Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nanjing

Region: Jiangsu

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '121.224.0.0 - 121.239.255.255'

% Abuse contact for '121.224.0.0 - 121.239.255.255' is 'anti-spam@chinatelecom.cn'

inetnum:        121.224.0.0 - 121.239.255.255
netname:        CHINANET-JS
descr:          CHINANET jiangsu province network
descr:          China Telecom
descr:          A12,Xin-Jie-Kou-Wai Street
descr:          Beijing 100088
country:        CN
admin-c:        CH93-AP
tech-c:         CJ186-AP
abuse-c:        AC1573-AP
status:         ALLOCATED PORTABLE
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CHINANET-JS
mnt-routes:     MAINT-CHINANET-JS
mnt-irt:        IRT-CHINANET-CN
last-modified:  2021-06-15T08:05:09Z
source:         APNIC

irt:            IRT-CHINANET-CN
address:        No.31 ,jingrong street,beijing
address:        100032
e-mail:         anti-spam@chinatelecom.cn
abuse-mailbox:  anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
auth:           # Filtered
remarks:        anti-spam@chinatelecom.cn was validated on 2025-11-13
mnt-by:         MAINT-CHINANET
last-modified:  2026-03-13T07:12:20Z
source:         APNIC

role:           ABUSE CHINANETCN
country:        ZZ
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +000000000
e-mail:         anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
nic-hdl:        AC1573-AP
remarks:        Generated from irt object IRT-CHINANET-CN
remarks:        anti-spam@chinatelecom.cn was validated on 2025-11-13
abuse-mailbox:  anti-spam@chinatelecom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-11-13T14:15:15Z
source:         APNIC

role:           CHINANET JIANGSU
address:        260 Zhongyang Road,Nanjing 210037
country:        CN
phone:          +86-25-87799222
e-mail:         jsipmanager@163.com
remarks:        send anti-spam reports tojsipmanager@163.com
remarks:        send abuse reports tojsipmanager@163.com
remarks:        times in GMT+8
remarks:        www.jsinfo.net
admin-c:        CH360-AP
tech-c:         CS306-AP
tech-c:         CN142-AP
nic-hdl:        CJ186-AP
notify:         jsipmanager@163.com
mnt-by:         MAINT-CHINANET-JS
last-modified:  2022-08-05T15:34:47Z
source:         APNIC

person:         Chinanet Hostmaster
nic-hdl:        CH93-AP
e-mail:         anti-spam@chinatelecom.cn
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +86-10-58501724
fax-no:         +86-10-58501724
country:        CN
mnt-by:         MAINT-CHINANET
last-modified:  2022-02-28T06:53:44Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.230.89.38
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55772
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.230.89.38.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032400 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 24 21:06:52 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 38.89.230.121.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 38.89.230.121.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
34.70.217.179 attack
Sep  9 13:57:27 logopedia-1vcpu-1gb-nyc1-01 sshd[201906]: Failed password for root from 34.70.217.179 port 12238 ssh2
...
2020-09-10 03:57:19
81.200.243.228 attackbots
Brute forcing email accounts
2020-09-10 03:48:51
157.230.234.117 attack
157.230.234.117 - - \[09/Sep/2020:20:31:11 +0200\] "POST /wp-login.php HTTP/1.1" 200 12843 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
157.230.234.117 - - \[09/Sep/2020:20:31:12 +0200\] "POST /wp-login.php HTTP/1.1" 200 12678 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2020-09-10 03:55:29
18.222.203.254 attackbotsspam
mue-0 : Trying access unauthorized files=>/images/jdownloads/screenshots/update.php()
2020-09-10 03:35:26
222.186.15.115 attackspambots
Sep  9 21:33:28 piServer sshd[3018]: Failed password for root from 222.186.15.115 port 56098 ssh2
Sep  9 21:33:32 piServer sshd[3018]: Failed password for root from 222.186.15.115 port 56098 ssh2
Sep  9 21:33:36 piServer sshd[3018]: Failed password for root from 222.186.15.115 port 56098 ssh2
...
2020-09-10 03:36:20
185.220.102.249 attack
2020-09-09T20:14:54.580740ns386461 sshd\[16345\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=tor-exit-relay-3.anonymizing-proxy.digitalcourage.de  user=root
2020-09-09T20:14:56.762611ns386461 sshd\[16345\]: Failed password for root from 185.220.102.249 port 1688 ssh2
2020-09-09T20:14:58.995767ns386461 sshd\[16345\]: Failed password for root from 185.220.102.249 port 1688 ssh2
2020-09-09T20:15:01.666553ns386461 sshd\[16345\]: Failed password for root from 185.220.102.249 port 1688 ssh2
2020-09-09T20:15:04.478489ns386461 sshd\[16345\]: Failed password for root from 185.220.102.249 port 1688 ssh2
...
2020-09-10 03:23:57
218.22.36.135 attackspambots
2020-09-09T11:58:07.732172linuxbox-skyline sshd[1334]: Invalid user roman from 218.22.36.135 port 24881
...
2020-09-10 03:41:11
47.244.190.211 attack
port scan and connect, tcp 443 (https)
2020-09-10 03:34:43
157.245.54.200 attack
157.245.54.200 (SG/Singapore/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep  9 12:49:21 jbs1 sshd[17354]: Failed password for root from 157.245.54.200 port 46116 ssh2
Sep  9 12:57:44 jbs1 sshd[20671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.197  user=root
Sep  9 12:52:29 jbs1 sshd[18281]: Failed password for root from 49.235.215.147 port 36210 ssh2
Sep  9 12:49:19 jbs1 sshd[17354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.54.200  user=root
Sep  9 12:52:27 jbs1 sshd[18269]: Failed password for root from 95.163.195.60 port 40440 ssh2
Sep  9 12:52:27 jbs1 sshd[18281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.215.147  user=root

