City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '110.42.0.0 - 110.42.127.255'
% Abuse contact for '110.42.0.0 - 110.42.127.255' is 'noc@nbgaofang.com'
inetnum: 110.42.0.0 - 110.42.127.255
netname: nbgaofang
descr: Ningbo Zhuo Zhi Innovation Network Technology Co., Ltd
descr: 1088-13 No.1558 Jiangnan Road,NingBo,China
country: CN
admin-c: YW7352-AP
tech-c: JS3943-AP
abuse-c: AC1601-AP
status: ALLOCATED PORTABLE
mnt-by: MAINT-CNNIC-AP
mnt-irt: IRT-NBGAOFANG-CN
mnt-lower: MAINT-CNNIC-AP
mnt-routes: MAINT-CNNIC-AP
last-modified: 2024-06-24T06:41:30Z
source: APNIC
irt: IRT-nbgaofang-CN
address: 1088-13 No.1558 Jiangnan Road,NingBo,China
e-mail: noc@nbgaofang.com
abuse-mailbox: noc@nbgaofang.com
admin-c: YW7352-AP
tech-c: JS3943-AP
auth: # Filtered
mnt-by: MAINT-CNNIC-AP
last-modified: 2024-06-24T06:41:30Z
source: APNIC
role: ABUSE CNNICCN
country: ZZ
address: Beijing, China
phone: +000000000
e-mail: ipas@cnnic.cn
admin-c: IP50-AP
tech-c: IP50-AP
nic-hdl: AC1601-AP
remarks: Generated from irt object IRT-CNNIC-CN
remarks: ipas@cnnic.cn is invalid
abuse-mailbox: ipas@cnnic.cn
mnt-by: APNIC-ABUSE
last-modified: 2025-09-19T17:20:32Z
source: APNIC
person: Tianyuan Wu
address: 1088-13 No.1558 Jiangnan Road,NingBo,China
country: CN
phone: +86-0574-88093323
e-mail: noc@nbgaofang.com
nic-hdl: JS3943-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2017-03-16T01:56:02Z
source: APNIC
person: sean lin
address: 088-13 No.1558 Jiangnan Road,NingBo,China
country: CN
phone: +86-18067210136
e-mail: op@6736.com
nic-hdl: YW7352-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2024-06-24T07:52:54Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 110.42.43.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29228
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;110.42.43.239. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025110400 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Nov 04 16:31:34 CST 2025
;; MSG SIZE rcvd: 106
Host 239.43.42.110.in-addr.arpa not found: 2(SERVFAIL)
server can't find 110.42.43.239.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 87.27.10.70 | attackspambots | 445/tcp 445/tcp [2020-06-25]2pkt |
2020-06-26 06:33:28 |
| 112.85.42.181 | attackbots | $f2bV_matches |
2020-06-26 06:33:05 |
| 190.201.84.214 | attack | Unauthorized connection attempt from IP address 190.201.84.214 on Port 445(SMB) |
2020-06-26 06:55:43 |
| 42.112.249.51 | attackbots | 81/tcp [2020-06-25]1pkt |
2020-06-26 06:29:09 |
| 197.185.96.249 | attackspambots | WordPress brute force |
2020-06-26 06:34:33 |
| 46.38.145.251 | attack | 2020-06-25T15:58:37.289303linuxbox-skyline auth[211562]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=zhaopin rhost=46.38.145.251 ... |
2020-06-26 06:45:13 |
| 111.170.85.58 | attackspambots | Port probing on unauthorized port 23 |
2020-06-26 06:49:37 |
| 31.9.222.115 | attackspam | WordPress brute force |
2020-06-26 06:16:17 |
| 181.59.171.170 | attackspam | WordPress brute force |
2020-06-26 06:56:48 |
| 222.186.175.183 | attackspam | Jun 25 22:41:55 game-panel sshd[20915]: Failed password for root from 222.186.175.183 port 27584 ssh2 Jun 25 22:41:59 game-panel sshd[20915]: Failed password for root from 222.186.175.183 port 27584 ssh2 Jun 25 22:42:03 game-panel sshd[20915]: Failed password for root from 222.186.175.183 port 27584 ssh2 Jun 25 22:42:10 game-panel sshd[20915]: error: maximum authentication attempts exceeded for root from 222.186.175.183 port 27584 ssh2 [preauth] |
2020-06-26 06:42:16 |
| 201.189.76.249 | attack | WordPress brute force |
2020-06-26 06:24:41 |
| 61.157.91.159 | attackspambots | Jun 25 21:08:40 rush sshd[6833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.157.91.159 Jun 25 21:08:42 rush sshd[6833]: Failed password for invalid user training from 61.157.91.159 port 50694 ssh2 Jun 25 21:10:44 rush sshd[6956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.157.91.159 ... |
2020-06-26 06:36:55 |
| 94.77.213.2 | attack | Unauthorized connection attempt from IP address 94.77.213.2 on Port 445(SMB) |
2020-06-26 06:50:02 |
| 46.38.148.22 | attackspambots | Jun 26 00:26:45 web1 postfix/smtpd\[28404\]: warning: unknown\[46.38.148.22\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 26 00:27:23 web1 postfix/smtpd\[28404\]: warning: unknown\[46.38.148.22\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 26 00:28:01 web1 postfix/smtpd\[28404\]: warning: unknown\[46.38.148.22\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2020-06-26 06:28:48 |
| 114.37.153.87 | attack | Unauthorized connection attempt from IP address 114.37.153.87 on Port 445(SMB) |
2020-06-26 06:27:10 |