Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '113.62.0.0 - 113.63.255.255'

% Abuse contact for '113.62.0.0 - 113.63.255.255' is 'anti-spam@chinatelecom.cn'

inetnum:        113.62.0.0 - 113.63.255.255
netname:        CHINANET-XZ
descr:          CHINANET XIZANG PROVINCE NETWORK
descr:          Tibet Telecom
descr:          China Telecom
country:        CN
admin-c:        CH93-AP
tech-c:         LT113-AP
abuse-c:        AC1573-AP
status:         ALLOCATED PORTABLE
remarks:        service provider
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
notify:         deximd@163.com
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CHINANET-XZ
mnt-routes:     MAINT-CHINANET-XZ
mnt-irt:        IRT-CHINANET-CN
last-modified:  2021-06-15T08:04:52Z
source:         APNIC

irt:            IRT-CHINANET-CN
address:        No.31 ,jingrong street,beijing
address:        100032
e-mail:         anti-spam@chinatelecom.cn
abuse-mailbox:  anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
auth:           # Filtered
remarks:        anti-spam@chinatelecom.cn was validated on 2025-11-13
mnt-by:         MAINT-CHINANET
last-modified:  2025-11-18T00:26:23Z
source:         APNIC

role:           ABUSE CHINANETCN
country:        ZZ
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +000000000
e-mail:         anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
nic-hdl:        AC1573-AP
remarks:        Generated from irt object IRT-CHINANET-CN
remarks:        anti-spam@chinatelecom.cn was validated on 2025-11-13
abuse-mailbox:  anti-spam@chinatelecom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-11-13T14:15:15Z
source:         APNIC

person:         Chinanet Hostmaster
nic-hdl:        CH93-AP
e-mail:         anti-spam@chinatelecom.cn
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +86-10-58501724
fax-no:         +86-10-58501724
country:        CN
mnt-by:         MAINT-CHINANET
last-modified:  2022-02-28T06:53:44Z
source:         APNIC

person:         LHASH Tibet-chinanet
address:        NO.59  ,XIZANG LASA ,BEIJING  STREET
country:        CN
phone:          +86-0891-6812990
fax-no:         +86-0891-6812991
e-mail:         jiangst@163.com
nic-hdl:        LT113-AP
mnt-by:         MAINT-CHINANET-XZ
last-modified:  2009-09-01T09:18:07Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.63.34.90
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13982
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.63.34.90.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026013100 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 31 20:57:14 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 90.34.63.113.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 90.34.63.113.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
182.117.99.23 attackspambots
23/tcp
[2020-10-04]1pkt
2020-10-05 22:06:29
49.233.33.66 attackbotsspam
(sshd) Failed SSH login from 49.233.33.66 (CN/China/Guangdong/Shenzhen/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  5 06:05:24 atlas sshd[16267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.33.66  user=root
Oct  5 06:05:26 atlas sshd[16267]: Failed password for root from 49.233.33.66 port 48332 ssh2
Oct  5 06:12:06 atlas sshd[18013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.33.66  user=root
Oct  5 06:12:08 atlas sshd[18013]: Failed password for root from 49.233.33.66 port 49176 ssh2
Oct  5 06:14:42 atlas sshd[18542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.33.66  user=root
2020-10-05 21:57:41
86.35.212.56 attack
 TCP (SYN) 86.35.212.56:30972 -> port 23, len 44
2020-10-05 22:08:58
103.90.190.54 attackbots
Oct  5 05:34:40 ift sshd\[29208\]: Failed password for root from 103.90.190.54 port 26824 ssh2Oct  5 05:36:00 ift sshd\[29571\]: Failed password for root from 103.90.190.54 port 36944 ssh2Oct  5 05:37:26 ift sshd\[29705\]: Failed password for root from 103.90.190.54 port 47068 ssh2Oct  5 05:38:57 ift sshd\[29784\]: Failed password for root from 103.90.190.54 port 57190 ssh2Oct  5 05:40:28 ift sshd\[30155\]: Failed password for root from 103.90.190.54 port 2799 ssh2
...
2020-10-05 22:16:47
95.252.8.106 attackbotsspam
firewall-block, port(s): 445/tcp
2020-10-05 22:06:16
116.86.220.134 attackspam
Automatic report - Port Scan Attack
2020-10-05 21:51:11
198.199.89.152 attackbots
"Unauthorized connection attempt on SSHD detected"
2020-10-05 21:58:21
139.59.20.176 attackspam
Automatic report - Banned IP Access
2020-10-05 21:54:43
197.158.30.43 attack
Email rejected due to spam filtering
2020-10-05 22:01:57
122.51.150.134 attackspam
Oct  5 10:29:31 nopemail auth.info sshd[17307]: Disconnected from authenticating user root 122.51.150.134 port 39652 [preauth]
...
2020-10-05 22:29:14
197.240.53.2 attack
Email rejected due to spam filtering
2020-10-05 21:56:12
212.103.183.54 attack
81/tcp
[2020-10-04]1pkt
2020-10-05 22:25:18
71.66.22.194 attackbotsspam
Automatic report - Banned IP Access
2020-10-05 22:07:11
1.194.238.226 attack
SSH Brute Force
2020-10-05 22:27:13
211.193.58.225 attackbotsspam
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-10-05T10:03:31Z and 2020-10-05T10:10:12Z
2020-10-05 21:50:05

Recently Reported IPs

167.172.177.68 165.232.125.139 164.92.174.223 66.249.77.97
184.73.104.41 156.238.226.251 47.92.241.103 20.64.105.242
110.19.100.45 39.99.132.30 39.98.108.112 104.200.30.32
182.107.120.233 47.92.199.86 140.235.143.101 43.142.37.59
1.161.34.126 165.245.178.22 217.154.23.3 123.58.10.198