Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Beijing

Region: Beijing

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '116.204.0.0 - 116.204.63.255'

% Abuse contact for '116.204.0.0 - 116.204.63.255' is 'ipas@cnnic.cn'

inetnum:        116.204.0.0 - 116.204.63.255
netname:        HWCSNET
descr:          Huawei Public Cloud Service (Huawei Software Technologies Ltd.Co)
descr:          No.2018 Xuegang Road,Bantian street,Longgang District,
descr:          Shenzhen,Guangdong Province, 518129 P.R.China
country:        CN
admin-c:        LL3172-AP
tech-c:         GX1759-AP
abuse-c:        AC1601-AP
status:         ALLOCATED PORTABLE
mnt-by:         MAINT-CNNIC-AP
mnt-lower:      MAINT-CNNIC-AP
mnt-routes:     MAINT-CNNIC-AP
mnt-irt:        IRT-CNNIC-CN
last-modified:  2022-04-18T05:40:05Z
source:         APNIC

irt:            IRT-CNNIC-CN
address:        Beijing, China
e-mail:         ipas@cnnic.cn
abuse-mailbox:  ipas@cnnic.cn
admin-c:        IP50-AP
tech-c:         IP50-AP
auth:           # Filtered
remarks:        Please note that CNNIC is not an ISP and is not
remarks:        empowered to investigate complaints of network abuse.
remarks:        Please contact the tech-c or admin-c of the network.
remarks:        ipas@cnnic.cn is invalid
mnt-by:         MAINT-CNNIC-AP
last-modified:  2025-09-19T17:19:56Z
source:         APNIC

role:           ABUSE CNNICCN
country:        ZZ
address:        Beijing, China
phone:          +000000000
e-mail:         ipas@cnnic.cn
admin-c:        IP50-AP
tech-c:         IP50-AP
nic-hdl:        AC1601-AP
remarks:        Generated from irt object IRT-CNNIC-CN
remarks:        ipas@cnnic.cn is invalid
abuse-mailbox:  ipas@cnnic.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-19T17:20:32Z
source:         APNIC

person:         Gui xiaowei
address:        HUAWEI CLOUD Data Center, Jiaoxinggong Road, Qianzhong Avenue, Gui'an New District, Guizhou Province
country:        CN
phone:          +86-18566251984
e-mail:         guixiaowei@huawei.com
nic-hdl:        GX1759-AP
mnt-by:         MAINT-CNNIC-AP
last-modified:  2022-04-18T05:32:41Z
source:         APNIC

person:         Liu Liqun
address:        HUAWEI CLOUD Data Center, Jiaoxinggong Road, Qianzhong Avenue, Gui'an New District, Guizhou Province
country:        CN
phone:          +86-13360099887
e-mail:         liuliqun2@huawei.com
nic-hdl:        LL3172-AP
mnt-by:         MAINT-CNNIC-AP
last-modified:  2022-04-18T05:33:15Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.204.26.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1902
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.204.26.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025100300 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 03 23:42:27 CST 2025
;; MSG SIZE  rcvd: 106
Host info
12.26.204.116.in-addr.arpa domain name pointer ecs-116-204-26-12.compute.hwclouds-dns.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
12.26.204.116.in-addr.arpa	name = ecs-116-204-26-12.compute.hwclouds-dns.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
152.136.71.237 attack
$f2bV_matches
2020-01-11 21:23:18
149.140.193.138 attack
port scan and connect, tcp 80 (http)
2020-01-11 21:16:23
153.122.144.121 attackbotsspam
$f2bV_matches
2020-01-11 21:14:44
222.186.180.147 attackbotsspam
20/1/11@08:06:51: FAIL: IoT-SSH address from=222.186.180.147
...
2020-01-11 21:07:39
125.166.162.183 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 11-01-2020 05:45:17.
2020-01-11 20:51:50
156.206.151.228 attackspambots
Jan 11 06:54:01 dev sshd\[342\]: Invalid user admin from 156.206.151.228 port 33658
Jan 11 06:54:01 dev sshd\[342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.206.151.228
Jan 11 06:54:03 dev sshd\[342\]: Failed password for invalid user admin from 156.206.151.228 port 33658 ssh2
2020-01-11 21:09:26
49.235.239.215 attackbots
Unauthorized connection attempt detected from IP address 49.235.239.215 to port 2220 [J]
2020-01-11 20:50:54
178.67.199.193 attackspam
Unauthorized connection attempt from IP address 178.67.199.193 on Port 445(SMB)
2020-01-11 21:04:03
152.32.134.90 attackbots
$f2bV_matches
2020-01-11 21:18:29
47.100.254.237 attackbotsspam
Bruteforce on SSH Honeypot
2020-01-11 21:21:39
176.31.252.148 attackspam
Jan 11 08:09:39 ny01 sshd[23846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.252.148
Jan 11 08:09:41 ny01 sshd[23846]: Failed password for invalid user 123456789 from 176.31.252.148 port 60582 ssh2
Jan 11 08:11:41 ny01 sshd[24029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.252.148
2020-01-11 21:29:19
203.217.189.74 attackbots
Unauthorized connection attempt from IP address 203.217.189.74 on Port 445(SMB)
2020-01-11 20:53:40
191.232.162.22 attack
xmlrpc attack
2020-01-11 21:28:49
54.200.16.4 attackbots
Unauthorized connection attempt detected from IP address 54.200.16.4 to port 4433 [J]
2020-01-11 21:21:05
94.181.33.149 attack
proto=tcp  .  spt=36364  .  dpt=25  .     Listed on    dnsbl-sorbs plus abuseat-org and barracuda     (300)
2020-01-11 21:12:22

Recently Reported IPs

157.245.148.140 142.93.173.235 59.65.255.134 59.65.255.131
59.65.255.24 217.160.202.182 59.173.133.138 211.137.77.21
138.68.104.121 103.151.122.169 14.213.29.151 183.10.0.221
183.10.0.185 106.227.26.35 112.124.14.220 183.7.18.55
107.170.76.150 216.167.69.64 20.168.120.227 185.247.137.163