City: Beijing
Region: Beijing
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '120.48.0.0 - 120.49.255.255'
% Abuse contact for '120.48.0.0 - 120.49.255.255' is 'huxin05@baidu.com'
inetnum: 120.48.0.0 - 120.49.255.255
netname: Baidu
descr: Beijing Baidu Netcom Science and Technology Co., Ltd.
descr: Baidu Plaza, No.10, Shangdi 10th street,
descr: Haidian District Beijing,100080
country: CN
admin-c: BN261-AP
tech-c: BN261-AP
abuse-c: AC1601-AP
status: ALLOCATED PORTABLE
mnt-by: MAINT-CNNIC-AP
mnt-irt: IRT-BAIDU-CN
mnt-lower: MAINT-CNNIC-AP
mnt-routes: MAINT-CNNIC-AP
last-modified: 2024-03-11T23:28:49Z
source: APNIC
irt: IRT-BAIDU-CN
address: 12f,lixiang building ,zhongguancun,beijing
e-mail: huxin05@baidu.com
abuse-mailbox: huxin05@baidu.com
admin-c: ZKY3-AP
tech-c: ZKY3-AP
auth: # Filtered
mnt-by: MAINT-CNNIC-AP
last-modified: 2025-11-18T00:35:07Z
source: APNIC
role: ABUSE CNNICCN
country: ZZ
address: Beijing, China
phone: +000000000
e-mail: ipas@cnnic.cn
admin-c: IP50-AP
tech-c: IP50-AP
nic-hdl: AC1601-AP
remarks: Generated from irt object IRT-CNNIC-CN
remarks: ipas@cnnic.cn is invalid
abuse-mailbox: ipas@cnnic.cn
mnt-by: APNIC-ABUSE
last-modified: 2025-09-19T17:20:32Z
source: APNIC
person: Baidu Noc
address: Baidu Campus,NO.10 Shangdi 10th Street,Haidian District,Beijing The People's Republic of China 100085
country: CN
phone: +86-18110062082
e-mail: noc@baidu.com
nic-hdl: BN261-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2024-03-11T23:28:23Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.48.75.210
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44228
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;120.48.75.210. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026012901 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 30 04:30:32 CST 2026
;; MSG SIZE rcvd: 106
Host 210.75.48.120.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 210.75.48.120.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 218.92.0.204 | attack | 2019-10-19T05:29:56.062941abusebot-8.cloudsearch.cf sshd\[8289\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.204 user=root |
2019-10-19 13:46:18 |
| 178.159.249.66 | attackspam | Oct 19 02:02:13 firewall sshd[3455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.159.249.66 user=root Oct 19 02:02:14 firewall sshd[3455]: Failed password for root from 178.159.249.66 port 47724 ssh2 Oct 19 02:05:48 firewall sshd[3553]: Invalid user gwenyth from 178.159.249.66 ... |
2019-10-19 13:15:56 |
| 222.86.159.208 | attack | Oct 19 08:09:56 server sshd\[6451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.86.159.208 user=root Oct 19 08:09:59 server sshd\[6451\]: Failed password for root from 222.86.159.208 port 24555 ssh2 Oct 19 08:22:44 server sshd\[10068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.86.159.208 user=root Oct 19 08:22:47 server sshd\[10068\]: Failed password for root from 222.86.159.208 port 22614 ssh2 Oct 19 08:28:00 server sshd\[11648\]: Invalid user bash from 222.86.159.208 ... |
2019-10-19 13:44:41 |
| 179.184.217.83 | attack | Oct 18 19:41:26 php1 sshd\[10543\]: Invalid user porc from 179.184.217.83 Oct 18 19:41:26 php1 sshd\[10543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.184.217.83 Oct 18 19:41:28 php1 sshd\[10543\]: Failed password for invalid user porc from 179.184.217.83 port 59720 ssh2 Oct 18 19:46:07 php1 sshd\[11400\]: Invalid user pzx0918 from 179.184.217.83 Oct 18 19:46:07 php1 sshd\[11400\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.184.217.83 |
2019-10-19 14:00:35 |
