City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 121.56.214.114 | attack | Unauthorized connection attempt detected from IP address 121.56.214.114 to port 6656 [T] |
2020-01-30 18:26:51 |
| 121.56.214.235 | attack | Unauthorized connection attempt detected from IP address 121.56.214.235 to port 6656 [T] |
2020-01-30 17:54:51 |
| 121.56.214.126 | attackspambots | Unauthorized connection attempt detected from IP address 121.56.214.126 to port 6656 [T] |
2020-01-30 14:14:49 |
| 121.56.214.22 | attack | Unauthorized connection attempt detected from IP address 121.56.214.22 to port 6656 [T] |
2020-01-27 06:15:31 |
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '121.56.0.0 - 121.57.255.255'
% Abuse contact for '121.56.0.0 - 121.57.255.255' is 'anti-spam@chinatelecom.cn'
inetnum: 121.56.0.0 - 121.57.255.255
netname: CHINANET-NM
descr: CHINANET neimeng province network
descr: China Telecom
descr: No.31,jingrong street
descr: Beijing 100032
country: CN
admin-c: CH93-AP
tech-c: CY690-AP
abuse-c: AC1573-AP
status: ALLOCATED PORTABLE
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-lower: MAINT-CHINANET-NM
mnt-routes: MAINT-CHINANET-NM
mnt-irt: IRT-CHINANET-CN
last-modified: 2021-06-15T08:06:43Z
source: APNIC
irt: IRT-CHINANET-CN
address: No.31 ,jingrong street,beijing
address: 100032
e-mail: anti-spam@chinatelecom.cn
abuse-mailbox: anti-spam@chinatelecom.cn
admin-c: CH93-AP
tech-c: CH93-AP
auth: # Filtered
remarks: anti-spam@chinatelecom.cn was validated on 2025-11-13
mnt-by: MAINT-CHINANET
last-modified: 2026-03-13T07:12:20Z
source: APNIC
role: ABUSE CHINANETCN
country: ZZ
address: No.31 ,jingrong street,beijing
address: 100032
phone: +000000000
e-mail: anti-spam@chinatelecom.cn
admin-c: CH93-AP
tech-c: CH93-AP
nic-hdl: AC1573-AP
remarks: Generated from irt object IRT-CHINANET-CN
remarks: anti-spam@chinatelecom.cn was validated on 2025-11-13
abuse-mailbox: anti-spam@chinatelecom.cn
mnt-by: APNIC-ABUSE
last-modified: 2025-11-13T14:15:15Z
source: APNIC
person: Chinanet Hostmaster
nic-hdl: CH93-AP
e-mail: anti-spam@chinatelecom.cn
address: No.31 ,jingrong street,beijing
address: 100032
phone: +86-10-58501724
fax-no: +86-10-58501724
country: CN
mnt-by: MAINT-CHINANET
last-modified: 2022-02-28T06:53:44Z
source: APNIC
person: Cao Yong Gang
nic-hdl: CY690-AP
e-mail: linjianfeng.nm@chinatelecom.cn
address: the 8th floorses of Postal service mansion,Train station east street,Huhhot,010020
phone: +86-471-3386960
fax-no: +86-471-3380003
country: CN
mnt-by: MAINT-CHINANET-NM
last-modified: 2021-05-06T02:10:03Z
source: APNIC
% Information related to '121.56.0.0/15AS4134'
route: 121.56.0.0/15
descr: From Neimeng Network of ChinaTelecom
origin: AS4134
mnt-by: MAINT-CHINANET
last-modified: 2008-09-04T07:54:48Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.56.214.174
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12695
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;121.56.214.174. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026033103 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 01 10:31:30 CST 2026
;; MSG SIZE rcvd: 107
174.214.56.121.in-addr.arpa domain name pointer 174.214.56.121.broad.xm.nm.dynamic.163data.com.cn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
