail2ban match" |
2020-06-26 15:20:08 |
| 51.75.142.122 | attackspambots | Port scan denied |
2020-06-26 14:37:51 |
| 46.38.145.254 | attackbotsspam | 2020-06-26 07:07:20 auth_plain authenticator failed for (User) [46.38.145.254]: 535 Incorrect authentication data (set_id=util@csmailer.org) 2020-06-26 07:08:04 auth_plain authenticator failed for (User) [46.38.145.254]: 535 Incorrect authentication data (set_id=pgotowe@csmailer.org) 2020-06-26 07:08:51 auth_plain authenticator failed for (User) [46.38.145.254]: 535 Incorrect authentication data (set_id=mood@csmailer.org) 2020-06-26 07:09:33 auth_plain authenticator failed for (User) [46.38.145.254]: 535 Incorrect authentication data (set_id=hornet@csmailer.org) 2020-06-26 07:10:23 auth_plain authenticator failed for (User) [46.38.145.254]: 535 Incorrect authentication data (set_id=poems@csmailer.org) ... |
2020-06-26 15:15:08 |
| 198.55.96.26 | attackspam | fail2ban/Jun 26 05:56:21 h1962932 sshd[22887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.55.96.26 user=root Jun 26 05:56:23 h1962932 sshd[22887]: Failed password for root from 198.55.96.26 port 38548 ssh2 Jun 26 06:05:36 h1962932 sshd[13482]: Invalid user openerp from 198.55.96.26 port 37960 Jun 26 06:05:36 h1962932 sshd[13482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.55.96.26 Jun 26 06:05:36 h1962932 sshd[13482]: Invalid user openerp from 198.55.96.26 port 37960 Jun 26 06:05:39 h1962932 sshd[13482]: Failed password for invalid user openerp from 198.55.96.26 port 37960 ssh2 |
2020-06-26 14:34:41 |
| 124.67.66.50 | attack | Jun 26 08:00:55 [host] sshd[14359]: Invalid user n Jun 26 08:00:55 [host] sshd[14359]: pam_unix(sshd: Jun 26 08:00:57 [host] sshd[14359]: Failed passwor |
2020-06-26 14:46:24 |
| 183.111.96.20 | attack | Jun 26 08:48:08 OPSO sshd\[30872\]: Invalid user holger from 183.111.96.20 port 34302 Jun 26 08:48:08 OPSO sshd\[30872\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.96.20 Jun 26 08:48:09 OPSO sshd\[30872\]: Failed password for invalid user holger from 183.111.96.20 port 34302 ssh2 Jun 26 08:51:43 OPSO sshd\[31733\]: Invalid user fileshare from 183.111.96.20 port 37362 Jun 26 08:51:43 OPSO sshd\[31733\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.96.20 |
2020-06-26 15:01:33 |
| 80.82.78.192 | attackspam | Jun 26 08:49:15 debian-2gb-nbg1-2 kernel: \[15412813.759498\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.82.78.192 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=21468 PROTO=TCP SPT=49760 DPT=1578 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-06-26 15:13:31 |
| 41.84.224.77 | attackspam | 41.84.224.77 - - [26/Jun/2020:04:53:25 +0100] "POST /xmlrpc.php HTTP/1.1" 200 229 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1" 41.84.224.77 - - [26/Jun/2020:04:54:30 +0100] "POST /xmlrpc.php HTTP/1.1" 503 18224 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1" 41.84.224.77 - - [26/Jun/2020:04:54:31 +0100] "POST /wp-login.php HTTP/1.1" 503 18027 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1" ... |
2020-06-26 14:39:17 |
| 183.89.212.181 | attackbotsspam | Dovecot Invalid User Login Attempt. |
2020-06-26 14:53:05 |
| 209.97.134.82 | attack | Jun 26 06:15:59 game-panel sshd[19011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.134.82 Jun 26 06:16:00 game-panel sshd[19011]: Failed password for invalid user praful from 209.97.134.82 port 53228 ssh2 Jun 26 06:20:01 game-panel sshd[19165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.134.82 |
2020-06-26 14:49:46 |