Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Shijiazhuang

Region: Hebei

Country: China

Internet Service Provider: China Unicom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '121.28.0.0 - 121.29.255.255'

% Abuse contact for '121.28.0.0 - 121.29.255.255' is 'zhaoyz3@chinaunicom.cn'

inetnum:        121.28.0.0 - 121.29.255.255
netname:        UNICOM-HE
descr:          China Unicom Hebei province network
descr:          China Unicom
country:        CN
admin-c:        CH1302-AP
tech-c:         KL984-AP
abuse-c:        AC1718-AP
status:         ALLOCATED PORTABLE
remarks:        service provider
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CNCGROUP-HE
mnt-routes:     MAINT-CNCGROUP-RR
mnt-irt:        IRT-CU-CN
last-modified:  2023-10-21T03:30:44Z
source:         APNIC

irt:            IRT-CU-CN
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
e-mail:         zhaoyz3@chinaunicom.cn
abuse-mailbox:  zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
auth:           # Filtered
remarks:        zhaoyz3@chinaunicom.cn was validated on 2025-10-17
mnt-by:         MAINT-CNCGROUP
last-modified:  2025-11-18T00:26:20Z
source:         APNIC

role:           ABUSE CUCN
country:        ZZ
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
phone:          +000000000
e-mail:         zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
nic-hdl:        AC1718-AP
remarks:        Generated from irt object IRT-CU-CN
remarks:        zhaoyz3@chinaunicom.cn was validated on 2025-10-17
abuse-mailbox:  zhaoyz3@chinaunicom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-10-17T02:26:56Z
source:         APNIC

person:         ChinaUnicom Hostmaster
nic-hdl:        CH1302-AP
e-mail:         hqs-ipabuse@chinaunicom.cn
address:        No.21,Jin-Rong Street
address:        Beijing,100033
address:        P.R.China
phone:          +86-10-66259764
fax-no:         +86-10-66259764
country:        CN
mnt-by:         MAINT-CNCGROUP
last-modified:  2017-08-17T06:13:16Z
source:         APNIC

person:         Kong Lingfei
nic-hdl:        KL984-AP
e-mail:         konglf5@chinaunicom.cn
address:        45, Guang An Street, Shi Jiazhuang City, HeBei Province,050011,CN
phone:          +86-311-86681601
fax-no:         +86-311-86689210
country:        cn
mnt-by:         MAINT-CNCGROUP-HE
last-modified:  2009-02-06T02:31:32Z
source:         APNIC

% Information related to '121.28.0.0/15AS4837'

route:          121.28.0.0/15
descr:          CNC Group CHINA169 Hebei Province Network
country:        CN
origin:         AS4837
mnt-by:         MAINT-CNCGROUP-RR
last-modified:  2008-09-04T07:54:47Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.29.84.233
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54920
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.29.84.233.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041901 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 20 08:00:45 CST 2026
;; MSG SIZE  rcvd: 106
Host info
b'Host 233.84.29.121.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 233.84.29.121.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
79.20.87.80 attackbots
2019-10-31T21:41:20.757Z CLOSE host=79.20.87.80 port=37552 fd=4 time=20.010 bytes=14
...
2020-03-13 01:22:02
78.37.219.59 attackbots
2020-01-09T10:48:41.886Z CLOSE host=78.37.219.59 port=53883 fd=4 time=20.018 bytes=29
...
2020-03-13 01:31:58
78.190.154.186 attackspambots
2020-02-02T11:44:34.676Z CLOSE host=78.190.154.186 port=60181 fd=4 time=140.100 bytes=261
...
2020-03-13 01:38:14
104.200.134.250 attack
st-nyc1-01 recorded 3 login violations from 104.200.134.250 and was blocked at 2020-03-12 14:43:54. 104.200.134.250 has been blocked on 10 previous occasions. 104.200.134.250's first attempt was recorded at 2020-03-12 11:18:13
2020-03-13 01:37:33
79.119.180.125 attackbotsspam
2020-02-10T18:34:48.250Z CLOSE host=79.119.180.125 port=65258 fd=4 time=20.018 bytes=30
...
2020-03-13 01:28:06
82.162.3.184 attack
2020-02-06T08:41:58.972Z CLOSE host=82.162.3.184 port=60422 fd=4 time=20.010 bytes=24
...
2020-03-13 01:09:44
78.72.147.155 attack
2020-01-06T20:57:52.116Z CLOSE host=78.72.147.155 port=38494 fd=4 time=40.031 bytes=51
...
2020-03-13 01:28:43
5.135.164.168 attack
Mar 12 17:23:17 mail sshd[9054]: Invalid user jira from 5.135.164.168
Mar 12 17:23:17 mail sshd[9054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.164.168
Mar 12 17:23:17 mail sshd[9054]: Invalid user jira from 5.135.164.168
Mar 12 17:23:19 mail sshd[9054]: Failed password for invalid user jira from 5.135.164.168 port 37354 ssh2
Mar 12 17:41:37 mail sshd[6465]: Invalid user xbmc from 5.135.164.168
...
2020-03-13 01:22:30
80.28.236.112 attackspam
2020-02-13T15:59:13.181Z CLOSE host=80.28.236.112 port=63471 fd=4 time=20.008 bytes=28
...
2020-03-13 01:17:07
92.118.38.42 attackspambots
2020-03-12 18:18:44 dovecot_login authenticator failed for \(User\) \[92.118.38.42\]: 535 Incorrect authentication data \(set_id=obailey@no-server.de\)
2020-03-12 18:18:53 dovecot_login authenticator failed for \(User\) \[92.118.38.42\]: 535 Incorrect authentication data \(set_id=obailey@no-server.de\)
2020-03-12 18:18:54 dovecot_login authenticator failed for \(User\) \[92.118.38.42\]: 535 Incorrect authentication data \(set_id=obailey@no-server.de\)
2020-03-12 18:18:57 dovecot_login authenticator failed for \(User\) \[92.118.38.42\]: 535 Incorrect authentication data \(set_id=obailey@no-server.de\)
2020-03-12 18:19:07 dovecot_login authenticator failed for \(User\) \[92.118.38.42\]: 535 Incorrect authentication data \(set_id=orivera@no-server.de\)
...
2020-03-13 01:33:34
81.184.69.194 attackbotsspam
2019-11-13T21:34:11.115Z CLOSE host=81.184.69.194 port=41862 fd=4 time=20.011 bytes=13
...
2020-03-13 01:12:57
123.175.81.26 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-13 01:29:38
82.205.16.230 attackspam
2019-11-28T12:15:33.057Z CLOSE host=82.205.16.230 port=63695 fd=4 time=140.097 bytes=276
...
2020-03-13 01:07:12
185.175.93.3 attackspam
03/12/2020-12:47:07.199369 185.175.93.3 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-03-13 01:04:25
81.35.1.69 attackspambots
SSH_scan
2020-03-13 00:57:40

Recently Reported IPs

2606:4700:10::6814:5925 2606:4700:10::6814:8623 14.207.194.107 147.185.132.170
211.47.66.63 8.216.43.98 47.82.84.235 116.178.129.169
110.17.65.94 122.192.203.63 2606:4700:10::ac43:1758 2606:4700:10::6816:4506
2606:4700:10::6816:402d 2606:4700:10::6816:257 2606:4700:10::6816:2678 2606:4700:10::6816:4904
2606:4700:10::6814:8656 66.132.172.217 2606:4700:10::6814:9158 2606:4700:10::6814:8053