City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '119.44.0.0 - 119.44.63.255'
% Abuse contact for '119.44.0.0 - 119.44.63.255' is 'ipas@cnnic.cn'
inetnum: 119.44.0.0 - 119.44.63.255
netname: HNCATV
descr: HUNAN CATV Network Group CO.,LTD.
country: CN
admin-c: XL3529-AP
tech-c: XL3529-AP
abuse-c: AC1601-AP
status: ALLOCATED PORTABLE
mnt-by: MAINT-CNNIC-AP
mnt-lower: MAINT-CNNIC-AP
mnt-routes: MAINT-CNNIC-AP
mnt-irt: IRT-CNNIC-CN
last-modified: 2022-01-19T07:40:02Z
source: APNIC
irt: IRT-CNNIC-CN
address: Beijing, China
e-mail: ipas@cnnic.cn
abuse-mailbox: ipas@cnnic.cn
admin-c: IP50-AP
tech-c: IP50-AP
auth: # Filtered
remarks: Please note that CNNIC is not an ISP and is not
remarks: empowered to investigate complaints of network abuse.
remarks: Please contact the tech-c or admin-c of the network.
remarks: ipas@cnnic.cn is invalid
mnt-by: MAINT-CNNIC-AP
last-modified: 2025-09-19T17:19:56Z
source: APNIC
role: ABUSE CNNICCN
country: ZZ
address: Beijing, China
phone: +000000000
e-mail: ipas@cnnic.cn
admin-c: IP50-AP
tech-c: IP50-AP
nic-hdl: AC1601-AP
remarks: Generated from irt object IRT-CNNIC-CN
remarks: ipas@cnnic.cn is invalid
abuse-mailbox: ipas@cnnic.cn
mnt-by: APNIC-ABUSE
last-modified: 2025-09-19T17:20:32Z
source: APNIC
person: Xia Long
address: 4F,JoycitBuilding,SaintTropez ,Hotel,changsha,hunan,China
country: CN
phone: +86-18673130402
e-mail: 83469600@qq.com
nic-hdl: XL3529-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2017-07-10T02:02:01Z
source: APNIC
% Information related to '119.44.0.0/16AS17816'
route: 119.44.0.0/16
descr: China Unicom Guangdong Province network
descr: Addresses from CNNIC
country: CN
origin: AS17816
mnt-by: MAINT-CNCGROUP-RR
last-modified: 2011-03-24T06:50:02Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.44.61.111
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22481
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;119.44.61.111. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025100702 1800 900 604800 86400
;; Query time: 192 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 08 04:04:53 CST 2025
;; MSG SIZE rcvd: 106
Host 111.61.44.119.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 111.61.44.119.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
106.54.121.34 | attack | suspicious action Mon, 24 Feb 2020 01:48:10 -0300 |
2020-02-24 18:16:30 |
176.212.96.3 | attackspambots | unauthorized connection attempt |
2020-02-24 18:01:54 |
186.4.153.253 | attackspambots | Unauthorised access (Feb 24) SRC=186.4.153.253 LEN=44 TTL=240 ID=33395 TCP DPT=445 WINDOW=1024 SYN |
2020-02-24 18:15:49 |
82.99.193.52 | attack | suspicious action Mon, 24 Feb 2020 01:48:20 -0300 |
2020-02-24 18:12:36 |
12.9.104.3 | attackspambots | suspicious action Mon, 24 Feb 2020 01:48:17 -0300 |
2020-02-24 18:14:53 |
14.177.114.208 | attackspambots | 1582519762 - 02/24/2020 05:49:22 Host: 14.177.114.208/14.177.114.208 Port: 445 TCP Blocked |
2020-02-24 17:51:26 |
202.29.39.1 | attackbots | SSH invalid-user multiple login attempts |
2020-02-24 18:01:27 |
117.60.90.151 | attack | Automatic report - Port Scan Attack |
2020-02-24 18:11:53 |
162.243.136.70 | attack | Port probing on unauthorized port 143 |
2020-02-24 17:52:34 |
176.45.220.40 | attack | Automatic report - Port Scan Attack |
2020-02-24 18:06:27 |
60.168.69.80 | attackspambots | [portscan] Port scan |
2020-02-24 18:10:02 |
14.186.204.134 | attack | Attempts against SMTP/SSMTP |
2020-02-24 18:25:16 |
185.137.233.164 | attack | Feb 24 05:42:35 [host] kernel: [5718159.653333] [U Feb 24 05:44:39 [host] kernel: [5718284.360108] [U Feb 24 05:44:55 [host] kernel: [5718299.609207] [U Feb 24 05:47:33 [host] kernel: [5718458.455298] [U Feb 24 05:48:26 [host] kernel: [5718510.607793] [U Feb 24 05:49:24 [host] kernel: [5718568.794802] [U |
2020-02-24 17:50:00 |
103.82.80.157 | attackbots | 1582519708 - 02/24/2020 05:48:28 Host: 103.82.80.157/103.82.80.157 Port: 445 TCP Blocked |
2020-02-24 18:07:31 |
192.241.227.56 | attackbotsspam | Honeypot hit. |
2020-02-24 17:55:10 |