Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Beijing

Region: Beijing

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '101.4.0.0 - 101.7.255.255'

% Abuse contact for '101.4.0.0 - 101.7.255.255' is 'abuse@cernet.edu.cn'

inetnum:        101.4.0.0 - 101.7.255.255
netname:        BJR-CERNET
descr:          China Education and Research Network
descr:          Beijing Regional Network
country:        CN
admin-c:        CER-AP
tech-c:         CER-AP
abuse-c:        AC1685-AP
status:         ALLOCATED PORTABLE
remarks:        origin AS4538
remarks:        confederation
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CERNET-AP
mnt-routes:     MAINT-CERNET-AP
mnt-irt:        IRT-CERNET-AP
last-modified:  2020-09-03T09:16:24Z
source:         APNIC

irt:            IRT-CERNET-AP
address:        Network Center,
address:        FIT-3-220, Tsinghua Univ
address:        Beijing 100084, China
phone:          +86-10-62784301
fax-no:         +86-10-62785933
e-mail:         abuse@cernet.edu.cn
abuse-mailbox:  abuse@cernet.edu.cn
admin-c:        CER-AP
tech-c:         CER-AP
auth:           # Filtered
remarks:        timezone GMT+8
remarks:        abuse@cernet.edu.cn was validated on 2026-03-05
mnt-by:         MAINT-CERNET-AP
last-modified:  2026-03-05T06:39:56Z
source:         APNIC

role:           ABUSE CERNETAP
country:        ZZ
address:        Network Center,
address:        FIT-3-220, Tsinghua Univ
address:        Beijing 100084, China
phone:          +86-10-62784301
e-mail:         abuse@cernet.edu.cn
admin-c:        CER-AP
tech-c:         CER-AP
nic-hdl:        AC1685-AP
remarks:        Generated from irt object IRT-CERNET-AP
remarks:        abuse@cernet.edu.cn was validated on 2026-03-05
abuse-mailbox:  abuse@cernet.edu.cn
mnt-by:         APNIC-ABUSE
last-modified:  2026-03-05T06:40:20Z
source:         APNIC

role:           CERNET Helpdesk
address:        CERNET Center
address:        Beijing 100084, China
country:        CN
phone:          +86-10-6278-4049
fax-no:         +86-10-6278-5933
e-mail:         helpdesk@cernet.edu.cn
remarks:        abuse@cernet.edu.cn
admin-c:        XL1-CN
tech-c:         SZ2-AP
nic-hdl:        CER-AP
mnt-by:         MAINT-CERNET-AP
last-modified:  2020-09-03T09:14:12Z
source:         APNIC

% Information related to '101.4.0.0/14AS4538'

route:          101.4.0.0/14
descr:          CERNET
origin:         AS4538
mnt-by:         MAINT-CERNET-AP
last-modified:  2010-12-13T06:08:01Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 101.6.55.67
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52582
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;101.6.55.67.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042300 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 23 22:27:49 CST 2026
;; MSG SIZE  rcvd: 104
Host info
Host 67.55.6.101.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 67.55.6.101.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
129.211.171.137 attack
Invalid user test from 129.211.171.137 port 47700
2020-04-20 21:30:08
167.71.83.6 attackbotsspam
$f2bV_matches
2020-04-20 21:24:46
212.68.249.25 attack
Invalid user pi from 212.68.249.25 port 40819
2020-04-20 21:09:03
190.90.219.3 attackspam
Invalid user ntp from 190.90.219.3 port 4105
2020-04-20 21:15:22
158.101.166.68 attack
Invalid user web from 158.101.166.68 port 22536
2020-04-20 21:26:01
221.229.162.189 attackbots
Apr 20 15:09:12 master sshd[8843]: Failed password for invalid user dev from 221.229.162.189 port 30985 ssh2
2020-04-20 21:05:58
117.107.163.240 attackspambots
$f2bV_matches
2020-04-20 21:35:56
159.65.217.53 attack
Invalid user gf from 159.65.217.53 port 41960
2020-04-20 21:25:03
211.234.119.189 attackspambots
$f2bV_matches
2020-04-20 21:09:19
190.85.140.93 attack
Invalid user oracle from 190.85.140.93 port 60644
2020-04-20 21:15:50
197.44.171.189 attackspam
Invalid user admin from 197.44.171.189 port 47391
2020-04-20 21:13:48
106.75.246.107 attack
Apr 20 14:06:48 vpn01 sshd[26286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.246.107
Apr 20 14:06:50 vpn01 sshd[26286]: Failed password for invalid user testtest from 106.75.246.107 port 52613 ssh2
...
2020-04-20 21:42:55
190.181.60.2 attackbotsspam
$f2bV_matches
2020-04-20 21:14:41
113.31.104.122 attack
Invalid user admin from 113.31.104.122 port 60852
2020-04-20 21:39:34
213.55.2.212 attackspam
Invalid user samir from 213.55.2.212 port 60444
2020-04-20 21:08:22

Recently Reported IPs

2606:4700:10::6816:4233 172.238.113.2 176.65.148.196 102.170.191.157
112.24.142.242 2606:4700:10::6814:8227 2606:4700:10::6814:8460 2606:4700:10::6816:4914
2606:4700:10::6814:4410 124.225.22.32 48.215.98.69 168.144.38.34
121.199.163.238 52.23.194.58 121.41.171.45 134.35.157.69
2606:4700:10::6814:9398 2606:4700:10::ac43:1875 2606:4700:10::6816:4505 121.230.89.132