City: Guangzhou
Region: Guangdong
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 121.8.28.182 | attack | Unauthorized connection attempt detected from IP address 121.8.28.182 to port 6656 [T] |
2020-01-30 16:58:14 |
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '121.8.0.0 - 121.15.255.255'
% Abuse contact for '121.8.0.0 - 121.15.255.255' is 'anti-spam@chinatelecom.cn'
inetnum: 121.8.0.0 - 121.15.255.255
netname: CHINANET-GD
descr: CHINANET Guangdong province network
descr: China Telecom
descr: No.31,jingrong street
descr: Beijing 100032
country: CN
admin-c: CH93-AP
tech-c: IC83-AP
abuse-c: AC1573-AP
status: ALLOCATED PORTABLE
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-lower: MAINT-CHINANET-GD
mnt-routes: MAINT-CHINANET-GD
mnt-irt: IRT-CHINANET-CN
last-modified: 2021-06-15T08:06:11Z
source: APNIC
irt: IRT-CHINANET-CN
address: No.31 ,jingrong street,beijing
address: 100032
e-mail: anti-spam@chinatelecom.cn
abuse-mailbox: anti-spam@chinatelecom.cn
admin-c: CH93-AP
tech-c: CH93-AP
auth: # Filtered
remarks: anti-spam@chinatelecom.cn was validated on 2025-11-13
mnt-by: MAINT-CHINANET
last-modified: 2026-03-13T07:12:20Z
source: APNIC
role: ABUSE CHINANETCN
country: ZZ
address: No.31 ,jingrong street,beijing
address: 100032
phone: +000000000
e-mail: anti-spam@chinatelecom.cn
admin-c: CH93-AP
tech-c: CH93-AP
nic-hdl: AC1573-AP
remarks: Generated from irt object IRT-CHINANET-CN
remarks: anti-spam@chinatelecom.cn was validated on 2025-11-13
abuse-mailbox: anti-spam@chinatelecom.cn
mnt-by: APNIC-ABUSE
last-modified: 2025-11-13T14:15:15Z
source: APNIC
person: Chinanet Hostmaster
nic-hdl: CH93-AP
e-mail: anti-spam@chinatelecom.cn
address: No.31 ,jingrong street,beijing
address: 100032
phone: +86-10-58501724
fax-no: +86-10-58501724
country: CN
mnt-by: MAINT-CHINANET
last-modified: 2022-02-28T06:53:44Z
source: APNIC
person: IPMASTER CHINANET-GD
nic-hdl: IC83-AP
e-mail: abuse_gdicnoc@163.com
address: NO.18,RO. ZHONGSHANER,YUEXIU DISTRIC,GUANGZHOU
phone: +86-20-87189274
fax-no: +86-20-87189274
country: CN
mnt-by: MAINT-CHINANET-GD
remarks: IPMASTER is not for spam complaint,please send spam complaint to abuse_gdicnoc@163.com
abuse-mailbox: abuse_gdicnoc@163.com
last-modified: 2021-05-12T09:06:58Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.8.28.62
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45475
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;121.8.28.62. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032700 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 28 00:08:28 CST 2026
;; MSG SIZE rcvd: 104
Host 62.28.8.121.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 62.28.8.121.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 58.56.66.199 | attackbotsspam | SIP/5060 Probe, BF, Hack - |
2020-02-11 20:27:42 |
| 123.21.167.46 | attack | 2020-02-1105:48:131j1NT3-0007JI-JJ\<=verena@rs-solution.chH=\(localhost\)[79.164.233.69]:36491P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=2513id=696CDA89825678CB17125BE3179B7C86@rs-solution.chT="\;Dbeveryhappytoobtainyourmail\ |
2020-02-11 20:56:40 |
| 67.213.210.231 | attackspam | TCP Port Scanning |
2020-02-11 21:01:36 |
| 118.174.65.125 | attackbots | 1581396504 - 02/11/2020 05:48:24 Host: 118.174.65.125/118.174.65.125 Port: 445 TCP Blocked |
2020-02-11 20:54:03 |
| 103.245.198.246 | attackbots | Port probing on unauthorized port 23 |
2020-02-11 21:06:47 |
| 115.218.18.141 | attackbots | Honeypot attack, port: 5555, PTR: PTR record not found |
2020-02-11 20:28:25 |
| 157.245.158.97 | attackbotsspam | Feb 11 06:47:18 toyboy sshd[7242]: Invalid user god from 157.245.158.97 Feb 11 06:47:18 toyboy sshd[7242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.158.97 Feb 11 06:47:20 toyboy sshd[7242]: Failed password for invalid user god from 157.245.158.97 port 47012 ssh2 Feb 11 06:47:20 toyboy sshd[7242]: Received disconnect from 157.245.158.97: 11: Bye Bye [preauth] Feb 11 06:57:53 toyboy sshd[8185]: Invalid user prf from 157.245.158.97 Feb 11 06:57:53 toyboy sshd[8185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.158.97 Feb 11 06:57:56 toyboy sshd[8185]: Failed password for invalid user prf from 157.245.158.97 port 53932 ssh2 Feb 11 06:57:56 toyboy sshd[8185]: Received disconnect from 157.245.158.97: 11: Bye Bye [preauth] Feb 11 07:01:14 toyboy sshd[8391]: Invalid user hhostname from 157.245.158.97 Feb 11 07:01:14 toyboy sshd[8391]: pam_unix(sshd:auth): authentication fai........ ------------------------------- |
2020-02-11 21:09:58 |
| 80.68.0.142 | attackspam | 445/tcp 445/tcp 445/tcp [2020-01-29/02-11]3pkt |
2020-02-11 20:58:23 |
| 222.124.18.155 | attack | Feb 11 13:43:28 XXX sshd[12180]: Invalid user ubuntu from 222.124.18.155 port 38632 |
2020-02-11 21:03:32 |
| 45.55.93.245 | attack | Automatic report - Banned IP Access |
2020-02-11 20:28:03 |
| 194.85.150.194 | attack | unauthorized connection attempt |
2020-02-11 21:15:05 |
| 80.211.166.139 | attackspam | Feb 11 13:38:34 markkoudstaal sshd[22330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.166.139 Feb 11 13:38:36 markkoudstaal sshd[22330]: Failed password for invalid user zmf from 80.211.166.139 port 60042 ssh2 Feb 11 13:41:10 markkoudstaal sshd[22825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.166.139 |
2020-02-11 21:02:26 |
| 78.58.9.58 | attack | unauthorized connection attempt |
2020-02-11 21:13:37 |
| 201.18.75.178 | attack | unauthorized connection attempt |
2020-02-11 21:03:51 |
| 197.232.53.182 | attackspam | Auto reported by IDS |
2020-02-11 20:46:17 |