174.214.56.121.in-addr.arpa name = 174.214.56.121.broad.xm.nm.dynamic.163data.com.cn.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 212.129.25.123 | attack | 212.129.25.123 - - [16/Sep/2020:19:55:30 +0100] "POST /wp-login.php HTTP/1.1" 200 1791 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 212.129.25.123 - - [16/Sep/2020:19:55:30 +0100] "POST /wp-login.php HTTP/1.1" 200 1761 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 212.129.25.123 - - [16/Sep/2020:19:55:30 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-09-17 03:21:52 |
| 155.94.196.194 | attackbots | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-09-16T16:57:14Z and 2020-09-16T17:02:27Z |
2020-09-17 03:21:24 |
| 179.206.66.51 | attack | Fail2Ban Ban Triggered |
2020-09-17 03:20:35 |
| 115.98.148.136 | attackspam | Listed on dnsbl-sorbs plus abuseat.org and zen-spamhaus / proto=6 . srcport=52154 . dstport=23 . (1129) |
2020-09-17 04:21:46 |
| 2.187.6.49 | attackbots | Unauthorized connection attempt from IP address 2.187.6.49 on Port 445(SMB) |
2020-09-17 03:23:31 |
| 106.12.119.218 | attackbotsspam | Connection to SSH Honeypot - Detected by HoneypotDB |
2020-09-17 04:27:50 |
| 171.34.78.119 | attack | SSH Bruteforce Attempt on Honeypot |
2020-09-17 04:16:28 |
| 91.126.44.204 | attackbots | Sep 16 18:05:07 ssh2 sshd[64975]: User root from 91.126.44.204 not allowed because not listed in AllowUsers Sep 16 18:05:07 ssh2 sshd[64975]: Failed password for invalid user root from 91.126.44.204 port 52356 ssh2 Sep 16 18:05:07 ssh2 sshd[64975]: Connection closed by invalid user root 91.126.44.204 port 52356 [preauth] ... |
2020-09-17 03:24:30 |
| 111.230.148.82 | attack | $f2bV_matches |
2020-09-17 04:22:22 |
| 218.30.21.46 | attackspambots | Found on CINS badguys / proto=6 . srcport=45483 . dstport=1433 . (1128) |
2020-09-17 04:28:39 |
| 118.89.48.148 | attackbots | Banned for a week because repeated abuses, for example SSH, but not only |
2020-09-17 03:41:39 |
| 87.251.74.18 | attack | firewall-block, port(s): 1000/tcp, 2013/tcp, 2018/tcp, 3000/tcp, 3001/tcp, 3396/tcp, 5000/tcp, 5005/tcp, 7000/tcp, 9000/tcp, 9999/tcp, 10002/tcp, 10050/tcp, 33333/tcp, 33389/tcp, 40001/tcp, 50001/tcp, 50005/tcp |
2020-09-17 04:31:49 |
| 18.230.65.131 | attackspambots | Excessiva Conexões Maliciosas |
2020-09-17 04:12:47 |
| 51.178.215.200 | attackbots | 2020-09-16T22:02:25.451419amanda2.illicoweb.com sshd\[7609\]: Invalid user fake from 51.178.215.200 port 44696 2020-09-16T22:02:25.454152amanda2.illicoweb.com sshd\[7609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip200.ip-51-178-215.eu 2020-09-16T22:02:27.420681amanda2.illicoweb.com sshd\[7609\]: Failed password for invalid user fake from 51.178.215.200 port 44696 ssh2 2020-09-16T22:02:27.799068amanda2.illicoweb.com sshd\[7611\]: Invalid user admin from 51.178.215.200 port 57832 2020-09-16T22:02:27.801325amanda2.illicoweb.com sshd\[7611\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip200.ip-51-178-215.eu ... |
2020-09-17 04:09:18 |
| 197.210.29.113 | attack | 1600275700 - 09/16/2020 19:01:40 Host: 197.210.29.113/197.210.29.113 Port: 445 TCP Blocked |
2020-09-17 04:16:14 |