IP Addresses Blocked:
2020-09-10 03:39:23
206.189.138.151 attackspam
Port Scan
...
2020-09-10 03:27:55
222.186.175.217 attackbotsspam
Sep  9 21:18:57 eventyay sshd[4630]: Failed password for root from 222.186.175.217 port 23206 ssh2
Sep  9 21:19:11 eventyay sshd[4630]: error: maximum authentication attempts exceeded for root from 222.186.175.217 port 23206 ssh2 [preauth]
Sep  9 21:19:16 eventyay sshd[4632]: Failed password for root from 222.186.175.217 port 38958 ssh2
...
2020-09-10 03:20:29
88.116.119.140 attackspam
Sep  9 20:24:30 rocket sshd[5470]: Failed password for root from 88.116.119.140 port 38148 ssh2
Sep  9 20:28:19 rocket sshd[6075]: Failed password for root from 88.116.119.140 port 44692 ssh2
...
2020-09-10 03:44:52
106.13.215.94 attackbots
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-10 03:52:57
185.220.100.246 attack
fell into ViewStateTrap:wien2018
2020-09-10 03:26:32
156.54.164.144 attack
2020-09-09T21:23:15.859230paragon sshd[290422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.54.164.144
2020-09-09T21:23:15.855144paragon sshd[290422]: Invalid user nagios from 156.54.164.144 port 53587
2020-09-09T21:23:17.935864paragon sshd[290422]: Failed password for invalid user nagios from 156.54.164.144 port 53587 ssh2
2020-09-09T21:26:55.369520paragon sshd[290469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.54.164.144  user=root
2020-09-09T21:26:57.316145paragon sshd[290469]: Failed password for root from 156.54.164.144 port 56587 ssh2
...
2020-09-10 03:32:43

Recently Reported IPs

66.132.172.96 109.167.82.62 2606:4700:10::6816:2493 2606:4700:10::6814:5908
2606:4700:10::6816:3529 2606:4700:10::6814:4828 2606:4700:10::6814:8236 2606:4700:10::6814:8792
2606:4700:10::6814:5997 2606:4700:10::6816:4217 110.78.138.220 2606:4700:10::ac43:2474
2606:4700:10::ac43:2764 121.237.149.211 164.155.74.99 2606:4700:10::6814:4487
23.255.187.255 203.39.71.24 203.155.29.79 45.66.217.119