| 207.6.1.11 | attack | Oct 19 06:48:44 site2 sshd\[46128\]: Invalid user cisco1234 from 207.6.1.11Oct 19 06:48:46 site2 sshd\[46128\]: Failed password for invalid user cisco1234 from 207.6.1.11 port 33594 ssh2Oct 19 06:52:23 site2 sshd\[46265\]: Invalid user mimina from 207.6.1.11Oct 19 06:52:24 site2 sshd\[46265\]: Failed password for invalid user mimina from 207.6.1.11 port 53230 ssh2Oct 19 06:55:58 site2 sshd\[46410\]: Invalid user 123456 from 207.6.1.11 ... |
2019-10-19 13:50:14 |
| 145.131.25.241 | attackspam | Automatic report - XMLRPC Attack |
2019-10-19 13:53:08 |
| 207.154.218.16 | attack | SSH Brute-Forcing (ownc) |
2019-10-19 13:06:36 |
| 106.12.49.150 | attack | Oct 19 05:41:00 microserver sshd[4223]: Invalid user shree123 from 106.12.49.150 port 56438 Oct 19 05:41:00 microserver sshd[4223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.49.150 Oct 19 05:41:02 microserver sshd[4223]: Failed password for invalid user shree123 from 106.12.49.150 port 56438 ssh2 Oct 19 05:45:20 microserver sshd[4849]: Invalid user hello from 106.12.49.150 port 37746 Oct 19 05:45:20 microserver sshd[4849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.49.150 Oct 19 05:58:17 microserver sshd[6491]: Invalid user q2w3e4r5t6y7u8 from 106.12.49.150 port 38158 Oct 19 05:58:17 microserver sshd[6491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.49.150 Oct 19 05:58:19 microserver sshd[6491]: Failed password for invalid user q2w3e4r5t6y7u8 from 106.12.49.150 port 38158 ssh2 Oct 19 06:02:43 microserver sshd[7133]: Invalid user huangzkdns from 106.12.49. |
2019-10-19 13:26:30 |
| 222.186.175.154 | attack | 2019-10-19T07:24:03.862077scmdmz1 sshd\[2591\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154 user=root 2019-10-19T07:24:06.099258scmdmz1 sshd\[2591\]: Failed password for root from 222.186.175.154 port 13910 ssh2 2019-10-19T07:24:12.134076scmdmz1 sshd\[2591\]: Failed password for root from 222.186.175.154 port 13910 ssh2 ... |
2019-10-19 13:42:29 |
| 122.116.232.195 | attackbots | Fail2Ban Ban Triggered |
2019-10-19 13:57:29 |
| 36.89.93.233 | attackbotsspam | (sshd) Failed SSH login from 36.89.93.233 (ID/Indonesia/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 18 23:36:41 localhost sshd[26974]: Invalid user admin from 36.89.93.233 port 54406 Oct 18 23:36:43 localhost sshd[26974]: Failed password for invalid user admin from 36.89.93.233 port 54406 ssh2 Oct 18 23:48:53 localhost sshd[27773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.89.93.233 user=root Oct 18 23:48:55 localhost sshd[27773]: Failed password for root from 36.89.93.233 port 53698 ssh2 Oct 18 23:56:39 localhost sshd[28262]: Invalid user mitha from 36.89.93.233 port 34128 |
2019-10-19 13:21:38 |
| 223.71.139.97 | attack | 2019-10-19T05:27:04.630278abusebot-5.cloudsearch.cf sshd\[32015\]: Invalid user alberto from 223.71.139.97 port 34576 |
2019-10-19 13:57:47 |
| 132.232.32.13 | attack | 132.232.32.13 - - [18/Oct/2019:20:52:52 -0500] "POST /db.init.php HTTP/1.1" 404 132.232.32.13 - - [18/Oct/2019:20:52:52 -0500] "POST /db_session.init.php HTTP/1 132.232.32.13 - - [18/Oct/2019:20:52:53 -0500] "POST /db__.init.php HTTP/1.1" 40 132.232.32.13 - - [18/Oct/2019:20:52:53 -0500] "POST /wp-admins.php HTTP/1.1" 40 |
2019-10-19 13:51:27 |
| 103.224.251.102 | attackspambots | 2019-10-19T04:59:00.697489abusebot-2.cloudsearch.cf sshd\[23257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.224.251.102 user=root |
2019-10-19 13:53:26 |
| 218.94.87.54 | attack | Automatic report - Web App Attack |
2019-10-19 13:27:03 |