City: Tianjin
Region: Tianjin
Country: China
Internet Service Provider: China Unicom
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '111.160.0.0 - 111.167.255.255'
% Abuse contact for '111.160.0.0 - 111.167.255.255' is 'zhaoyz3@chinaunicom.cn'
inetnum: 111.160.0.0 - 111.167.255.255
netname: UNICOM-TJ
descr: China Unicom Tianjin province network
descr: China Unicom
country: CN
admin-c: CH455-AP
tech-c: HZ19-AP
abuse-c: AC1718-AP
status: ALLOCATED PORTABLE
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-lower: MAINT-CNCGROUP-TJ
mnt-routes: MAINT-CNCGROUP-RR
mnt-irt: IRT-CU-CN
last-modified: 2023-10-21T03:33:42Z
source: APNIC
irt: IRT-CU-CN
address: No.21,Financial Street
address: Beijing,100033
address: P.R.China
e-mail: zhaoyz3@chinaunicom.cn
abuse-mailbox: zhaoyz3@chinaunicom.cn
admin-c: CH1302-AP
tech-c: CH1302-AP
auth: # Filtered
remarks: zhaoyz3@chinaunicom.cn is invalid
mnt-by: MAINT-CNCGROUP
last-modified: 2025-10-03T06:12:01Z
source: APNIC
role: ABUSE CUCN
country: ZZ
address: No.21,Financial Street
address: Beijing,100033
address: P.R.China
phone: +000000000
e-mail: zhaoyz3@chinaunicom.cn
admin-c: CH1302-AP
tech-c: CH1302-AP
nic-hdl: AC1718-AP
remarks: Generated from irt object IRT-CU-CN
remarks: zhaoyz3@chinaunicom.cn is invalid
abuse-mailbox: zhaoyz3@chinaunicom.cn
mnt-by: APNIC-ABUSE
last-modified: 2025-09-10T13:08:11Z
source: APNIC
role: CNCGroup Hostmaster
e-mail: hqs-ipabuse@chinaunicom.cn
address: No.156,Fu-Xing-Men-Nei Street,
address: Beijing,100031,P.R.China
nic-hdl: CH455-AP
phone: +86-10-82993155
fax-no: +86-10-82993102
country: CN
admin-c: CH444-AP
tech-c: CH444-AP
mnt-by: MAINT-CNCGROUP
last-modified: 2017-08-17T06:13:15Z
source: APNIC
person: huang zheng
nic-hdl: HZ19-AP
e-mail: tj-ipaddr3@chinaunicom.cn
address: 76 NO, ShiZiLin Street ,HeBei district of Tianjin,China
phone: +86-22-24459190
fax-no: +86-22-24454499
country: CN
mnt-by: MAINT-CNCGROUP-TJ
last-modified: 2012-07-13T05:56:27Z
source: APNIC
% Information related to '111.160.0.0/13AS4837'
route: 111.160.0.0/13
descr: China Unicom Tianjin Province Network
country: CN
origin: AS4837
mnt-by: MAINT-CNCGROUP-RR
last-modified: 2009-05-22T06:21:10Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 111.166.155.225
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6059
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;111.166.155.225. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025100702 1800 900 604800 86400
;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 08 09:05:16 CST 2025
;; MSG SIZE rcvd: 108
225.155.166.111.in-addr.arpa domain name pointer dns225.online.tj.cn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
225.155.166.111.in-addr.arpa name = dns225.online.tj.cn.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
114.103.88.136 | attack | Unauthorized connection attempt detected from IP address 114.103.88.136 to port 6656 [T] |
2020-01-30 18:00:16 |
117.91.170.105 | attackbots | Unauthorized connection attempt detected from IP address 117.91.170.105 to port 6656 [T] |
2020-01-30 17:56:46 |
112.95.249.136 | attackbots | Unauthorized connection attempt detected from IP address 112.95.249.136 to port 2220 [J] |
2020-01-30 18:36:18 |
60.185.34.65 | attackbotsspam | Unauthorized connection attempt detected from IP address 60.185.34.65 to port 6656 [T] |
2020-01-30 18:39:12 |
213.135.78.237 | attackspam | Unauthorized connection attempt detected from IP address 213.135.78.237 to port 1540 [T] |
2020-01-30 18:18:25 |
113.76.230.209 | attackbots | Unauthorized connection attempt detected from IP address 113.76.230.209 to port 6656 [T] |
2020-01-30 18:01:06 |
118.232.172.61 | attack | Unauthorized connection attempt detected from IP address 118.232.172.61 to port 81 [J] |
2020-01-30 17:55:40 |
182.243.148.22 | attackspambots | Unauthorized connection attempt detected from IP address 182.243.148.22 to port 6656 [T] |
2020-01-30 18:20:43 |
60.160.143.89 | attackbotsspam | Unauthorized connection attempt detected from IP address 60.160.143.89 to port 6656 [T] |
2020-01-30 18:40:01 |
112.216.44.82 | attack | Tried to connect to Port 22 (21x) |
2020-01-30 18:35:25 |
183.51.190.13 | attackspam | Unauthorized connection attempt detected from IP address 183.51.190.13 to port 6656 [T] |
2020-01-30 18:19:45 |
106.35.35.210 | attackbots | Unauthorized connection attempt detected from IP address 106.35.35.210 to port 6656 [T] |
2020-01-30 18:05:01 |
42.112.17.30 | attack | Unauthorized connection attempt detected from IP address 42.112.17.30 to port 5631 [T] |
2020-01-30 18:10:35 |
120.27.22.242 | attack | Unauthorized connection attempt detected from IP address 120.27.22.242 to port 23 [T] |
2020-01-30 18:27:53 |
182.34.202.223 | attack | Unauthorized connection attempt detected from IP address 182.34.202.223 to port 6656 [T] |
2020-01-30 18:21:32 |